Tag Archive for: Casts

Discovery casts dark shadow on computer security

  1. Discovery casts dark shadow on computer security  EurekAlert (press release)
  2. Spectre-Like Flaw Undermines Intel Processors’ Most Secure Element  WIRED
  3. Protecting Our Customers through the Lifecycle of Security Threats | Intel Newsroom  Intel Newsroom
  4. L1TF (AKA Foreshadow) Explained in 3 Minutes from Red Hat  YouTube
  5. Beyond Spectre: Foreshadow, a new Intel security problem  ZDNet
  6. Full coverage

computer security news – read more

Yahoo data breach casts ‘cloud’ over Verizon deal – Washington Post


Washington Post

Yahoo data breach casts 'cloud' over Verizon deal
Washington Post
Yahoo on Thursday reported the largest data breach in history — affecting at least 500 million user accounts — months after first detecting signs of an intrusion that the company blamed on "state-sponsored" hackers. The web giant called on customers
Yahoo confirms huge data breach, affecting at least 500 million accountsCNBC
Yahoo hack is one of the largest security breaches of the Internet ageThe Boston Globe
Yahoo says 500 million accounts stolenCNNMoney
USA TODAY –NPR –BGR –Recode
all 534 news articles »

“data breach” – Google News

Ethiopia spying case casts spotlight on cyber surveillance in US – Al Jazeera America


Al Jazeera America

Ethiopia spying case casts spotlight on cyber surveillance in US
Al Jazeera America
The suit alleges that FinSpy, an intrusion and surveillance program, was transmitted by a Microsoft Word document attachment sent to Kidane's computer via email by or on behalf of the Ethiopian government. It began targeting Kidane's machine in late …
American Fights Ethiopian Government's Illegal Use of Spyware in Court TuesdayEFF

all 3 news articles »

finspy – read more

Air Force Casts a Wide Net For Cyber Warfare Tools – Nextgov

Air Force Casts a Wide Net For Cyber Warfare Tools
Nextgov
“The objective of this effort is to overcome restricted competition barriers in subsequent acquisitions for cyber warfare systems supplies and services resulting from legacy security policies, practices, and guidance,” according to the document

cyber warfare – read more