MATR Sponsor:


MATR Supporters:

HACKING AND VIRUS ALERTS News


Hackers 5 - Voting Machines 0 - Hackers at DefCon conference exploit vulnerabilities in voting machines in 1 1/2 hours.:


It took less than a day for attendees at the DefCon hacking conference to find and exploit vulnerabilities in five different voting machine types. "The first ones were discovered within an hour ...


Security lapse leaks data from millions of Verizon customers:


A security researcher says a lapse has exposed data from millions of Verizon customers, leaking names, addresses and personal identification numbers, or PINs. Verizon Wireless says 6 million customers ...


Russia has developed a cyber weapon that can disrupt power grids, according to new research:


Hackers allied with the Russian government have devised a cyber weapon that has the potential to be the most disruptive yet against electric systems that Americans depend on for daily life, according ...


How tech sleuths cracked the mysterious code that turns your printer into a spying tool:


You wouldn't have noticed it unless you knew where -- and how -- to look, but the top-secret National Security Agency document leaked to the Intercept and published Monday contained a clue that may have ...


Inside Google's Global Campaign to Shut Down Phishing:


At the beginning of May, a phishing scam flooded the web, disguised as a typical Google Docs request. Some of the emails even appeared to come from acquaintances. If victims clicked through and granted ...


Hackers Hide Cyberattacks in Social Media Posts:


It took only one attempt for Russian hackers to make their way into the computer of a Pentagon official. But the attack didn't come through an email or a file buried within a seemingly innocuous document. A ...


America's dangerous Internet delusion:


The trouble is that we are aiding and abetting our adversaries. We are addicted to the Internet and refuse to recognize how our addiction subtracts from our security. The more we connect our devices and ...


How to Protect Yourself From Ransomware Attacks:


Ransomware, which is often transmitted by email or web pop-ups, involves locking up people's data and threatening to destroy it if a ransom is not paid. The global cyberattack has affected 200,000 Windows ...


One of the most important lessons of the crippling ransomware crisis:


It's a teachable moment -- not just for computer users everywhere, who might benefit from a reminder to keep their devices up-to-date, but also for policymakers who fall too easily for the notion that ...


Young techie finds "kill switch" for cyberattack:


A young cybersecurity researcher has been credited with helping to halt the spread of the global ransomware cyberattack by accidentally activating a so-called "kill switch" in the malicious software. The ...


Massive, fast-moving cyberattack hits as many as 74 countries:


As many as 74 countries have been hit by a huge, fast-moving and global ransomware attack that locks computers and demands the digital equivalent of $300, Kaspersky Lab, a Russian-based cybersecurity ...


Nasty Microsoft Word 'Booby Trap' Loaded PCs With Malware:


It feels like all weeks in security news are overstuffed lately, and this one's no exception. It started with a bang, or more of a blare, as all of Dallas's dozens of tornado sirens were hacked to sound ...


How Hackers Hijacked a Bank's Entire Online Operation:


The traditional model of hacking a bank isn't so different from the old-fashioned method of robbing one. Thieves get in, get the goods, and get out. But one enterprising group of hackers targeting a Brazilian ...


Google affiliate offers tools to safeguard election-related sites from hacking:


An organization affiliated with Google is offering tools that news organizations and election-related sites can use to protect themselves from hacking. Jigsaw https://jigsaw.google.com/ , a research ...


Tech innovators see end of silicon era, rise of electric vehicles :


When a group of technology experts were asked to speculate on the future of their industries last week at the University of Montana, their answers were broad and varied, from the end of the silicon ...


Cyber attacks penetrate vulnerable systems:


"The hackers are just smart IT people that know how lazy you are." This is the second of three stories on how information technology and innovation are transforming industries and people's lives. ...


The Golden Age of Email Hacks Is Only Getting Started:


You've heard about so many email hacks that recapping them feels redundant. "Take any of the free email platforms out there. They all have a web interface. For the most part, they don't require any ...


The embarrassing reason behind Amazon's huge cloud computing outage this week:


Amazon is back with an apology and an explanation for a high-profile malfunction that caused websites all across the Internet to grind to a halt for hours on Tuesday. The online retail giant, which ...


Here's why your browser may tell you the White House website isn't secure:




New telephone scam: "Can you hear me?":


It's not a Verizon commercial: If you receive a phone call from someone asking "can you hear me," hang up. You're a potential victim in the latest scam circulating around the U.S. By CBS News Full ...


Ransomware Turns to Big Targets--With Even Bigger Fallout:


An Austrian hotel lost control of its door locks, keeping new guests stranded in the lobby. A police department in Cockrell Hill, Texas abandoned years of video evidence and digital documentation. In ...


Fired IT worker changed password, wants $200K to fix it, college says:


A fired IT employee took his revenge on a for-profit online college before he left, changing a password on an account that stored email and course material for 2,000 students, the Indianapolis-based online ...


The Top 17 Security Predictions for 2017 -- and what you can do to prepare.:


What will happen in 2017? Whether you prefer to call them cybersecurity forecasts, online risk trends or security predictions, the answers are similar. Here's a roundup of what our top industry experts, ...


How Russia Recruited Elite Hackers for Its Cyberwar:


Aleksandr B. Vyarya thought his job was to defend people from cyberattacks until, he says, his government approached him with a request to do the opposite. Mr. Vyarya, 33, a bearded, bespectacled computer ...


Democratic House Candidates Were Also Targets of Russian Hacking:


"It was like I was standing out there naked," said Annette Taddeo, a Democrat who lost her primary race after secret campaign documents were made public. "I just can't describe it any other way. Our entire ...


The Perfect Weapon: How Russian Cyberpower Invaded the U.S.:




President Obama orders review of election hacking:


President Obama has ordered a full review of hacking-relating activity possibly linked to attempts to disrupt the November presidential election. He wants the report before he leaves office on January ...


Your IT department alone can't stop a cyberattack:


Cybersecurity is a $445 billion problem, and some predict that figure could rise to $6 trillion by 2021. The list of companies that have already been hacked, attacked, and breached - suffering business ...


Never Ever (Ever) Download Android Apps Outside of Google Play:


This week, researchers revealed that a strain of malware hit at least 1.3 million Android phones, stealing user data as part of a scheme to boost ad revenue. Called "Gooligan," it got into those devices ...


Malicious Software Hits Bigfork School District Computer System:



View ALL HACKING AND VIRUS ALERTS news



Reprinted under the Fair Use doctrine of international copyright law. Full copyright retained by the original publication. In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.


E-mail this page to a friend!