Skip to main content

Home/ Digit_al Society/ Group items tagged attackers

Rss Feed Group items tagged

dr tech

Education sector is fastest growing for DDoS mitigation - DOSarrest - 24 Jan 2014 - Com... - 0 views

  •  
    ""If their website goes down as a result of an attack, they can lose their SEO ranking or it could have an effect on their brand, there is a lot at stake aside from revenues," he said."
dr tech

NHS scrambles to fix bug sending users to malware site | Technology | theguardian.com - 0 views

  •  
    "The error saw over 800 links on the nhs.uk website send visitors to websites serving advertising and malware unrelated with the NHS. "We can confirm that this problem has arisen due to an internal coding error and that NHS Choices has not been maliciously attacked," said a HSCIC spokeswoman on behalf of NHS Choices."
dr tech

Dropbox reveals government requests for user information | Technology | theguardian.com - 0 views

  •  
    "The transparency report is in its third year, but it hasn't prevented attacks from advocates such as Edward Snowden, who called the company "hostile to privacy". "Dropbox is a targeted you know wannabe PRISM partner," he told the Guardian in July 2014. "They just put … Condoleezza Rice on their board … who is probably the most anti-privacy official you can imagine.""
dr tech

Shellshock: The 'Bash Bug' That Could Be Worse Than Heartbleed - 0 views

  •  
    "Security researchers have discovered a vulnerability in the system software used in millions of computers, opening the possibility that attackers could execute arbitrary commands on web servers, other Linux-based machines and even Mac computers."
dr tech

12 Trends to Watch in 2010 | Electronic Frontier Foundation - 1 views

  •  
    How all of our electronic communication via web and phone is coming under increasing attack, Net Neutrality, three strikes and much much more...
dr tech

ICANN was hacked, but critical data was protected - 0 views

  •  
    "Hackers breached the Internet Corporation for Assigned Names and Numbers (ICANN), the organization that coordinates unique web addresses all across the world, but luckily didn't hit the Internet Assigned Numbers Authority, an important leg that keeps the Internet running smoothly. Attackers used "spear fishing" to break into the system in late November, according to a post on ICANN's website this week. Staffers received email messages that appeared to be coming from ICANN's own domain; several ICANN staffers' emails were compromised."
dr tech

Care.data and big data will fill 'dangerous gaps' in NHS and futureproof it with genomi... - 0 views

  •  
    "Insurance is just one area which could benefit from mining patient information in order to acquire the best business outcomes - although at the detriment of the person attempting to get insurance. After all, why would a company agree to hand out a policy to a person whose data suggests has a high risk of a heart attack?"
dr tech

What we know about 'Regin,' the powerful malware that could be the work of NSA - 0 views

  •  
    "Regin is a tool capable of infecting and compromising entire networks, not just individual computers, as security companies Symantec and Kaspersky Labs detailed in their technical reports published on Sunday and Monday. It's not only a computer virus or malware, but also a toolkit or platform that can be used for different purposes, depending on the needs of the attackers. It can collect passwords, retrieve deleted files, and even take over entire networks and infrastructures, according to researchers. "
dr tech

Riding with the Stars: Passenger Privacy in the NYC Taxicab Dataset - Research - 0 views

  •  
    "The most well-documented of these deals with the hash function used to "anonymize" the license and medallion numbers. A bit of lateral thinking from one civic hacker and the data was completely de-anonymized. This data can now be used to calculate, for example, any driver's annual income. More disquieting, though, in my opinion, is the privacy risk to passengers. With only a small amount of auxiliary knowledge, using this dataset an attacker could identify where an individual went, how much they paid, weekly habits, etc. I will demonstrate how easy this is to do in the following section."
« First ‹ Previous 61 - 80 of 151 Next › Last »
Showing 20 items per page