Six more US retailers hit by Target-like hacks, security firm says

Saturday, January 18th, 2014

Cybercriminals have stolen payment card data from six more U.S. retailers using similar point-of-sale malware that compromised Target, a computer crime intelligence company said Friday. The conclusion comes from a study of members-only forums where cybercriminals buy and sell data and malicious software tools, said Dan Clements[cq], president of IntelCrawler, which ...

Blackphone – A New Android-based Phone Built Around Privacy

Thursday, January 16th, 2014

Blackphone is a new venture from the collaboration of US Silent Circle and Spain's Geeksphone. Its website is registered in privacy-conscious Switzerland. Most notably it includes the renowned cryptographers Phil Zimmermann and Jon Callas, the originators of PGP. As yet there is little technical information beyond a brief video on the Blackphone website – ...

Neiman Marcus notifying customers after card data breach

Sunday, January 12th, 2014

Neiman Marcus has been notifying customers of a data breach after hackers stole merchant card information for an undisclosed number of shoppers. The high-end retailer said it was working with the U.S. Secret Service and a forensics firm to investigate the theft, which it said it learned about in December from ...

New ransomware, more insidious than CryptoLocker, to go on market

Tuesday, January 7th, 2014

Researchers warn that a new threat, using harder-to-crack encryption methods than comparable ransomware, may hit the black market soon. The malware, which locks users out of their computer until they pay a ransom, is being called Prison Locker and Power Locker on underground forums, according to a Friday blog post at Malware Must Die. According ...

Yahoo users exposed to malware attack

Sunday, January 5th, 2014

Yahoo.com visitors over the last few days may have been served with malware via the Yahoo ad network, according to a security firm in the Netherlands. Users clicking on some of the ads were redirected to sites armed with code that exploits vulnerabilities in Java and installs a variety of different ...