hack

Macs older than 1 year may be vulnerable to security exploit

Macs older than 1 year may be vulnerable to security exploit

A security researcher has just, reportedly, found a way to gain control of Macs using OS X. The exploits allow attackers to remotely overwrite firmware responsible for booting up the device. Once attackers isolate the flaw in a targeted machine, they could control the computer as soon as it boots up. The specific exploit discovered by Pedro Vilaca is explained in detail in an article on his blog. This attack can give a user continuous, low-level control of a Mac without any initial physical access; therefore, hackers from the other side of the globe can exploit your system.

Continue Reading

IRS on hack: all signs point to Russia

IRS on hack: all signs point to Russia

Earlier this week, it was reported that the IRS had been hacked and the tax returns for more than 100,000 people were swiped. That reality has not changed, but now there’s a potential culprit: Russian hackers. The news was stated by Illinois Rep. Peter Roskam, who serves as the chairman of a House subcommittee that oversees the IRS. The news itself reportedly was given to him by IRS Commissioner John Koskinen, who relayed the breach’s Russian origins in a phone call.

Continue Reading

Plane hacker admitted in-flight engine takeover says FBI

Plane hacker admitted in-flight engine takeover says FBI

While we were all busy arguing whether our cellphones could affect planes, one security researcher was busily hacking into aircraft and potentially gaining access to engine control. An ill-advised tweet got infosec specialist Chris Roberts barred from a United flight last month, after he joked about tinkering with aircraft systems like passenger emergency oxygen control. Turns out, so documentation submitted by the FBI reveals, Roberts' abilities were even greater, to the point of momentarily controlling engine thrust.

Continue Reading

Apple Watch OS hacked to run web browser

Apple Watch OS hacked to run web browser

Remember back in September during the debut of the Apple Watch when one of the company's bigwigs was on stage and talked about how pinch-to-zoom and scrolling on a tiny touchscreen was a terrible way to interact with a device on your wrist? Well, never take anyone's word for it, be like developer/jailbreaker Comex and try to experience first-hand just how awful it can be. Ok, joking aside, it is a bit impressive that this soon after release, Watch OS has been hacked to run a web browser, displaying the Google homepage on the smartwatch's screen.

Continue Reading

Hack lets your control GTA V phone with your iPhone

Hack lets your control GTA V phone with your iPhone

Despite the prevalence of smartphones, few consoles and console games take advantage of this "second screen" available at our fingertips. Some games even have in-game phones that point to the fact, but don't always tie into the real world. While some games actually do use your mobile device as an extension of your game, GTA V isn't one of those. Well, at least not without this latest, still unpublished, hack. YouTube user " DIY Projects Planetleak" published a video showing how he controlled the game's in-game phone using, well, his iPhone.

Continue Reading

Microsoft’s voice assistant Cortana ported to Android by hackers

Microsoft’s voice assistant Cortana ported to Android by hackers

Apple may have been the first to bring a voice-powered digital assistant to smartphones with Siri, but Microsoft followed up in a big way with its own Cortana. Named after the AI companion from the Halo video game series, Cortana has been available on a number of Windows Phone models, and is expected to play a big part in the forthcoming Windows 10. Obviously, being a Microsoft creation, Cortana has been limited to Windows devices. That is, until a couple of hackers managed to bring her to Android.

Continue Reading

Verizon: Fear lazy IT staff not smartphone security

Verizon: Fear lazy IT staff not smartphone security

Many of the companies and organizations you trust your personal data to are storing it on unpatched and unprotected servers, Verizon has concluded, with carelessness a key contributor to data breaches. In fact, laziness in applying long-released security patches remains a primary weakness, the company's 2015 report discovered. However while mobile security has become a key talking point by Apple, Google, and others, each pitching their platform as the safest for users, the stats suggest the risk there is "negligible," in fact.

Continue Reading

Hack lets you run Linux kernel on Canon EOS DSLRs

Hack lets you run Linux kernel on Canon EOS DSLRs

Of the well known operating systems in the world, Linux has had the distinct reputation of being installed almost anywhere there is a processor to be found. Of course, just because you can, doesn't mean you should, but running Linux on any computer possible has always been an exercise in skill and a cause for bragging. While Canon's digital cameras are not exactly as esoteric as refrigerators and washing machines, getting Linux to run on these more often than not very closed devices can open up a world of possibilities.

Continue Reading

Obama signs bill to allow sanctions be placed on ‘malicious’ hackers

Obama signs bill to allow sanctions be placed on ‘malicious’ hackers

Taking dead aim at “malicious cyber attackers”, President Obama today signed into law a bill that will allow those who target US companies for things like DDoS attacks to have sanctions imposed upon them. In announcing the bill, Homeland Security and Counterterrorism chief Lisa Monaco said “by freezing assets of those subject to sanctions and making it more difficult for them to do business with U.S. entities, we can remove a powerful economic motivation for committing these acts in the first place”.

Continue Reading

GitHub still experiencing ‘evolving’ DDoS attack

GitHub still experiencing ‘evolving’ DDoS attack

GitHub, the go-to online repository for projects created in code, is suffering an online DDoS attack. Though the team reports service interruptions are quieting, there’s reason to believe the attack is ongoing. GitHub has been able to “mitigate” the effects of the attack, but also say it’s “evolving”, and whoever may be responsible is morphing their strategy and methodology to continue the disruption. Though not exactly confirmed — and GitHub hasn’t said as much — the attack is believed to have originated in China.

Continue Reading

Prev 1 2 3 4 5 6 7 Next