hack

Craigslist taken offline by hacker

Craigslist taken offline by hacker

Craigslist is a site where people run ads for all sorts of items they want to sell, jobs, and a plethora of other strange listings and personals. Millions of folks use the site each month and if you frequent Craigslist and were unable to get on the site yesterday, it wasn't just you. Craigslist was hacked and the hacker was able to take the site down for many users.

Continue Reading

State Department unclassified email system shutdown for repairs

State Department unclassified email system shutdown for repairs

The US State Department has shut down its entire unclassified email system after a suspected hacker attack. The email system was shut down it give techs time to evaluate and repair any damage done by the hacking attack. The first word of the attack came Sunday from a State Department official who said that "activity of concern" had been noticed on the email network around the same time as a similar incident targeting computers at the White House was noticed.

Continue Reading

Apple on Masque Attack: ‘just use the App Store’

Apple on Masque Attack: ‘just use the App Store’

Earlier this week, we told you about Masque Attack, which let hackers sideload apps onto your iDevices. Often without you even realizing it, an app was loaded, and scary people somewhere else could gain access to your information. The app loaded may not have even been the app you were looking for when you followed the link, either. Now, Apple has issued a response to the report. We gotta say, it’s about what you’d expect from Apple, and full of common sense, too.

Continue Reading

Windows Phone surprisingly survives HP Pwn2Own contest

Windows Phone surprisingly survives HP Pwn2Own contest

You can say what you want about Microsoft's mobile platform, but apparently, Windows Phone is a rather tough nut to crack. This revelation came on the second day of HP's Pwn2Own hacking contest, with this round targeting browsers of mobile devices. One contestant tried to gain control of the phone by attacking the browser but ultimately failed to break through the sandbox. That said, there was still some access gained, so Windows Phone didn't completely emerge unscathed, surviving with just some war wounds and probably a bit of pride.

Continue Reading

US Postal Service employee, customer details hacked

US Postal Service employee, customer details hacked

If you thought only retail chains like Home Depot and Target or commercial services like Apple's iCloud are the only victims of data breaches, better thinking again and rethink your outlook on personal information security. The US Postal Service has just disclosed that it was the target of a cybercrime that compromised personal information stored in its databases. But unlike other data breaches, this one actually didn't affect customers as much as it did the USPS' own employees, with attackers able to run off with critical pieces of information.

Continue Reading

Darkhotel hack targets hotel WiFi – but staying safe is easy

Darkhotel hack targets hotel WiFi – but staying safe is easy

A four year campaign to steal data from high-power targets like CEOs and R&D specialists has taken advantage of compromised hotel WiFi, a research firm claims today, taking advantage of overly trusting guests to strip as much information as possible. The so-called "Darkhotels" exploit focused on guests at luxury hotels, Kaspersky says, with hackers predominantly in the Asia Pacific region using fake software installers to open a backdoor into travelers' laptops. That backdoor is then used to load a full complement of tools that can be used to yank as much sensitive data as possible.

Continue Reading

New ‘Masque Attack’ iOS phishing vulnerability sideloads apps

New ‘Masque Attack’ iOS phishing vulnerability sideloads apps

On the heels of WireLurker, a new iOS threat has been discovered. This one, called Masque attack, could be a lot more problematic, too. While the previously discovered WireLurker vulnerability required users to be tethered to a Mac before anything nefarious could happen, Masque Attack is one that occurs in-app. Discovered by security research firm FireEye, Masque Attack could pose a much bigger risk to anyone using apps that didn’t come pre-loaded on their iPhone, iPod, or iPad.

Continue Reading

Home Depot hack gets worse; email addresses stolen, too

Home Depot hack gets worse; email addresses stolen, too

If you were wondering how The Home Depot was hacked, we’ve got the gritty details. The Atlanta-based home improvement store says they fell victim to the same vulnerability Target did: a third-party vendor. A vendor/partner of The Home Depot was hacked, and their password stolen. From there, hackers went after the bigger fish in Home Depot. Originally thought to have compromised roughly 56 million credit card numbers, it seems about 53 million email addresses were pinched as well.

Continue Reading

Apple blocks WireLurker iPhone malware apps

Apple blocks WireLurker iPhone malware apps

Apple has blocked the suspect apps behind the WireLurker malware discovered targeting iPhone users in China, effectively minimizing the likelihood of casual infections. The exploit made headlines yesterday for its supposed virulence, watching out for iOS devices being connected to compromised Macs and then grabbing data from them. According to Apple, however, the issue has already been addressed for the most part, while a little common-sense could prevent anyone still at risk from succumbing.

Continue Reading

Samsung clarifies Find My Mobile vulnerability

Samsung clarifies Find My Mobile vulnerability

Samsung has broken its silence regarding a reported security exploit that exists in its Find My Mobile service. That security hole could have potentially let hackers remotely lock, unlock, and ring a targeted device from Samsung's web service. Scary as that may sound, the OEM insists that not only would the hackers be limited to only those three actions, it would require a specific set of circumstances for the exploit to be used, which hopefully leaves majority of users unaffected and out of harm's way.

Continue Reading

1 2 3 4 5 Next