hacking

All it takes is one MMS to hack your Android phone

All it takes is one MMS to hack your Android phone

Computers are sometimes so fragile that it takes very little to crack them open to remote abuse. That said, in most cases, it usually takes some active action on the part of the user, like opening a file or clicking a link, to start the process. This new Android vulnerability, however, is frightening in the sense that the user doesn't need to do anything at all. Just by receiving a multimedia message, not even opening it, their Android smartphone can become a sitting duck against hackers and miscreants.

Continue Reading

Fiat Chrysler recalls 1.4M vehicles after hacked Jeep incident

Fiat Chrysler recalls 1.4M vehicles after hacked Jeep incident

Following this week's news about a Jeep vehicle that was hacked from a remote location while driving down the road, parent company Fiat Chrysler Automobiles (FCA) have announced a recall affecting 1.4 million cars in the US. The recall is obviously over potential hole in the security of the software running on the vehicles. In the Jeep incident, which was covered in a report from Wired, the hackers managed to send signals to car's dashboard over the internet while it was traveling at 70 mph.

Continue Reading

Jeep hacking done on willing participant

Jeep hacking done on willing participant

Today's big news about a Jeep being "hacked" from a remote location was done on a willing test-dummy of sorts. The man - Andy Greenberg - writes for Wired magazine, and agreed to be part of this hacking experiment over the past year. Their work - these hackers, that is to say - was indeed a test, and not entirely malicious, but that's no reason to stop the panic. The hack they performed was real, and it really COULD send signals to this vehicle's dashboard via the internet.

Continue Reading

CVS Photo temporally shut down following credit card hack

CVS Photo temporally shut down following credit card hack

It looks like CVS is the latest retailer to be affected by a data breach, as its CVSPhoto.com domain now only shows up with a message advising customers that the independent vendor it uses has been compromised. As a result of the hack, CVS has temporarily taken down its CVS Photo website, and says that during this time it is conducting an investigation into the matter. Customers who used the service with their credit card should be on alert.

Continue Reading

Hackers claim Ashley Madison site breach, have data on 37 million users

Hackers claim Ashley Madison site breach, have data on 37 million users

A group of hackers have made their way through the security of dating network website Ashley Madison and claim they have the data of some 37 million of the service's users, in addition to financial records and other private information. This news was revealed by well-regarded security researcher Brian Krebs, who added that the those responsible for the hack go by the name Impact Team. Apparently a small amount of user data has been uploaded as proof, but the hackers are threatening to make everything public if their demands aren't met.

Continue Reading

Coders warn that security backdoor will open a can of worms

Coders warn that security backdoor will open a can of worms

The US and UK governments continue to push for a VIP backstage access to the world's computers, networks, and devices, sometimes using the most emotional, not to mention deplorable, arguments. But such a security setup is ultimately a technical consideration and should also be driven by technical arguments. A group of industry specialists and luminaries are doing exactly that, releasing a paper that gives the proposal their stamp of disapproval, proving that not only is the backdoor access unfeasible, it will actually put countries at even more risk.

Continue Reading

NSA, GCHQ attacked popular anti-virus software, says leak

NSA, GCHQ attacked popular anti-virus software, says leak

Here's another one for the spy books. To the surprise of perhaps no one, the NSA, along with their British counterparts, the GCHQ, have been revealed to have targeted, hacked, and compromised the very companies whose jobs it was to protect users from hacking and attacks, like, say, from criminals. This is the latest round of scandals coming from the ever-flowing Snowden leaks. Perhaps most worrying is the fact that this so called Project CAMBERDADA targeted not government or corporate security software, but the ones that most of us use on our PCs.

Continue Reading

SwiftKey hack can remotely take over Samsung mobile devices

SwiftKey hack can remotely take over Samsung mobile devices

Android users on Samsung mobile devices could be vulnerable to a new type of security hack. The security flaw was discovered by Ryan Welton from NowSecure. He detailed his findings at the Blackhat Security Summit in London. The hackable exploit arises from the pre-installed SwiftKey keyboard. As Swiftkey searches for updates to its language packs over unencrypted lines, via plain text, it is susceptible to malicious security apps from any spoofed proxy server. Using this as a keyhole, Welton could scale up the attack to basically take over a vulnerable mobile device while the user remains unaware. The bug affects over 600 million Samsung users, including those using the Galaxy S6.

Continue Reading

LastPass reveals breach that compromised user data

LastPass reveals breach that compromised user data

LastPass has revealed that it was breached recently, and that some account data was compromised as a result. The discovery was made this past Friday when, says LastPass, it found (and subsequently blocked) “suspicious activity” on its network. Encrypted user vault data doesn’t seem to have been taken, says LastPass, and there's also no sign that users' accounts were accessed. Some details pertaining to them, however, like email addresses were compromised, and so users need to update their master passwords among other things.

Continue Reading

Apple Watch hacked to run “true” native apps

Apple Watch hacked to run “true” native apps

Developers hack the Apple Watch to allow apps to run on UIKit, the software bones of the smart wearable device. While Apple has provided the developer world with a software kit called "WatchKit", WatchKit itself remote-drives another bit of software called PepperUICore which lives on top of UIKit. Apple's own apps on the Watch, save the Weather app, do not use WatchKit. To show that it is possible - albeit not recommended for those hoping to get in to Apple's official app store - three developers have gotten both UIKit and SceneKit apps running on the Apple Watch.

Continue Reading

1 2 3 4 5 Next