Read more about WikiLeaks
Bookmark and Share
  • Computer experts back appeal in Twitter-Wikileaks case

    01.04.2011

    A number of respected security experts have decided to formally speak up in favor of the appeal that lawyers have filed against the Twitter data handover decision in WikiLeaks case, so they filed an amicus brief - a legal opinion that could influence the court's final decision - stating that they think the government needs to obtain a search warrant if they want to get the IP addresses of the Twitter users linked to WikiLeaks.

  • Lawyers appeal Twitter data handover decision in WikiLeaks case

    29.03.2011

    Not satisfied with the court's decision that it has to turn over account details of three of its users to the US Department of Justice, three Twitter users have filed a motion to overthrow the decision made by US Magistrate Judge Theresa Carroll Buchanan of the Eastern District of Virginia on March 11.

  • Assange to be extradited to Sweden

    24.02.2011

    WikiLeaks founder and director Julian Assange is to extradited to Sweden so that he might be questioned regarding to and possibly charged with sexual assault and rape, decreed today the British judge presiding over the extradition hearing.

  • HBGary breach revelations and repercussions

    10.02.2011

    A few days ago, the Internet group Anonymous downed security firm HBGary's website and breached its networks, downloading a serious amount of confidential information (e-mails, malware data, financial data, PBX systems) belonging to the enterprise and publishing some of it.

  • Increased SEO poisoning will drive record malware outbreaks

    21.01.2011

    Surges in SEO poisoning will yield record-breaking malware outbreaks for businesses in 2011 according to TriGeo.\r\n\r\n\r\nIn addition to SEO poisoning attacks in 2011, companies should expect to see:\r\n\r\nAttackers increasingly targeting vulnerabilities in mobile devices – specifically the iPhone and the iPad. The consumerization of IT continues to present a significant risk to businesses.\r\n\r\nAs new, popular mobile devices are introduced into the workplace, look for hackers to uncover new mobile device vulnerabilities that lead to increased data breaches.\r\n\r\nData breaches at schools and hospitals yield record-breaking financial losses in 2011. According to the Identity Theft Resource Center, educational and medical institutions accounted for more than a third of all data breaches in 2010, as well as some of the largest breaches of the year, including two at the University of Hawaii (nearly 100,000 records exposed), and AvMed Health Plans (1.2 million records breached).\r\n\r\nAdditionally, the healthcare industry was hit with a Ponemon Institute study concluding that data breaches were costing the field more than $6 billion per year. Look for this trend to continue to escalate in 2011.\r\n\r\nMore gray-hat hacks in 2011. WikiLeaks has evoked mixed responses from supporters and critics. Expect to see more gray-hat hackers using their technical capabilities as a cyber soapbox that exposes potential risks and vulnerabilities.\r\n\r\nMore scrutiny for SaaS security. Software-as-a-Service providers will focus less on improving availability and more on security. SaaS will continue to increase in popularity, and as a result, auditors will need to see a clear audit trail of SaaS application activity from end-users.\r\n\r\nLook for tighter integration between SaaS applications and internal monitoring and security technologies.\r\n\r\n“Results for popular searches on global events in 2010 like the disaster in the Gulf of Mexico, the World Cup and the launch of the new iPhone were flooded with hacker-developed websites infested with malware,” said Michelle Dickman, president and CEO of TriGeo Network Security.\r\n\r\n“Employees are a huge vulnerability to organizations.




Spotlight

Intentional backdoors in iOS devices uncovered

Posted on 22 July 2014.  |  A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //