hacking

Apple on Masque Attack: ‘just use the App Store’

Apple on Masque Attack: ‘just use the App Store’

Earlier this week, we told you about Masque Attack, which let hackers sideload apps onto your iDevices. Often without you even realizing it, an app was loaded, and scary people somewhere else could gain access to your information. The app loaded may not have even been the app you were looking for when you followed the link, either. Now, Apple has issued a response to the report. We gotta say, it’s about what you’d expect from Apple, and full of common sense, too.

Continue Reading

Windows Phone surprisingly survives HP Pwn2Own contest

Windows Phone surprisingly survives HP Pwn2Own contest

You can say what you want about Microsoft's mobile platform, but apparently, Windows Phone is a rather tough nut to crack. This revelation came on the second day of HP's Pwn2Own hacking contest, with this round targeting browsers of mobile devices. One contestant tried to gain control of the phone by attacking the browser but ultimately failed to break through the sandbox. That said, there was still some access gained, so Windows Phone didn't completely emerge unscathed, surviving with just some war wounds and probably a bit of pride.

Continue Reading

Notorious hacker’s password was his cat’s name

Notorious hacker’s password was his cat’s name

The warning is a common one: choose a strong password. Don't use "password" as your password. Don't use "123456" as your password. Yet every year a report or two surfaces showing those and dozens like them are the passwords of choices for users across the globe, not to mention passwords that are easy to guess once you know something about the user. One would expect hackers to be a collective well-versed in the need to choose hard-to-guess passwords, but even hackers make mistakes.

Continue Reading

US Postal Service employee, customer details hacked

US Postal Service employee, customer details hacked

If you thought only retail chains like Home Depot and Target or commercial services like Apple's iCloud are the only victims of data breaches, better thinking again and rethink your outlook on personal information security. The US Postal Service has just disclosed that it was the target of a cybercrime that compromised personal information stored in its databases. But unlike other data breaches, this one actually didn't affect customers as much as it did the USPS' own employees, with attackers able to run off with critical pieces of information.

Continue Reading

New ‘Masque Attack’ iOS phishing vulnerability sideloads apps

New ‘Masque Attack’ iOS phishing vulnerability sideloads apps

On the heels of WireLurker, a new iOS threat has been discovered. This one, called Masque attack, could be a lot more problematic, too. While the previously discovered WireLurker vulnerability required users to be tethered to a Mac before anything nefarious could happen, Masque Attack is one that occurs in-app. Discovered by security research firm FireEye, Masque Attack could pose a much bigger risk to anyone using apps that didn’t come pre-loaded on their iPhone, iPod, or iPad.

Continue Reading

Silk Road Dark Net raid puts 400+ sites out of commission

Silk Road Dark Net raid puts 400+ sites out of commission

This week a joint police operation in Europe took down more than 400 websites suspected of illegal activity in the Dark Net. This operation had to be run entirely in secret and had to take place in many places at once. Once one site is taken down, others are warned, and they unplug. Simultaneous takedown is the only way this sort of operation is able to be run - so said Troels Oerting, head of Europol's European cybercrime centre. This hit took down not only dark net sites, but services as well.

Continue Reading

Home Depot hack gets worse; email addresses stolen, too

Home Depot hack gets worse; email addresses stolen, too

If you were wondering how The Home Depot was hacked, we’ve got the gritty details. The Atlanta-based home improvement store says they fell victim to the same vulnerability Target did: a third-party vendor. A vendor/partner of The Home Depot was hacked, and their password stolen. From there, hackers went after the bigger fish in Home Depot. Originally thought to have compromised roughly 56 million credit card numbers, it seems about 53 million email addresses were pinched as well.

Continue Reading

Introducing Neals: one Nerd Rapper’s aim for a multimedia retrofuture

Introducing Neals: one Nerd Rapper’s aim for a multimedia retrofuture

Introducing Neals - an hour-long musical animated movie based on a Nerd Rap musical experience. It launches today. It's the 5th of November, and this date hasn't been chosen randomly. Just like the real Guy Fawkes Day, and previous celebrations, today was chosen by YT Cracker to exemplify the outline of the story he's attempting to tell. Introducing Neals is a "retrofuture," says Bryce Case JR, aka YT Cracker, a place where you'll hear the story of "the open source movement, hacktivism, government surveillance, and net neutrality with familiar 1980s tropes and familiar 1980s corniness."

Continue Reading

Samsung Find My Mobile reported to be vulnerable to attack

Samsung Find My Mobile reported to be vulnerable to attack

One of the biggest objections that detractors of the kill switch have against the theft deterrent measure is that the feature could be used for good or for ill, depending on who holds the power. Those fears might have just materialized with the discovery that Samsung's Find My Mobile feature, which lets users remotely lock or unlock their devices in case of loss or theft, can easily be broken into, giving hackers the power to remotely control access to a victim's Samsung Galaxy smartphone.

Continue Reading

iCloud attacks were real: Apple comments

iCloud attacks were real: Apple comments

This week it was reported that Apple’s iCloud servers were under attack by China - as it turns out that’s not entirely true. Apple has made clear in a statement that there were indeed "intermittent organized network attacks" this week, but that they were done on people attempting to access the iCloud webpage. There weren’t any attacks on the iCloud servers themselves, nor were there any drops of user information. Apple does, however, suggest that you pay attention to "certificate warnings."

Continue Reading

Prev 1 2 3 4 5 6 7 Next