CNET

About CNET

This author has not yet filled in any details.
So far CNET has created 186 blog entries.

Russians Suspected Behind Ukrainian Black Out – First Confirmed Cyberattack On Power Grid

SAN FRANCISCO - Investigators have determined that a massive power outage in Ukraine last month was performed by hackers targeting the electricity grid with malware. Security researchers say it is the first known instance of a blackout being credibly linked to the actions of malicious hackers, although hackers have been suspected of being involved in

By |2016-01-08T11:19:30-05:00January 8th, 2016|Cyber Defense, Featured|

Microsoft Provides eMail, File-Storage Clients With Heads Up For State-Sponsored Hack

SAN FRANCISCO - If you're using Microsoft's online email and file-storage services, you'll now get a special heads-up if your accounts are hit by state-sponsored hackers, a warning that you should take additional steps to secure your accounts. The world's biggest software company had already been telling people using Outlook.com email and OneDrive storage if

By |2016-01-04T20:27:29-05:00January 4th, 2016|Cyber Defense|

Hello Barbie Doll Toy Vulnerable To Hackers

SAN FRANCISCO - Hello, Barbie. Can we talk? Security researchers are worried about your safety. New data released Friday by security firm Bluebox reveals even more vulnerabilities in Hello Barbie, the $75 Internet-connected doll from Mattel. Researchers found the application and the cloud server that connect the doll to the Internet would allow attackers to

By |2015-12-05T09:34:32-05:00December 5th, 2015|Cyber Defense, Featured|

Internet-Connected Toys Pose Cybersecurity Risk For Christmas

SAN FRANCISCO - Better watch out if you buy an Internet-connected toy this Christmas. Hackers could use it to breach your account. One intruder breached more than 11 million accounts tied to a toy from VTech called Learning Lodge, uncovering the names, birthdays and genders of more than 6.3 million children and scooping up their

By |2015-12-03T18:14:16-05:00December 3rd, 2015|Cyber Defense|

With Projected 400,000 Drones Sold For Xmas, FAA Set For Rules Crackdown

SAN FRANCISCO - In 2015, as drones started swarming the skies, the small unmanned aircraft  transformed from novelty gadget to regulatory headache. Drones, most often camera-equipped quadcopters whose four computer-controlled rotors keep them aloft, are hot items as consumers snap them up and businesses put them to use. While the Federal Aviation Administration bans businesses

By |2015-12-03T18:14:17-05:00December 3rd, 2015|Drones|

ISIS Calls Anonymous ‘Idiots,’ Offers Tips To Elude Hackers

PARIS, France - ISIS, the Islamic militant group that claimed responsibility for the deadly Paris attacks, appears unfazed by threats of cyberattacks from hacking collective Anonymous. In a message circulated via encrypted messaging app Telegram, an account allegedly linked to ISIS called Anonymous "idiots" and offered tips to avoid being hacked by the group. The

By |2015-11-20T12:45:21-05:00November 19th, 2015|Cyber Defense|

Amazon Offers Two-factor Authentication To Access Your Account

SEATTLE - You can now add an extra level of security to your Amazon account. Amazon is offering a new security option called two-factor authentication, The Verge noticed on Wednesday. The Seattle-based online retail giant made no official announcement and did not immediately respond to CNET's request for confirmation and comment. But the option can

By |2015-11-19T16:29:12-05:00November 19th, 2015|Cyber Defense|

Google “About Me” Page Gives More Control Over Personal Info

MOUNTAIN VIEW, Ca. - Worried about the personal information Google is sharing about you online? A new page gives you the ability to better control that information. Rolled out earlier this week, the new "About me" page shows your social media pages, personal details such as your birthday and a link to access your Google

By |2015-11-16T22:09:12-05:00November 16th, 2015|Cyber Defense|

In 2015, Hacking Had a Lot In Common With Horror Flicks

SAN FRANCISCO - 2015's hacks, exploits and breaches are the stuff of horror movies. Regardless of whether hackers targeted your computer or your online accounts, each attack has made our collective skin crawl. With tactics straight out of fright flicks, hackers imitated us and spilled our personal details. Not even our phones were safe; Android

By |2015-11-05T18:53:05-05:00November 5th, 2015|Cyber Defense|