hacking

Globalstar GPS network (allegedly) vulnerable to hackers

Globalstar GPS network (allegedly) vulnerable to hackers

Researcher Colby Moore will be presenting findings related to a security issue with the Globalstar satellite network at Black Hat in Las Vegas next week. The researcher found that devices using the Globalstar network reportedly can be fed false data or have their data transmissions intercepted. The type of system Globalstar reportedly uses is “kind of fundamentally broken from the get-go,” according to Moore. That's not the end of its problems, however.

Continue Reading

OwnStar gadget hacks GM’s OnStar to unlock, start cars

OwnStar gadget hacks GM’s OnStar to unlock, start cars

As cars get more sophisticated and more connected to the Internet, they also become more vulnerable to malicious attack. That truth has been demonstrated before and will be demonstrated again at the DefCon conference next week. Hacker Samy Kamkar has developed a small box, made from three radios and a Raspberry Pi, which, when within Wi-Fi range, can snoop in on a GM car owner's communication with his GM OnStar, hack into the computer system, and do all sorts of mayhem short of actually driving away with the car.

Continue Reading

New exploit renders Android phones mute and useless

New exploit renders Android phones mute and useless

Another day, another critical Android vulnerability. This time, it might be slightly less serious than Stagefright but still enough to be worrisome. Popular security Trend Mirco came upon this vulnerability in Android's mediaserver component that, when given a malformed MKV media file, could render the device unresponsive and completely silent, practically locking out the user from his or her device. The one slight good news is that this exploit requires installing a malicious app or visiting a suspicious website, which, sadly, isn't that hard to get users to do.

Continue Reading

Even smart rifles can be hacked

Even smart rifles can be hacked

What's the worst case scenario of hacking you can think of? iCloud? Sony? Target? While those are definitely terrible and frightening, this latest one can be literally the deadliest. Husband and wife hackers Runa Sandvik and Michael Auger will be presenting at the Black Hat hacker conference next month the fruits of their research. They have successfully hacked a TrackingPoint smart rifle to prevent the gun from firing, lock out the user from the computerized scope, or, worse, change the variables in the scope's calculations to make it a completely different target.

Continue Reading

Sources: United Airlines hit with cyberattack from OPM hackers

Sources: United Airlines hit with cyberattack from OPM hackers

The hackers responsible for the massive data breach against the U.S. Office of Personnel Management reportedly also hit United Airlines with a cyberattack, doing so at about the same time that they targeted the US government. The hackers are also said to be responsible for the breach that took place against insurance provider Anthem, ultimately leaving them with a massive amount of data on both government workers and insured Americans alike. According to multiple sources, United Airlines spotted a breach in its computer system in May or June, and the resulting investigation found the China-based hackers were responsible.

Continue Reading

All it takes is one MMS to hack your Android phone

All it takes is one MMS to hack your Android phone

Computers are sometimes so fragile that it takes very little to crack them open to remote abuse. That said, in most cases, it usually takes some active action on the part of the user, like opening a file or clicking a link, to start the process. This new Android vulnerability, however, is frightening in the sense that the user doesn't need to do anything at all. Just by receiving a multimedia message, not even opening it, their Android smartphone can become a sitting duck against hackers and miscreants.

Continue Reading

Fiat Chrysler recalls 1.4M vehicles after hacked Jeep incident

Fiat Chrysler recalls 1.4M vehicles after hacked Jeep incident

Following this week's news about a Jeep vehicle that was hacked from a remote location while driving down the road, parent company Fiat Chrysler Automobiles (FCA) have announced a recall affecting 1.4 million cars in the US. The recall is obviously over potential hole in the security of the software running on the vehicles. In the Jeep incident, which was covered in a report from Wired, the hackers managed to send signals to car's dashboard over the internet while it was traveling at 70 mph.

Continue Reading

Jeep hacking done on willing participant

Jeep hacking done on willing participant

Today's big news about a Jeep being "hacked" from a remote location was done on a willing test-dummy of sorts. The man - Andy Greenberg - writes for Wired magazine, and agreed to be part of this hacking experiment over the past year. Their work - these hackers, that is to say - was indeed a test, and not entirely malicious, but that's no reason to stop the panic. The hack they performed was real, and it really COULD send signals to this vehicle's dashboard via the internet.

Continue Reading

CVS Photo temporally shut down following credit card hack

CVS Photo temporally shut down following credit card hack

It looks like CVS is the latest retailer to be affected by a data breach, as its CVSPhoto.com domain now only shows up with a message advising customers that the independent vendor it uses has been compromised. As a result of the hack, CVS has temporarily taken down its CVS Photo website, and says that during this time it is conducting an investigation into the matter. Customers who used the service with their credit card should be on alert.

Continue Reading

Hackers claim Ashley Madison site breach, have data on 37 million users

Hackers claim Ashley Madison site breach, have data on 37 million users

A group of hackers have made their way through the security of dating network website Ashley Madison and claim they have the data of some 37 million of the service's users, in addition to financial records and other private information. This news was revealed by well-regarded security researcher Brian Krebs, who added that the those responsible for the hack go by the name Impact Team. Apparently a small amount of user data has been uploaded as proof, but the hackers are threatening to make everything public if their demands aren't met.

Continue Reading

Coders warn that security backdoor will open a can of worms

Coders warn that security backdoor will open a can of worms

The US and UK governments continue to push for a VIP backstage access to the world's computers, networks, and devices, sometimes using the most emotional, not to mention deplorable, arguments. But such a security setup is ultimately a technical consideration and should also be driven by technical arguments. A group of industry specialists and luminaries are doing exactly that, releasing a paper that gives the proposal their stamp of disapproval, proving that not only is the backdoor access unfeasible, it will actually put countries at even more risk.

Continue Reading

NSA, GCHQ attacked popular anti-virus software, says leak

NSA, GCHQ attacked popular anti-virus software, says leak

Here's another one for the spy books. To the surprise of perhaps no one, the NSA, along with their British counterparts, the GCHQ, have been revealed to have targeted, hacked, and compromised the very companies whose jobs it was to protect users from hacking and attacks, like, say, from criminals. This is the latest round of scandals coming from the ever-flowing Snowden leaks. Perhaps most worrying is the fact that this so called Project CAMBERDADA targeted not government or corporate security software, but the ones that most of us use on our PCs.

Continue Reading

Prev 2 3 4 5 6 7 8 9 10 Next