If you tried to go on Lenovo’s main website on Thursday, instead of reaching the main portal of the hardware manufacturer you were likely greeted by a picture of what looks to be an average teenager, sitting in his room with his dog and a pair of bulky headphones wrapped on top of his head.
This week, Anonymous revealed their plans to stage an international day of protest against child abusers, and those who support child abuse on underground pornography rings through networks such as Tor and I2P.
This week, select members from the hacking team Anonymous announced they had successfully infiltrated and taken down various social media accounts and email addresses belonging to the international terrorist organization ISIS.
VPN provider TorGuard has launched a new encrypted email client for its user base.
It’s not over yet. As the year wanes on, leaks from the Snowden camp continue to trickle out, and the latest seems to have the activities of users download habits square in its sights.
The Irish government has submitted a court filing that says that US courts must get its permission to access emails stored in a Microsoft data center in Dublin.
The term ‘brute force attacks’ conjures up many images. A battering ram being heaved at the door of a castle. An army from ancient Rome 86,000 strong taking on Hannibal at Cannae. Any number of scenes from Game of Thrones… Yes, the visuals are vivid, but since we’re talking Internet security here, they’re fairly far Read More
On Wednesday, the SEA (Syrian Electronic Army) penetrated the website of business news site International Business Times, breaching the publication’s CMS (content management system) and threatened to wipe out the entire site if it continues to publish ‘false news’ about Syria. The anonymous hacking group also deleted an article pertaining to Syrian violence.
This week, the security research group at Palo Alto Networks revealed their annual Threat Landscape Review, which alleges that 80 percent of all global malware traffic in October of this year came from a single place, the ancient, yet still fully functional Asprox botnet.
Although 2014 saw vulnerabilities like ShellShock and Heartbleed along with several data breaches on major retail stores and banks, most businesses still don’t have a full-fledged patch management process or a strong system to track sensitive data, according to a survey by Trustwave.