AUTHOR ARCHIVES

Results 11-20 of 71

Chinese-Made Inventory Scanners Allow Hackers to Track Shipments

July 11, 2014 FROM NEXTGOV arrow Malicious software has been found on tools at seven shipping and logistics companies across the globe that pulled the firms’ financial, customer and operational data into a Chinese botnet, MarketWatch reports. Cyber outfit TrapX first detected the malware in scanner software about six months ago while doing security testing for ...

Pro-Russian Hackers Mug Key Ukrainian Bank

July 7, 2014 FROM NEXTGOV arrow Hacktivist group Kiberberkut, sometimes called Cyber Berkut, accessed and published customer data from a major Ukrainian commercial bank co-owned by the head of the pro-government Dnipropetrovsk region. The attackers announced July 4 the breach of PrivatBank’s systems on Vkontakte, Russia’s rendition of Facebook. “The group explained in a statement that ...

Syrian Electronic Army Spreads False Rumors of Israel Nuclear Leak

July 7, 2014 FROM NEXTGOV arrow Pro-Assad hacktivists usurped the Israeli Army’s Twitter feed to post a potentially volatile message, on a day when scores of Gaza rockets pounded the area, the Jerusalem Post reports. A bogus tweet warned of a "Possible nuclear leak in the region after 2 rockets hit Dimona nuclear facility.” None of ...

Snoops Allegedly Accessed Astros Inside Trade Data

July 1, 2014 FROM NEXTGOV arrow The Houston Astros claim hackers compromised the team’s servers and posted online months of internal trade talks, the AP reports. The information gleaned included talks with Miami to trade 2012 top overall pick Carlos Correa and rookie George Springer for Marlins star slugger Giancarlo Stanton. Read the rest at ThreatWatch, ...

NIH Launches $20 Billion Governmentwide IT Procurement

May 12, 2014 FROM NEXTGOV arrow A new governmentwide contract worth up to $20 billion includes everything from fax machines to genetic sequencers to enterprise storage, according to solicitation documents. The Chief Information Officer-Commodities and Solutions -- or CIO-CS -- contract aims to support information technology across the federal government, particularly focusing on agencies involved in ...

New Website Helps Vets Find Jobs, Employers Search Resumes

April 23, 2014 FROM NEXTGOV arrow Myriad employment resources already available to veterans should be more manageable at a new website that also will host a database of resumes for employers seeking to hire vets, transitioning service members or their spouses. The Veterans Employment Center, announced Wednesday by First Lady Michelle Obama and Jill Biden, includes ...

Hackers Usurp Dad’s Xbox, Drone Strike Triathelete and Loot Call Center

April 11, 2014 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Suspicious drone strike takes out triathlete The owner of a remote-controlled helicopter, which fell and reportedly hit a runner competing in a race in Western Australia, said the device was hacked into. 5-year-old ...

Hackers Mine DVRs for Bitcoin, Raid Liquor Stores and Target Web TV Watchers

April 4, 2014 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Security camera DVRs make for stupid bitcoin miners Hackers have been infecting recording devices to steal processing power for making the virtual currency. Texas liquor chain waited a year and a half to ...

Hackers Seduce Psychiatrist, Rip Off Cali Drivers and Taint Porn Site

March 28, 2014 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Government psychologist, robbed of laptop by a prostitute, must undergo evaluation A Washington state therapist who neglected to immediately confess that a hooker stole a computer containing medical information on 652 state Department ...

Hackers Hammer Hackers, Infect Patient Records and Nick Apple IDs

March 21, 2014 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Data thieves are victims too Websites that sold payment card information stolen from the Target breach were themselves hacked by unknown attackers. Hackers infiltrate Electronic Arts site to steal customer Apple IDs Software ...