Taiwanese PC manufacturer Acer is investigating a cyber hacker attack that stole customer data from its Packard Bell division in Europe, the company said.
Acer said the security breach was limited to customers’ names, addresses, phone numbers, emails, and system serial numbers. No credit card data was stolen, it said. Acer provided no other details about the breach, and said the investigation was ongoing.
News of the breach was reported several days ago, after a hacker group called Pakistan Cyber Army claimed to have stolen the personal data of about 40,000 people from an Acer server in Europe. Acer did not comment on the attack at the time.
The Hacker News had published screen shots of the personal data and some of the source code that was stolen in the security breach. It also said that the Pakistan Cyber Army would issue a press release detailing more about their motives. But so far, no new information has surfaced from the hacking group.
Read More….
Tags: 3DES, Acer, addresses, applications, CIPHER, code, Computers, credit card data, criminals, cyber, cybercriminals, data, data breach, DOB, emails, europe, Hacker News, hacking, hacking group, hardware, India, Indian, investigations, manufacturer, messages, names, Packard Bell, Pakistan, Pakistan Cyber Army, Pakistani sites, personal data, phone numbers, publications, screen shots, Security, serial numbers, servers, Software, source code, stolen data, systems, Taiwan, technology, vandals, websites
Microsoft is adding support for NFC (near field communication) to its Windows Phone mobile operating system, according to a report on Bloomberg Businessweek. NFC technology is a key component to the upcoming mobile payment and mobile wallet systems now reportedly under development at Google, RIM and Apple as well as the new carrier-led initiative Isis, a coalition of three of the four major cellular providers here in the U.S.
Support for NFC technology in Windows Phone 7 will be pushed out in an update to Microsoft’s mobile operating system, sources told Bloomberg reporters. Those updates may arrive sometime this year.
Bloomberg says that the addition of NFC is an effort to close the gap between Microsoft and Google, the latter which is currently the leading smartphone platform here in the U.S., and, according to at least one analyst firm, worldwide.
Google’s Android mobile operating system added in NFC support in the release code-named Gingerbread (Android 2.3) and has incrementally added new capabilities since then to broaden its feature set. In February 2011, for example, an update delivered the ability to both read and write to standard NFC tags, whereas before the NFC support was read-only.
Read more…
Tags: American Express, analysts, android, Android 2.3., banking, Bloomberg, carriers, Citigroup, code, data exchange, data flow, devices, features, financial institutions, functionality, Gingerbread, Google, handsets, hardware, Mastercard, Microsoft, mobile payments, mobile technology, Near Field Communications, NFC markets, NFC tags, Nokia, operating systems, OS, partners, payments, payments industry, phones, Q1 2012, read-only, Security, smartphones, Software, Symbian, Symbian-based, systems, technology, telecoms, upgrades, VISA, Windows Phone 7, Wireless, wireless networks, worldwide, WP7
Hackers have found a way to exploit Adobe Flash Player by using a zero-day vulnerability by using Microsoft Excel documents that was confirmed by Adobe yesterday. Adobe representatives that they will not be able to patch Flash until next week. Therefore, if you use Flash you are on your own until next week. Read More….
Tags: Adobe Flash exploit, advantages of using a consultant, android, Android 2.2.2, Android Market Place, Android Market Security Tool, Apache License, apps, best Internet Phone Service, CA, Cellular, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, China, cloud computing, Cloud Computing Chicago, code, command-and-control server, computer consultant, Computer Consultants, Computer Help Desk, Computer Install, computer network services, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, CVE-2011-0609, cybercriminals, data centers, Desktop Services, devices, DroidDream, email services, exploid, Freemont, Google, Hackers, handsets, hardware, Help Desk Services, hosted exchange, IMEI, IMSI, infected devices, International Mobile Equipment Identity, International Mobile Subscriber Identity, IT Audits, IT Outsourcing, IT support services, linksys routers, malicious code, malware, managed IT services, Microsoft Excel Exploited, mobile OS, mobiles, Network Design, network management, Network Optimization, Network routers, Network Services, network solutions, network support services, online data backup, operating systems, owners, patches, PC repairs, phones, projects, rageagainstthecage, Routers, Security, security specialists, security tools, Server Management, servers, SIM cards, SMS, Software, stolen information, Symantec, technical support, technology, Telcom Audits, telephone auditing review, text messaging, The Syber Group, third-party applications, tools, USA, users, vendors, version, Virtual Computers, Virtual Machine, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, Windows Technician, Wireless Internet, Zero Day
It is being reported that hackers have been able to exploit holes in Windows and Microsoft new of the issue since January of 2011.
The exploit deals with the Windows protocol handler in Windows for MHTML. Be advised the exploit can only be done if the user is running Internet Explorer. Apparently, hackers are using cross-site scripting attacks are intercepting and collecting peoples information, spoofing the content that is displayed to the browser, or interfering with the user’s browsing activities. Read More….
Tags: 4Chan, account numbers, address, advantages of using a consultant, anti-virus, applications, attacks, backdoor, best Internet Phone Service, beta, Blog site, Brooklyn, browsers, bug, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, code, commands, computer, computer consultant, Computer Consultants, Computer Help Desk, Computer Install, computer network services, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, cross-site scripting, CSS, data, data centers, DEP, Desktop Services, download, Email, email services, FedComp, format, Gawker sites Hacked, Hackers, hacking, Help Desk Services, hosted exchange, IE, IE6, IE7, IE8, internet, Internet Explorer, Internet Explorer security issues, IT Audits, IT Outsourcing, IT support services, Laptop, link, linksys routers, machine, malware, managed IT services, MHTML, Microsoft, Network Design, network management, Network Optimization, Network routers, Network Services, network solutions, network support services, networks, online data backup, payments, PC repairs, PC's, processor, production servers, prosecution, Routers, Security Issues Windows, sell, Server Management, servers, site, Software, Spam, Symantec, systems, technical support, Telcom Audits, telephone auditing review, test computers, test system, The Syber Group, US Secret Service, Virtual Computers, Virtual Machine, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, website, Windows, Windows Technician, Wireless Internet
Security firm fighting the dreadful Conflicker worm claim that they have it on the ropes. The team of computer-security researchers said they managed to neutralize the worm’s impact by blocking its ability to communicate with its developer, who is still anonymous.
Unfortunately after years of trying fighting the Conflicker, security experts estimate the worm infects between five million to fifteen million computers. The Conficker worm, showed up in 2008. The worms intent is to disable a computer’s security measures, including Windows software updates and antivirus protection, leaving machines vulnerable to more malicious software. Read more….
Tags: 60606, antivirus, antivirus software, applications, attacker, attackers, backdoor, bandwidth, best Internet Phone Service, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, code, component, Computer Consultants, Computer Help Desk, Computer Install, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, Conflicker Worm, Conflicker Worm still infecting computers, control center, critical data, data centers, databases, detection, developed, dll, email services, emails, encryption, espionage, Explorer, explorer.exe, extensions, files, FTP, GET, Google, Hackers, Help Desk Services, information, internet, IT Audits, IT Outsourcing, malware, monitor phone calls, netconf32.dll, Network, networks, number recognition, Operating System, operating systems, OS, overlay, PC repairs, PC's, PDF, phones, private, processes, remote server, researchers, screenshots, Security, sensitive data, server, settings, spying, stolen data, system32, Telcom Audits, threats, transmit data, Trojan horse, Trojan.Spy.Yek, upload data, users, Virtual Computers, Virtualization, VoIP MPLS, Windows, Windows 7, Windows 95, Windows Technician, Wireless Internet
« Previous Page