target

Wed
03
May
John Lister's picture

Facebook Rejects Claims of 'Mood-Based Advertising'

Facebook is rejecting claims that it let advertisers target users based on their current mood. It says research into the technology was carried out, but not used for advertising. "The Australian" newspaper report was based on leaked internal data ... that says Facebook could figure out mood swings based on combined data from user posts and pictures, the interactions they had with other users, and other activity on the site. Some of the moods which Facebook could reportedly discover included feeling anxious, defeated, nervous, overwhelmed, silly, stressed, stupid, useless or a failure. ... (view more)

Mon
25
Aug
Brandon Dimmel's picture

'Backoff' Malware a Huge Problem, Report Suggests

A new report suggests that roughly one thousand American businesses have been victimized by 'Backoff', a form of malware that exposes customers' most sensitive information, including credit card data. Backoff made headlines late last year when ... retail giant Target was hit , exposing credit card data of roughly forty million customers. Now, the National Cybersecurity and Communications Center (NCCIC) and U.S. Secret Service are suggesting that many more businesses have been exposed by the same malware. If an infection occurs, the Backoff malware is capable of recording keystrokes ... (view more)

Wed
21
May
John Lister's picture

Password Study: Most Sites Inadequate On Security

A new study reviewed security among leading online companies following the Heartbleed bug scare, in which a commonly used encryption technique for secure websites had the capability to expose highly confidential data. The study comes from Dashlane, ... a password management firm. The study evaluated 80 web sites and examined 6 factors with regard to the way passwords and login processes are handled. Using these details, Dashlane ranked each site between +100 and minus -100. Based on a range of security issues, the study suggests Apple and Microsoft have the securest policies for passwords, while ... (view more)

Fri
14
Mar
John Lister's picture

Report: Target Warned, but Ignored Credit Card Hack

A major financial news outlet has accused Target of missing clear warning signals that it was being hacked and customer data put at risk. Target is the second largest discount retailer in the United States, next to Walmart. In December 2013, Target ... confirmed that hackers had stolen credit card data from 40 million customers. The attack happened approximately 19 days after American Thanksgiving (November 28, 2013). The theft not only affected customers who had used credit cards online, but in stores as well. According to Bloomberg Businessweek, Target had already set up a security center in ... (view more)

Mon
23
Dec
Dennis Faas's picture

Massive Target Hack: What You Need to Know

Target, a popular US discount retail outlet, has confirmed that cyber-thieves have stolen debit and credit card data from 40 million people who've shopped at the store since Thanksgiving. The store is still investigating whether it was the work of ... hackers or an inside job. The information stolen covers 19 of the busiest shopping days of the year. One security expert noted that the potential haul of stolen data covers one in seven of all the credit cards in the United States. (Source: today.com ) Target learned of the attacks when credit card firms reported a dramatic increase in ... (view more)

Mon
25
Nov
Dennis Faas's picture

Phone Scam Resembles CryptoLocker Ransomware

The new 'CryptoLocker' ransomware scam has been causing havoc online for the past few weeks. But you should also be aware of a similar scam being carried out over the phone instead of through emails. Here's how the scam works: first, targets get an ... unexpected call from an unknown caller located within their area code. If the call is answered, the caller tells the target that they're from a reputable tech firm, such as Microsoft or Dell or even a security company like McAfee or Sophos. Usually the caller claims to be "working with" (rather than for) the named firm, often in the tech support ... (view more)

Mon
24
Oct
Dennis Faas's picture

Researchers Warn of New Stuxnet Worm

A security company says a newly discovered piece of malicious software ("malware") appears to be heavily based on the Stuxnet worm. Stuxnet, was (as of last year) dubbed the most threatening malware ever created . However, the new version of this ... worm appears to be designed for intelligence gathering to make a future attack easier, rather than causing damage. Stuxnet Virus Attacks Nuclear Reactors Stuxnet was one of the most sophisticated viruses in recent years. Although it spread around the world and infected Windows PCs, its main target was industrial control systems in Iran. ... (view more)

Fri
17
Dec
Dennis Faas's picture

'Fax Bombs' Used Against Wikileaks Foes

Internet activists that stand behind " Operation Payback " have waged war on corporations deemed enemies of the Wikileaks web site, the non-profit organization that publishes otherwise unavailable documents from anonymous news sources and leaks. ... Distributed Denial of Service Attacks Flood Targets What began as a vengeful campaign intended to target opponents of Internet piracy, Operation Payback utilizes distributed denial of service (DDoS) attacks against their enemies. In short, a DDoS attack occurs when many computers band together to flood a target computer (usually a web server) with ... (view more)

Fri
03
Oct
Dennis Faas's picture

'Windows Sound Mixer', and 'Open Target Folder Option'

Windows Sound Mixer This exciting program allows a user to control their Windows volume using a cool skinned interface that supports multiple audio cards, volume, nalance (pan), mute and other audio features. http://www.vegantech.bravehost.com Open ... Target Folder Option At times we need to open the target folder location of a shortcut, right? In Windows Vista you just need to right-click and choose "Open file location", but in-case you're using Windows XP you'll need to try something else altogether. This guide helps you figure out how. http://www.megaleecher.net Today's fresh ... (view more)

Tue
08
Jun
Dennis Faas's picture

Infopackets web server attacked (DDoS)

Dear Infopackets Reader s, Over the weekend, our web server was attacked by hacker(s). Although security was not compromised, the attack resulted in the web server being temporarily shut down until my hosting company could safely implement a data ... mitigation filter to deflect the attack. In a nutshell, the attackers sent a flood of information to the web server and caused it to "choke" on incoming requests. Because the attack originated from multiple IP addresses (I.E.: from more than one computer), this type of attack is referred to as a DDoS attack (or, Distributed Denial of ... (view more)

Subscribe to RSS - target