A software bug disrupted some Google searches for roughly eight hours early Tuesday, displaying multiple images of what appeared to be a car crash in Russia and sparking speculation that Google had been hacked.
The image displayed in response to many searches showed a badly mangled car near a sign that says "stop" in Russian. It wasn't clear if the image had been altered. It didn't appear on every search.
Popular iPhone and Android app Secret has been hacked in a controlled experiment, allowing security experts to get hold of data.
The app, which allows you to post statements anonymously to your friends and friends of friends was hacked by security researchers at Rhino Security Labs who were able to reveal the identities of posters using a flaw in the app's security.
Personal details, relating to half of South Korea's population, have been stolen by hackers, including full names, account names, passwords and resident registration numbers.
The hack was revealed after 16 people were arrested for stealing data from a number of online game and movie ticket sites. They are said to have set up targeted attacks on registration pages of the sites to siphon off the personal details.
Berlin privacy start-up ZenMate today announced it has expanded its online privacy tool to mobile.
The service, previously only available as a web-based Google Chrome plug-in, is now available to download on the Android and iOS platforms.
ZenMate allows users to hide their IP address by changing their virtual location to somewhere else in the world. The company said the mobile app is able to encrypt and secure all internet traffic on a user’s smartphone whatever their connection.
Background check records of 25,000 undercover investigators and other homeland security staff were exposed in the breach at US Investigations Services (USIS) this month, unnamed officials told Reuters Friday. USIS has said the incident had "all the markings of a state-sponsored attack." What agency officials have said about the incident--and what they haven't said about it--are raising questions about the breach's ultimate impact and about inadequate measures for ensuring that third-party government contractors properly secure classified data.