Firm Sues Bank Over Cyberheist

The receiver for the now-defunct California-based Efficient Services Escrow Group is suing its former bank over a $1.5 million account takeover fraud incident that between December 2012 and January 2013 drained the escrow company's account.Peter Davidson of the California law firm Ervin, Cohen & Jessup LLP, the appointed ...

 

Intel kills off McAfee Security brand

Intel takes branding ownership of McAfee's computer security suite and severs founder John McAfee's name from the security software that has borne it for more than 20 years.McAfee Mobile Security is about to get a new name, and some of its features will become free to use, too.

 

Two researchers send a text message using vodka

Two researchers at York University have worked out a way to communicate between two points using vodka evaporated into the air. They used their system to message the lyrics of “O Canada” between two points, leading them to conclude that in times of need, when there is no ...

 

ZeroAccess criminals wave white flag: The impact of partnerships on cybercrime

The following is a post from Richard Domingues Boscovich, Assistant General Counsel, Microsoft Digital Crimes Unit.Two weeks after Microsoft filed its civil case in the U.S. District Court for the Western District of Texas against the notorious Sirefef botnet, also known ZeroAccess, I am pleased to report that ...

 

How a Hacker Compromised a Server in Under Four Hours

In September 2013, we ran a live server exploitation exercise to see how long an unpatched and minimally configured cloud server instance could survive against financially motivated attackers when connected directly to the Internet. The exercise, referred to as The Gauntlet throughout the capture-the-flag-style contest, ran for 23 ...

 

Stock exchanges of the world form central cyber security working group

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats. Don't show me this againHi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security ...

 

Code-busters lift RSA keys simply by listening to the noises a computer

Un-named PC maker sought help to defeat un-named nation's PC-bricking plan In theory - Obama government granted time to fight injunction Chinese firm will still clear critical Brit networking gear, but team to be of UK's choosing Texts 'designed' to look like they were 'from a friend' - ...

 

Tax Report: How Will the IRS Tax Bitcoin?

Despite a recent plunge, bitcoin has had a banner year. Now comes the hard part—figuring out the taxes on it.For the uninitiated, bitcoin is the most prominent of several "virtual currencies"—money that exists only online and isn't backed by any government. Released in 2009 by an unknown person ...

 

Cards Stolen in Target Breach Flood Underground Markets — Krebs on Security

Credit and debit card accounts stolen in a recent data breach at retail giant Target have been flooding underground black markets in recent weeks, selling in batches of one million cards and going for anywhere from $20 to more than $100 per card, KrebsOnSecurity has learned.Prior to breaking ...

 

Microsoft's long-standing commitment to children's online safety

Today, social networking, mobile computing, and the realization that 21st century skills are a key ingredient to children’s success, make protecting kids online that much more significant, nearly a generation later. Last month in Brussels, Forum Europe held its second annual European Child Safety Online Conference to examine ...

 

next page