Firm Sues Bank Over Cyberheist

The receiver for the now-defunct California-based Efficient Services Escrow Group is suing its former bank over a $1.5 million account takeover fraud incident that between December 2012 and January 2013 drained the escrow company's account.Peter Davidson of the California law firm Ervin, Cohen & Jessup LLP, the appointed receiver for Efficient Services Escrow, alleges First Foundation Bank of California had insufficient security procedures in place when cybercriminals hacked Efficient Services Escrow Group's bank account.

Target credit card data theft gets worse

  Any way you cut it, this is a bad situation for Target's shoppers and the company itself, and I don't see how it gets any better right now. The latest from Krebs, who broke the story in the first place, will blow your mind.

Does the IRS know how to tax Bitcoins?

It's someone's money and the IRS wants its cut. However, it doesn't seem like anyone knows how virtual currencies are going to be handled by the tax authorities.

Two researchers send a text message using vodka

Two researchers at York University have worked out a way to communicate between two points using vodka evaporated into the air.

Code-busters lift RSA keys simply by listening to the noises a computer makes

Un-named PC maker sought help to defeat un-named nation's PC-bricking plan In theory - Obama government granted time to fight injunction Chinese firm will still clear critical Brit networking gear, but team to be of UK's choosing Texts 'designed' to look like they were 'from a friend' - complaints Security upstart claims it's found a file-gobbling nasty with weak encryption Computer scientists have shown how it might be possible

ZeroAccess criminals wave white flag: The impact of partnerships on cybercrime

The following is a post from Richard Domingues Boscovich, Assistant General Counsel, Microsoft Digital Crimes Unit.Two weeks after Microsoft filed its civil case in the U.S. District Court for the Western District of Texas against the notorious Sirefef botnet, also known ZeroAccess, I am pleased to report that our disruption effort has been successful, and it appears that the criminals have abandoned their botnet.

How a Hacker Compromised a Server in Under Four Hours

In September 2013, we ran a live server exploitation exercise to see how long an unpatched and minimally configured cloud server instance could survive against financially motivated attackers when connected directly to the Internet. The exercise, referred to as The Gauntlet throughout the capture-the-flag-style contest, ran for 23 days across a collection of Microsoft Windows and Linux-based servers with varying combinations of applications and application frameworks installed.

Stock exchanges of the world band together to repel cyber attacks

The World Federation of Exchanges (WFE) announced the launch of the exchange industry’s first cyber security committee. The committee is tasked to combat systemic cyber abuse against world capital markets.

Microsoft's long-standing commitment to children's online safety

Today, social networking, mobile computing, and the realization that 21st century skills are a key ingredient to children’s success, make protecting kids online that much more significant, nearly a generation later. Last month in Brussels, Forum Europe held its second annual European Child Safety Online Conference to examine European and global cooperation toward a safer and better Internet for kids.

FOX News Explaining GitHub is the Funniest Thing You’ll See Today

Fox News, the unmitigated authority in open source technology, gave its viewers the gift of knowledge yesterday with its explanation of GitHub. Thanks Fox News!

Data of 42 MILLION seekers for love plundered from Aussie dating site

Assisting IT directors and managers in creating and implementing the most effective cloud-based disaster recovery strategy for their organization.Implementing the tactics laid out in this whitepaper can help reduce your overall advertising network latency.While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?The cost of downtime to your business is higher than it ever has been. RaaS is designed for the recovery of full applications so you’re up and running faster after a declaration.

Facebook sues alleged Justin Bieber and Selena Gomez sex tape spammer

Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats. Don't show me this againHi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats. Don't show me this againDon't forget you can subscribe to the SophosLabs YouTube channel to find all our latest videos. Don't show me this againHi there! If you're new here, you might want to subscribe to our RSS feed for updates. Don't show me this againAlready using Google+?

Edward Snowden NSA Scandal: Indonesia Halts Military Cooperation over Australian Spying

PM Tony Abbott and Indonesia's President Susilo Bambang Yudhoyono are embroiled in a diplomatic row over Australia’s spying activities revealed by Edward Snowden (Reuters)Indonesia has suspended military and intelligence cooperation with Australia in an escalating diplomatic row sparked by reports that Canberra spied on President Susilo Bambang Yudhoyono.Yudhoyono ordered Indonesian security forces to halt joint military exercises, intelligence exchange and anti-people-smuggling operations with Australia until Canberra provided an official response to allegations that his phone, that of

Meet The 'Assassination Market' Creator Who's Crowdfunding Murder With Bitcoins

As Bitcoin becomes an increasingly popular form of digital cash, the cryptocurrency is being accepted in exchange for everything from socks to sushi to heroin.

Loyaltybuild: Hackers Steal Card Details

Hackers have stolen the full card details of at least 376,000 people in a cyberattack on Irish marketing company Loyaltybuild. Loyaltybuild runs reward schemes for companies across Europe, including one for the Irish supermarket chain SuperValu. Some 70,000 SuperValu customers have had their full card details stolen, confirmed ...

Spy-Proofing: Deutsche Telekom Pushes for All-German Internet

Recent revelations about NSA spying have given fresh impetus to the dream of a purely German Internet. Deutsche Telekom believes it could introduce a system safe from prying foreign surveillance, but some criticize the plan as pointless.Even before it emerged that the National Security Agency had wiretapped her ...

Smart TVs not so smart when it comes to security, privacy

A hacker in your living room: researchers have shown how internet-connected TVs can be remotely manipulated. Smart TVs are bringing smartphone-like features to the telly, but their makers aren\\'t quite baking-in the same security that Apple and Google have in their mobile platforms.Stick an embedded computer, operating system,

Facebook makes Adobe fans change their horrible, horrible passwords

Facebook has scanned millions of email address and password pairs hackers dumped online from Adobe\\'s user account database – so that it can force its social networkers to change their passwords if they used the same logins details for both websites.In early October, Adobe warned of \\'sophisticated attacks\\' ...

Hackers probe HTTPS weaknesses

(Editors note: In this guest essay, Rohit Sethi, Vice President of consultancy Security Compass, examines the implications of HTTPS, the protocol for secure network communications, coming under attack.)HTTPS is vulnerable to attack, and we can expect the situation to worsen over time. In two to five years, serious ...

Adobe hack grows into massive security breach

Digital security firm LastPass announced Thursday that it had discovered passwords, email addresses and other data linked to Adobe Systems (ADBE) customer accounts on websites used by hackers.LastPass says was able to identify user data from a staggering 152 million Adobe accounts. That would contradict Adobe’s claim -- ...