SECURITY

Citigroup - New York

Citi Credit Card Breach Risk Was Anticipated

Citigroup does not know how the computer breach revealed Thursday which affected hundreds of thousands of its credit card customers took place, but such an event fell in line with a risk the company outlined to shareholders in its publicly available annual report in March.
Citigroup confirms security breach

Hackers reign; Citigroup confirms security breach

Citigroup confirmed a security breach at Citi Account Online, which was discovered by the authorities recently during a routine monitoring. The names, account numbers and contact information, including email addresses of the customers have been compromised. More critical information like date of birth, social security numbers, card expiration date and card security code (CVV) have not been accessed by the hackers, Citi said.
More news
iCloud Banner at Apple WWDC, San Francisco

Apple iCloud debut, questions remain unanswered

The newly announced iCloud is puffing up the expectation for mroe popular and user-friendly cloud service. For those of us who may not see the loopholes, here are some questions that remain unanswered. You may want to consider before jumping into iCloud, and answer for me if possible.
Steve Jobs talks about the iCloud service at the Apple Worldwide Developers Conference in San Francisco

Will iCloud be the next target of hackers?

Are you sure you want to entrust your digital assets to the cloud? You may want to ask the hackers, who have dominated the news with their successes in hacking Sony, Amazon and Google.
Sony Hacked by LulzSec, May Play Cat and Mouse Following Apple

FBI moles run illegal sites that deal in hackers' loot of sensitive data

The hackers' world is one of immense intrigue; betrayal looms large ahead of them at every turn and nasty surprises are what they deal with every day. And then, they cohabit with the strangest partners, the law enforcement machinery. For some, the governments offer protection against the pirates, hackers and cyber criminals of all hues, while for others, it's the government machinery that is in the dock - for invasive control over every movement, even the thought processes of all people.
IBTimes Logo

China PLA officers call Internet key battleground

China must make mastering cyber-warfare a military priority as the Internet becomes the crucial battleground for opinion and intelligence, two military officers said on Friday, two days after Google revealed hacking attacks that it said came from China.
A woman walks past the logo of Google

China blamed for Gmail hack attack; cyber warfare in focus

A cyber attack that originated from the Chinese city of Jinan that selectively targeted key government officials in the U.S. and its allies has focused uneasy limelight on China, even as the western governments are tinkering with their military rule books to call cyber attacks 'acts of war'.
IBTimes Logo

How US targets can be saved from hackers?

Ever wondered how to remain anonymous or circumvent internet censorship while dealing with sensitive issues online? Electronic Frontier Foundation, patron of online civil liberties, has launched the Tor Challenge, a project aimed at protecting the anonymity of internet users.

Pages

IBT Spotlight

We Help Businesses Find B2B Service Providers They Can Trust.