hacking

Coders warn that security backdoor will open a can of worms

Coders warn that security backdoor will open a can of worms

The US and UK governments continue to push for a VIP backstage access to the world's computers, networks, and devices, sometimes using the most emotional, not to mention deplorable, arguments. But such a security setup is ultimately a technical consideration and should also be driven by technical arguments. A group of industry specialists and luminaries are doing exactly that, releasing a paper that gives the proposal their stamp of disapproval, proving that not only is the backdoor access unfeasible, it will actually put countries at even more risk.

Continue Reading

NSA, GCHQ attacked popular anti-virus software, says leak

NSA, GCHQ attacked popular anti-virus software, says leak

Here's another one for the spy books. To the surprise of perhaps no one, the NSA, along with their British counterparts, the GCHQ, have been revealed to have targeted, hacked, and compromised the very companies whose jobs it was to protect users from hacking and attacks, like, say, from criminals. This is the latest round of scandals coming from the ever-flowing Snowden leaks. Perhaps most worrying is the fact that this so called Project CAMBERDADA targeted not government or corporate security software, but the ones that most of us use on our PCs.

Continue Reading

SwiftKey hack can remotely take over Samsung mobile devices

SwiftKey hack can remotely take over Samsung mobile devices

Android users on Samsung mobile devices could be vulnerable to a new type of security hack. The security flaw was discovered by Ryan Welton from NowSecure. He detailed his findings at the Blackhat Security Summit in London. The hackable exploit arises from the pre-installed SwiftKey keyboard. As Swiftkey searches for updates to its language packs over unencrypted lines, via plain text, it is susceptible to malicious security apps from any spoofed proxy server. Using this as a keyhole, Welton could scale up the attack to basically take over a vulnerable mobile device while the user remains unaware. The bug affects over 600 million Samsung users, including those using the Galaxy S6.

Continue Reading

LastPass reveals breach that compromised user data

LastPass reveals breach that compromised user data

LastPass has revealed that it was breached recently, and that some account data was compromised as a result. The discovery was made this past Friday when, says LastPass, it found (and subsequently blocked) “suspicious activity” on its network. Encrypted user vault data doesn’t seem to have been taken, says LastPass, and there's also no sign that users' accounts were accessed. Some details pertaining to them, however, like email addresses were compromised, and so users need to update their master passwords among other things.

Continue Reading

Apple Watch hacked to run “true” native apps

Apple Watch hacked to run “true” native apps

Developers hack the Apple Watch to allow apps to run on UIKit, the software bones of the smart wearable device. While Apple has provided the developer world with a software kit called "WatchKit", WatchKit itself remote-drives another bit of software called PepperUICore which lives on top of UIKit. Apple's own apps on the Watch, save the Weather app, do not use WatchKit. To show that it is possible - albeit not recommended for those hoping to get in to Apple's official app store - three developers have gotten both UIKit and SceneKit apps running on the Apple Watch.

Continue Reading

Be wary of pop-ups in iOS Mail, bug leads to phishing attacks

Be wary of pop-ups in iOS Mail, bug leads to phishing attacks

Hacking and phishing are ever-evolving cat and mouse games. As soon as one attack method is quashed, another leaps to fill its place. A new type of phishing attack has been brought to attention and iOS users should take heed. This specific phishing attack launches a pop-up window when a user is checking his iOS mail. The pop-up appears to be genuine, asking to verify iCloud login information.

Continue Reading

Stuxnet malware child hits Kaspersky with “zero-day trampoline”

Stuxnet malware child hits Kaspersky with “zero-day trampoline”

While you don't hear the words "trampoline" and "malware" in the same sentence very often, today it's entirely warranted. Moscow-based Kaspersky Lab, a research organization that concentrates on hackers and hacking activity, have discovered a second state-sponsored group of hackers that've created malware derived from Stuxnet. A second, that is, after the USA and Isreali group discovered in 2012, creators of the Stuxnet malware used for hacking international groups, the same malware this new group used to create their own sophisticated worm.

Continue Reading

NSA expanded warrantless internet surveillance in attempt to stop hackers

NSA expanded warrantless internet surveillance in attempt to stop hackers

New documents from Edward Snowden have revealed that since 2012, the US's National Security Agency has had an expanded ability to spy on Americans' internet data and communications, with no need to get a warrant. The documents were published in a New York Times article this week, and reveal that the NSA's goal is to find and stop hackers attempting cyberattacks from outside the country. Until now, this program was never disclosed to the public.

Continue Reading

IRS hacked; data stolen from over 100,000 taxpayers

IRS hacked; data stolen from over 100,000 taxpayers

Hackers successfully accessed—stole—personal information, including tax return data, from over 100,000 U.S. taxpayers. In a series of attacks that took place from February to mid-May, the hackers utilized the IRS's "Get Transcript" system to access all of the personal information that would be on a tax return, from birthdays and social security numbers to addresses. The motivation behind the attack is, apparently, an extensive plot to claim fraudulent tax returns using stolen identities. According to the IRS, over $5.8 billion USD in fraudulent refunds were sent out in the year 2013, alone.

Continue Reading

Prev 1 2 3 4 5 6 Next