JudulPenulisKutipanDiposting
Acer Announces Data Breach Through E-Commerce StoreCatalin Cimpanu, SoftpediaAcer, a Taiwanese multinational hardware and electronics corporation, is preparing to notify customers of a data breach the company suffered via its online store. The company says that users that have accessed its e-commerce site between May 12, 2015, and April 28, 2016 may have had their information compromised due to the unauthorized access of a third-party. ...Kamis, 23 Jun 2016
US charges Chinese ex-IBM worker with espionageBBC NewsUS authorities have charged Chinese national Xu Jiaqiang with three counts of economic espionage for allegedly stealing valuable source code from his former employer in the US. ....Kamis, 23 Jun 2016
Identity thief who said he was too smart to catch gets caughtLisa Vaas, Naked Security (Sophos Blog)Tony Michael Canterberry, a 32-year-old Alabama man who declined to meet with police as they investigated two cases of identity theft because he claimed to be too smart to be captured, has been captured. ...Kamis, 23 Jun 2016
T-Mobile Employee Stole and Tried to Sell Customer DataCatalin Cimpanu, SoftpediaAn employee of T-Mobile's Czech branch stole customer data and then tried to sell it to a third-party, Czech news site iDNES reports. .....Kamis, 23 Jun 2016
Operation DaybreakCostin Raiu and Anton Ivanov, SecureList (Kaspersky Lab Blog)ScarCruft is a relatively new APT group; victims have been observed in Russia, Nepal, South Korea, China, India, Kuwait and Romania. The group has several ongoing operations, utilizing multiple exploits — two for Adobe Flash and one for Microsoft Internet Explorer.Rabu, 22 Jun 2016
Nato: Cyberspace is an operational domain of warfareNarinder Purba, WeLiveSecurity (ESET)Nato has acknowledged that cyberspace is now an operational domain of warfare, along with air, sea and land. ....Rabu, 22 Jun 2016
Massive North Korea cyber attack thwarted after hacking South Korea: reportReutersNorth Korea has hacked into more than 140,000 computers at large South Korean conglomerates and government agencies and planted malicious codes that may have been intended for a massive cyber attack that has been thwarted, a news report said on Monday. ...Rabu, 22 Jun 2016
Keyboard warriors: South Korea trains new frontline in decades-old war with NorthJu-Min Park, ReutersIn one college major at Seoul's elite Korea University, the courses are known only by number, and students keep their identities a secret from outsiders. ....Rabu, 22 Jun 2016
Hamas Behind DustSky Cyber-Espionage CampaignCatalin Cimpanu, SoftpediaA cyber-espionage group known as the Gaza Cybergang, the Gaza Hackers Team or Molerats has resumed operations in April 2016, after previously shutting down all activities when security firm ClearSky discovered its presence in January 2016. ....Rabu, 22 Jun 2016
US Navy Training a Group of "Ethical Hacking" SailorsCatalin Cimpanu, SoftpediaThe US Navy has put out an ad soliciting bids for an educational program aimed at training sailors in ethical hacking techniques. ....Rabu, 08 Jun 2016
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: