hack

Celebrity photo leak worsens as underage photos found

Celebrity photo leak worsens as underage photos found

The hacking of celebrity accounts and the theft of explicit photos of a number of female stars has become even more serious, with word that at least one of the women was underage when the leaked pictures were taken. Several sites hosting the photos - which have already prompted an official statement from Apple early today, about the role iCloud played in their theft - have been notified that, in some shots, Olympic gymnast McKayla Maroney was under the age of 18.

Continue Reading

Home Depot investigating potentially huge credit card hack

Home Depot investigating potentially huge credit card hack

Home Depot is investigating a potentially huge credit and debit card breach, with early signs that the scale of the stolen cards could well exceed the sizable Target hack of late 2013. Evidence of a new cache of fraudulently cloned cards began showing up today at black-market stores, with whispers from banks going on to be confirmed by Home Depot that something seemed awry.

Continue Reading

Keurig 2.0 DRM already cracked for coffee freedom

Keurig 2.0 DRM already cracked for coffee freedom

Keurig 2.0, also known as "Keurig tries to lock out rival pod-coffee suppliers by applying DRM to its new machines", has seemingly hit a stumbling block, with the lock-down system apparently already cracked by rival brands. The system, revealed back in May and a feature on Keurig's current range, borrows from the printer ink market in preventing brewers from working with unlicensed pods and instead forcing them to buy Keurig's "approved" supplies.

Continue Reading

PSN and Xbox Live hit by cyberattacks amid fake bomb threats

PSN and Xbox Live hit by cyberattacks amid fake bomb threats

Both Sony's PlayStation Network and Microsoft's Xbox Live gaming networks were brought down over the weekend by cyberattackers that also reportedly had a Sony executive's flights diverted after a fake bomb threat. What appeared to be a DDoS attack targeting the PSN on Sunday evolved into something significantly more serious, across both main online gaming services.

Continue Reading

Study shows humans may one day re-grow limbs

Study shows humans may one day re-grow limbs

The fact that lizards can re-grow limbs is pretty special. They can escape predators by not fighting for a tail, only to have a fully refurbished model in a few months’ time. That little trick may be coming to humans, too, if scientists have their way.

Continue Reading

Those TSA scanners were literally only good for seeing you naked

Those TSA scanners were literally only good for seeing you naked

The full-body X-ray scanners only retired last year amid long-standing concerns that they intruded on privacy by showing travelers naked were also riddled with security loopholes, new research claims. The TSA used the Rapiscan Secure 1000 scanner between 2009 and 2013 in airports across the US, but computer scientists have demonstrated that with a little preparation the machine could miss knives, guns, and even explosives from being smuggled onto planes.

Continue Reading

Spotify Serendipity shows simultaneous streaming

Spotify Serendipity shows simultaneous streaming

Spotify has never been afraid of a hack or two, and its latest - Serendipity - is all about the commonality of music. Handiwork of the streaming service's latest Media Artist in Residence, Kyle McDonald, Serendipity is a constantly scrolling, zooming map showing occasions where two Spotify users start listening to exactly the same song, at the same moment in time.

Continue Reading

UPS announces they’ve been hacked, customer data at risk

UPS announces they’ve been hacked, customer data at risk

Did your package arrive on time? If so, you can possibly thank UPS. If your identity was recently compromised, you might be able to thank them for that, too. A new report suggests UPS is looking into a possible data breach, just like the one we’ve seen several retailers suffer lately.

Continue Reading

Hacking mother nature: scientists are turning moths into drones

Hacking mother nature: scientists are turning moths into drones

Scientists are working on a method for controlling moths electronically. Yeah — moths. By attaching electrodes to the back of a moth, scientists hope to control its flight. Though the immediate use-case that comes to mind might be “trolling cats”, it seems there is much more sound reasoning for wanting an army of moth drones.

Continue Reading

Hackers nick info of 4.5 million from healthcare network

Hackers nick info of 4.5 million from healthcare network

You’d expect your information to be secure with a health provider — but you might be wrong. Community Health Systems (CHS) reports they’ve had roughly 4.5 million patients who have had their information compromised. Though personal data was obtained in the hack, no medical records were accessed.

Continue Reading

Meet Coco, the ‘weaponized’ WiFi-hacking cat

Meet Coco, the ‘weaponized’ WiFi-hacking cat

Hey, today is World Cat Day — did you know that? To celebrate (not really), one proud cat owner outfit his feline with a special collar, giving it the special power of hacking. Finding hackable WiFi passwords was the order of the day, done by using an age-old hack. Busy at work (you know, between naps and chasing birds, when it has time), the cat found that a lot of us aren’t well guarded, digitally speaking.

Continue Reading

CyberVor severity questioned as researchers capitalize on 1.2bn hack

CyberVor severity questioned as researchers capitalize on 1.2bn hack

Questions around the severity of the so-called 1.2 billion account hack are circulating, after the security company that identified the data harvesting continues to decline to name the sites involved, instead offering a paid service for sites to check if they'd been compromised. Hold Security revealed the existence of the CyberVor breach to the New York Times earlier this week, claiming that sites as significant as those of Fortune 500 members were "still vulnerable" to the exploit.

Continue Reading