hackers

FBI malware warning hints at Sony Pictures attack

FBI malware warning hints at Sony Pictures attack

The FBI has issued a warning about dangerous malware, and Reuters has acquired a five-page confidential document on it the agency sent to unspecified companies in the U.S. today. That document reportedly contains some information about the malware, and reports that it has been used in a "destructive cyberattack" in the US. The agency did not specify which company has fallen victim (nor if there is more than one), but it is believed to be related to the recent massive attack against Sony Pictures.

Continue Reading

Sony Pictures movies leaked online following network hack

Sony Pictures movies leaked online following network hack

Following the news last week of the hacking of Sony Pictures' network by a group calling themselves "#GOP," or Guardians of Peace, DVD screener copies of several of the studio's movies have been leaked online. As was previously reported, the hackers threatened Sony with a list of unspecified demands, saying sensitive data would be released if the movie studio didn't cooperate. It appears that this could be the first of such leaks.

Continue Reading

Syrian Electronic Army hacks Walmart, media sites

Syrian Electronic Army hacks Walmart, media sites

The Syrian Electronic Army, which has pulled off a bunch of often annoying hacks in the past, has been relatively quiet in recent times. That ended on Thanksgiving, when the collective posted a tweet referencing the holiday and users across the global began seeing popups from the SEA appears on several websites. Multiple media websites were affected, including CBC.ca and The Boston Globe, as well as Wal-Mart's Canadian website. Though no user data is known to have been compromised, many users were redirected to the hackers' logo, according to Reuters.

Continue Reading

Sony Pictures hack tipped as an inside job

Sony Pictures hack tipped as an inside job

Sony Pictures was swept up in a widespread attack recently, something that came to light after a screenshot of a compromised computer in one of the company's offices was posted to Reddit. Through that screenshot we saw mention of some unspecified demands and a threat to leak data if the demands weren't met. That has spawned different tidbits of information coming from different sources alleging knowledge of or access to the situation, the most recent of which suggests the hack was, in part at least, an inside job.

Continue Reading

Sony Pictures network hacked, data held for ransom

Sony Pictures network hacked, data held for ransom

Sony Pictures has been hacked, it is being reported, with the company's computer network in New York and other unspecified locations around the globe being taken over by some group referring to itself as "#GOP". The company has reportedly shut down all of its computers in Los Angeles as a precaution, and is investigating the matter. In the course of things, a screenshot of the hack has been made public by an anonymous source, and we have it after the jump.

Continue Reading

Apple on Masque Attack: ‘just use the App Store’

Apple on Masque Attack: ‘just use the App Store’

Earlier this week, we told you about Masque Attack, which let hackers sideload apps onto your iDevices. Often without you even realizing it, an app was loaded, and scary people somewhere else could gain access to your information. The app loaded may not have even been the app you were looking for when you followed the link, either. Now, Apple has issued a response to the report. We gotta say, it’s about what you’d expect from Apple, and full of common sense, too.

Continue Reading

Notorious hacker’s password was his cat’s name

Notorious hacker’s password was his cat’s name

The warning is a common one: choose a strong password. Don't use "password" as your password. Don't use "123456" as your password. Yet every year a report or two surfaces showing those and dozens like them are the passwords of choices for users across the globe, not to mention passwords that are easy to guess once you know something about the user. One would expect hackers to be a collective well-versed in the need to choose hard-to-guess passwords, but even hackers make mistakes.

Continue Reading

New ‘Masque Attack’ iOS phishing vulnerability sideloads apps

New ‘Masque Attack’ iOS phishing vulnerability sideloads apps

On the heels of WireLurker, a new iOS threat has been discovered. This one, called Masque attack, could be a lot more problematic, too. While the previously discovered WireLurker vulnerability required users to be tethered to a Mac before anything nefarious could happen, Masque Attack is one that occurs in-app. Discovered by security research firm FireEye, Masque Attack could pose a much bigger risk to anyone using apps that didn’t come pre-loaded on their iPhone, iPod, or iPad.

Continue Reading

Home Depot hack gets worse; email addresses stolen, too

Home Depot hack gets worse; email addresses stolen, too

If you were wondering how The Home Depot was hacked, we’ve got the gritty details. The Atlanta-based home improvement store says they fell victim to the same vulnerability Target did: a third-party vendor. A vendor/partner of The Home Depot was hacked, and their password stolen. From there, hackers went after the bigger fish in Home Depot. Originally thought to have compromised roughly 56 million credit card numbers, it seems about 53 million email addresses were pinched as well.

Continue Reading

Facebook proactively searching for compromised user data

Facebook proactively searching for compromised user data

We see it a lot lately — some hacker makes a big data grab, then dumps the info in a dark corner of the web. The most recent victim of polarizing headlines about compromised data has been Dropbox. While claiming the username/password combinations taken were dated, they still faced a lot of furrowed brows at the data grab. Securing your own servers is a smart measure, but Facebook — perhaps the biggest data fish in the sea — is taking it a step further, and has taken to hunting in the deep waters.

Continue Reading

Prev 1 2 3 4 5 6 7 8 9 Next