hacking

Sony Pictures hack tipped as an inside job

Sony Pictures hack tipped as an inside job

Sony Pictures was swept up in a widespread attack recently, something that came to light after a screenshot of a compromised computer in one of the company's offices was posted to Reddit. Through that screenshot we saw mention of some unspecified demands and a threat to leak data if the demands weren't met. That has spawned different tidbits of information coming from different sources alleging knowledge of or access to the situation, the most recent of which suggests the hack was, in part at least, an inside job.

Continue Reading

Sony Pictures network hacked, data held for ransom

Sony Pictures network hacked, data held for ransom

Sony Pictures has been hacked, it is being reported, with the company's computer network in New York and other unspecified locations around the globe being taken over by some group referring to itself as "#GOP". The company has reportedly shut down all of its computers in Los Angeles as a precaution, and is investigating the matter. In the course of things, a screenshot of the hack has been made public by an anonymous source, and we have it after the jump.

Continue Reading

Regin malware: three things you need to know

Regin malware: three things you need to know

Today the folks at Symantec have reported their discovery of the malware known as Regin. This software is detected by Symantec and Norton products as "Backdoor.Regin", and it seems clear that given the complexity of the hack, a nation state is likely responsible for its creation. This software is extremely "low key", meaning it can remain undetected for several years in a system, and even if it IS detected, it's not always possible to find out what its been up to.

Continue Reading

Craigslist was down: a short interview with the hacker blamed for it

Craigslist was down: a short interview with the hacker blamed for it

Overnight Craigslist experienced some down time in the form of a hacker redirect. Today we've had a short chat with one of the hackers blamed for the mess, along with word on his most recent project as a musician called YTCracker - a project we've also covered very recently. It would seem that it's no coincidence that one event happened right on top of the other - it might also be no coincidence that 15 years ago today, YTCracker broke into NASA's webpage for the Goddard Flight Center, vandalizing it with a warning for US government to beef up security.

Continue Reading

Apple on Masque Attack: ‘just use the App Store’

Apple on Masque Attack: ‘just use the App Store’

Earlier this week, we told you about Masque Attack, which let hackers sideload apps onto your iDevices. Often without you even realizing it, an app was loaded, and scary people somewhere else could gain access to your information. The app loaded may not have even been the app you were looking for when you followed the link, either. Now, Apple has issued a response to the report. We gotta say, it’s about what you’d expect from Apple, and full of common sense, too.

Continue Reading

Windows Phone surprisingly survives HP Pwn2Own contest

Windows Phone surprisingly survives HP Pwn2Own contest

You can say what you want about Microsoft's mobile platform, but apparently, Windows Phone is a rather tough nut to crack. This revelation came on the second day of HP's Pwn2Own hacking contest, with this round targeting browsers of mobile devices. One contestant tried to gain control of the phone by attacking the browser but ultimately failed to break through the sandbox. That said, there was still some access gained, so Windows Phone didn't completely emerge unscathed, surviving with just some war wounds and probably a bit of pride.

Continue Reading

Notorious hacker’s password was his cat’s name

Notorious hacker’s password was his cat’s name

The warning is a common one: choose a strong password. Don't use "password" as your password. Don't use "123456" as your password. Yet every year a report or two surfaces showing those and dozens like them are the passwords of choices for users across the globe, not to mention passwords that are easy to guess once you know something about the user. One would expect hackers to be a collective well-versed in the need to choose hard-to-guess passwords, but even hackers make mistakes.

Continue Reading

US Postal Service employee, customer details hacked

US Postal Service employee, customer details hacked

If you thought only retail chains like Home Depot and Target or commercial services like Apple's iCloud are the only victims of data breaches, better thinking again and rethink your outlook on personal information security. The US Postal Service has just disclosed that it was the target of a cybercrime that compromised personal information stored in its databases. But unlike other data breaches, this one actually didn't affect customers as much as it did the USPS' own employees, with attackers able to run off with critical pieces of information.

Continue Reading

New ‘Masque Attack’ iOS phishing vulnerability sideloads apps

New ‘Masque Attack’ iOS phishing vulnerability sideloads apps

On the heels of WireLurker, a new iOS threat has been discovered. This one, called Masque attack, could be a lot more problematic, too. While the previously discovered WireLurker vulnerability required users to be tethered to a Mac before anything nefarious could happen, Masque Attack is one that occurs in-app. Discovered by security research firm FireEye, Masque Attack could pose a much bigger risk to anyone using apps that didn’t come pre-loaded on their iPhone, iPod, or iPad.

Continue Reading

Silk Road Dark Net raid puts 400+ sites out of commission

Silk Road Dark Net raid puts 400+ sites out of commission

This week a joint police operation in Europe took down more than 400 websites suspected of illegal activity in the Dark Net. This operation had to be run entirely in secret and had to take place in many places at once. Once one site is taken down, others are warned, and they unplug. Simultaneous takedown is the only way this sort of operation is able to be run - so said Troels Oerting, head of Europol's European cybercrime centre. This hit took down not only dark net sites, but services as well.

Continue Reading

1 2 3 4 5 Next