hacking

Yahoo’s new security features: On-demand passwords and e2e encryption

Yahoo’s new security features: On-demand passwords and e2e encryption

Security and privacy are becoming more and more important as we transmit much more than just words via email. Yahoo is developing two new technologies to protect your data and create security solutions. Soon, any sensitive data that you send using email, from business documents to personal information, can be kept secure using an advanced end-to-end (e2e) encryption plugin for Yahoo Mail. And, if you forget your password, Yahoo has come up with a new solution for that as well. Yahoo is calling their new password retrieval system On-demand passwords.

Continue Reading

Android 5.1 Lollipop factory images released for Nexus devices

Android 5.1 Lollipop factory images released for Nexus devices

Supposing you've got a Nexus device in your possession, you know the thrill of getting an Android update. Not just any Android update, one that brings a full extra digit to the tens spot after the five. This isn't a new desert - it's a .1 for your Lollipop. Google has begun posting Android 5.1 Factory Images for Nexus devices of all sorts this week, and that includes Nexus 5, Nexus 7, and Nexus 10, too. While we've not yet seen the Nexus 9 appear on this list, nor the Nexus 4, we'll expect at least one of the two to pop up soon.

Continue Reading

Netflix Hack Day: double log-in, Nintendo, and Earth

Netflix Hack Day: double log-in, Nintendo, and Earth

So you like hacking - and you like Netflix. Perhaps you'd enjoy watching House of Cards season 3 on your Nintendo Entertainment System? Lucky you, someone has figure out how to do such a thing, and they've posted a demonstration of this system this week. Straight from the Netflix Hack Day (Winter Season 2015), comes DarNES, a system that's relatively unmodified (hardware-wise), complete with Netflix. This system works - it plays video, scrolls through the UI, and accesses the internet.

Continue Reading

Three foreigners charged with massive email breach in US

Three foreigners charged with massive email breach in US

There is that saying about the long arm of the law and the places that it reaches. Considering how this latest cyber crime case practically covers three countries both near and far from the US, that might very well be applicable here. Several agencies of the US government made a joint announcement revealing some of the details that concerns two Vietnamese nationals and one Canadian who have been involved in one of the most massive case of email hacking and spam in the history of the US.

Continue Reading

Xiaomi Mi 4 malware accusation prompts security controversy

Xiaomi Mi 4 malware accusation prompts security controversy

Earlier this week, Bluebox, a data security company, released a findings report on their tests of the Xiaomi Mi 4 smartphone. Unfortunately for Xiaomi, their results were far from stellar. Not only did the security firm find malicious malware installed on the device, but some of it was even disguised to appear as Google apps. Even worse, they believe an unknown third party tampered with the Android-powered smartphone. Read on for more details about what they found, as well as Xiaomi's official response to the report.

Continue Reading

Gemalto: we were ‘probably’ hacked, but definitely affected

Gemalto: we were ‘probably’ hacked, but definitely affected

For a company that wasn’t even aware they’d been hacked years prior, Gemalto sounds pretty confident things are just fine. In a report outlining the ‘probable’ hack executed by the NSA and GCHQ, Gemalto says none of the encryption keys our SIM card have were compromised. Earlier this week, Gemalto said they believed the hack was less damaging than initially outlined by Edward Snowden, wherein he says the NSA and GCHQ played a kind of ‘man in the middle’ game to grab your SIM codes.

Continue Reading

Google’s new Chrome warning stops malware before you download

Google’s new Chrome warning stops malware before you download

As long as the internet has existed - and indeed before - there've been viruses. Malware - malicious software - has been a plague on the digital universe since inception, and Google hopes to help to put and end to it. With a new red flag set in place this month, Google Chrome will warn you when you're about to visit a website that has malware downloads. This is not the first such system Google has put in place, but it is the most advanced.

Continue Reading

Gemalto says NSA SIM card hack might not be so bad after all

Gemalto says NSA SIM card hack might not be so bad after all

Late last week, Edward Snowden revealed another bombshell. In his ongoing quest to reveal the scope of NSA spying, he announced the NSA and GCHQ (NSA’s UK counterpart) hacked a major SIM card provider, Gemalto, in an attempt to get the ‘keys’ to your phone. In hacking your phone via the SIM, the NSA and GCHQ would be able to bypass the carriers, and keep a watchful eye on you with no one being the wiser. In response to the report, Gemalto is now saying it might not be a problem at all.

Continue Reading

Snowden: NSA/GCHQ have nearly everyone’s SIM card codes

Snowden: NSA/GCHQ have nearly everyone’s SIM card codes

Edward Snowden’s cache of information is unsettling, but necessary. Periodically, he’ll release a tidbit of info that either follows up on something that came before it, or is entirely new and equally shocking. Today, we get the latter of the two, as Snowden reveals how the NSA — in conjunction with the UK’s GCHQ — hacked Gemalto, a major SIM card manufacturer. According to Snowden, the NSA/GCHQ hack of Gemalto gave them secret passcodes to SIM cards around the world, bypassing your carrier altogether.

Continue Reading

Google voices opposition to court-blessed remote hacking

Google voices opposition to court-blessed remote hacking

The Internet has definitely changed the legal landscape by blurring the boundaries of geophysical territories. It has made the world both a smaller and bigger place, and the law is having a bit of trouble trying to catch up. Sometimes, in scrambling to adjust to the times, governments overreact and try to claim overarching powers. Such might be the case with the proposed amendment to the Federal Rule of Criminal Procedure 41, which could allow the government to remotely access computers even in other countries.

Continue Reading

Equation group creates “The Death Star of Malware”

Equation group creates “The Death Star of Malware”

According to the Kaspersy Labs Global Research and Analysis Team (GREAT), one piece of malware has infected thousands of victims throughout the world. The team suggests that it may be possible that tens of thousands of victims have been infected with malware made by Equation APT, or The Equation Group, through a number of "implants" - otherwise known as Trojans. These infection points are called upon by Kaspersy to identify the spread. Kaspersy calls this team of hackers The Equation group - their real identities remain a mystery.

Continue Reading

Hackers rob banks around the world of over $300 million

Hackers rob banks around the world of over $300 million

In what is appearing to be one of the largest bank thefts across the globe, hackers have managed to steal over $300 million from more than 100 banks in 30 different countries. The new comes from a Kaspersky Labs report given to the New York Times, which explains a large-scale, sophisticated malware was used since 2013 to siphon the money from financial institutions. No banks have officially come forward to disclose the security breaches, but victims include those in Russia, the U.S., Europe, and Japan.

Continue Reading

Prev 1 2 3 4 5 6 7 8 9 Next