Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Countdown to chaos: Top 10 security stories of 2013

1 of 10 NEXT PREV
  • a01lockscreen-v1.jpg

    We're just halfway through 2013, and we've already had some major security issues that affected both our privacy and our productivity. Things are getting serious. We've gone well past the hacking-for-fun stage, and now it's all about information gathering.

    Here are the 10 most-read security articles of 2013, from bad to worse. Hold onto your tin hats, as we're sure to experience more cyberthreats for the rest of the year.

    First up:

    10. Apple iOS 6.1.3 fix contains another lock screen bypass flaw

    An Apple iOS software fix was designed to repair a nasty bug that let unauthorized users bypass the lock screen for iPhones and iPads — and access user data. Good idea, except it contained yet another major flaw.

    Published: July 2, 2013 -- 20:26 GMT (13:26 PDT)

    Caption by: Andy Smith

  • 9. Mega users: If you're hacked once, you're hacked for life

    9. Mega users: If you're hacked once, you're hacked for life

    Pessimists, or perhaps realists, in the security industry say that being hacked is a matter of when, not if. But if you're a user of Kim Dotcom's Mega site, do whatever you can to make sure you're never hacked, because you can't change your password and you can't delete your account.

    Published: July 2, 2013 -- 20:26 GMT (13:26 PDT)

    Photo by: Mega

    Caption by: Andy Smith

  • 8. Hacker, activist Aaron Swartz commits suicide

    8. Hacker, activist Aaron Swartz commits suicide

    Aaron Swartz, Reddit co-founder, was dedicated to sharing data and information online. He worked tirelessly to develop and popularize standards for free and open information sharing.

    Published: July 2, 2013 -- 20:26 GMT (13:26 PDT)

    Photo by: Wikimedia Commons

    Caption by: Andy Smith

  • 7. The real story in the NSA scandal is the collapse of journalism

    7. The real story in the NSA scandal is the collapse of journalism

    If the NSA scandal, which exposed the US government for spying on its citizens, wasn't enough, media sources trying to pin down the big scoop couldn't get the story straight. Details, details.

    Published: July 2, 2013 -- 20:26 GMT (13:26 PDT)

    Caption by: Andy Smith

  • 6. CISPA passes U.S. House: Death of the Fourth Amendment?

    6. CISPA passes U.S. House: Death of the Fourth Amendment?

    The Cyber Intelligence Sharing and Protection Act would allow private-sector firms to search personal and sensitive user data of ordinary U.S. residents to identify "threat information", which can then be shared with other opt-in firms and the U.S. government — without the need for a court-ordered warrant.

    Described as "misguided" and "fatally flawed" by the two largest US privacy groups, CISPA is considered a threat to the online privacy of ordinary US residents.

    Related story:

    • What is CISPA, and what does it mean for you? FAQ

    Published: July 2, 2013 -- 20:26 GMT (13:26 PDT)

    Caption by: Andy Smith

  • 5. Homeland Security warns to disable Java amid zero-day flaw

    5. Homeland Security warns to disable Java amid zero-day flaw

    The US Department of Homeland Security was the latest body to warn users to disable Java software amid escalating concerns over a serious, exploitable vulnerability.

    Published: July 2, 2013 -- 20:26 GMT (13:26 PDT)

    Photo by: Alienvault Labs

    Caption by: Andy Smith

  • 4. Anonymous posts over 4,000 U.S. bank executive credentials

    4. Anonymous posts over 4,000 U.S. bank executive credentials

    Anonymous appears to have published login and private information from over 4,000 American bank executive credentials its Operation Last Resort, demanding US computer crime law reform.

    Published: July 2, 2013 -- 20:26 GMT (13:26 PDT)

    Photo by: Anonymous

    Caption by: Andy Smith

  • 3. How to disable Java in your browser on Windows, Mac

    3. How to disable Java in your browser on Windows, Mac

    Amid a serious security flaw in the latest version of Java 7, there's one way to make sure it doesn't affect you. Disable it.

    Oracle released an emergency fix for Java over the weekend. However, security professionals say that this measure doesn't go far enough.

    Related story:

    • Security experts on Java: Fixing zero-day exploit could take 'two years'

    Published: July 2, 2013 -- 20:26 GMT (13:26 PDT)

    Photo by: Screenshot by ZDNet

    Caption by: Andy Smith

  • 2. Anger mounts after Facebook's 'shadow profiles' leak in bug

    2. Anger mounts after Facebook's 'shadow profiles' leak in bug

    Facebook said it fixed a bug that exposed contact info for over 6 million accounts. The admission revealed its "shadow profile" data collection activities, and users are furious.

    Published: July 2, 2013 -- 20:26 GMT (13:26 PDT)

    Caption by: Andy Smith

  • 1. Feds stumbling after Anonymous launches 'Operation Last Resort'

    1. Feds stumbling after Anonymous launches 'Operation Last Resort'

    Hacktivist group Anonymous took control of the U.S. Sentencing Commission website Friday, January 25, in a new campaign called "Operation Last Resort".

    Published: July 2, 2013 -- 20:26 GMT (13:26 PDT)

    Photo by: Anonymous

    Caption by: Andy Smith

1 of 10 NEXT PREV
Andy Smith

By Andy Smith | July 2, 2013 -- 20:26 GMT (13:26 PDT) | Topic: Security

  • a01lockscreen-v1.jpg
  • 9. Mega users: If you're hacked once, you're hacked for life
  • 8. Hacker, activist Aaron Swartz commits suicide
  • 7. The real story in the NSA scandal is the collapse of journalism
  • 6. CISPA passes U.S. House: Death of the Fourth Amendment?
  • 5. Homeland Security warns to disable Java amid zero-day flaw
  • 4. Anonymous posts over 4,000 U.S. bank executive credentials
  • 3. How to disable Java in your browser on Windows, Mac
  • 2. Anger mounts after Facebook's 'shadow profiles' leak in bug
  • 1. Feds stumbling after Anonymous launches 'Operation Last Resort'

Hold onto your tin hats as we're sure to experience even more cyber-threats for the rest of the year

Read More Read Less

We're just halfway through 2013, and we've already had some major security issues that affected both our privacy and our productivity. Things are getting serious. We've gone well past the hacking-for-fun stage, and now it's all about information gathering.

Here are the 10 most-read security articles of 2013, from bad to worse. Hold onto your tin hats, as we're sure to experience more cyberthreats for the rest of the year.

First up:

10. Apple iOS 6.1.3 fix contains another lock screen bypass flaw

An Apple iOS software fix was designed to repair a nasty bug that let unauthorized users bypass the lock screen for iPhones and iPads — and access user data. Good idea, except it contained yet another major flaw.

Published: July 2, 2013 -- 20:26 GMT (13:26 PDT)

Caption by: Andy Smith

1 of 10 NEXT PREV

Related Topics:

Security iPad Security TV Data Management CXO Data Centers
Andy Smith

By Andy Smith | July 2, 2013 -- 20:26 GMT (13:26 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • OnlyKey hardware security key

    This is the ultimate security key for professionals.

  • SoloKeys Solo V2

    Durable, fully reversible connectors, encapsulated in epoxy resin, and with updatable firmware.

  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums