article thumbnail

Top 10 Data Breaches of All Time

SecureWorld News

Millions of HBO subscribers in the eastern time zone were watching the film Falcon and the Snowman when their screens suddenly displayed this message instead of the movie: "Captain Midnight" hacked the HBO signal and beamed his gripes about pricing to the world for 4 1/2 minutes. Who attacked: no attacker. Records affected: 21.5

Data 96
article thumbnail

The Hacker Mind Podcast: Scanning the Internet

ForAllSecure

Traditional anti-malware research relies on customer systems but what if a particular malware wasn’t on the same platform as your solution software? éveillé from ESET joins The Hacker Mind podcast to talk about the challenges of building his own internet scanner to scan for elusive malware. Marc-Etienne M.Léveillé

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

However, if somewhere along the supply chain, a bad actor has access to the package and can inject their malware into the system, then some huge problems can can occur. From a 1953 health class film, here are some basic tips to avoid spreading the measles. Vamosi: This is bad. Vamosi: He’s right. And I said, Are you serious?

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

However, if somewhere along the supply chain, a bad actor has access to the package and can inject their malware into the system, then some huge problems can can occur. From a 1953 health class film, here are some basic tips to avoid spreading the measles. Vamosi: This is bad. Vamosi: He’s right. And I said, Are you serious?

article thumbnail

The Sony Hack in Context

CTOvision

Criteria might include such things as double authentication, end point security, heuristic malware detection technology etc. Political Manipulation. Warfare, as we all know, is the pursuit of political objectives by military force. the threats posed by phishing, corrupt attachments and malicious websites).