hacking

Silk Road Dark Net raid puts 400+ sites out of commission

Silk Road Dark Net raid puts 400+ sites out of commission

This week a joint police operation in Europe took down more than 400 websites suspected of illegal activity in the Dark Net. This operation had to be run entirely in secret and had to take place in many places at once. Once one site is taken down, others are warned, and they unplug. Simultaneous takedown is the only way this sort of operation is able to be run - so said Troels Oerting, head of Europol's European cybercrime centre. This hit took down not only dark net sites, but services as well.

Continue Reading

Home Depot hack gets worse; email addresses stolen, too

Home Depot hack gets worse; email addresses stolen, too

If you were wondering how The Home Depot was hacked, we’ve got the gritty details. The Atlanta-based home improvement store says they fell victim to the same vulnerability Target did: a third-party vendor. A vendor/partner of The Home Depot was hacked, and their password stolen. From there, hackers went after the bigger fish in Home Depot. Originally thought to have compromised roughly 56 million credit card numbers, it seems about 53 million email addresses were pinched as well.

Continue Reading

Introducing Neals: one Nerd Rapper’s aim for a multimedia retrofuture

Introducing Neals: one Nerd Rapper’s aim for a multimedia retrofuture

Introducing Neals - an hour-long musical animated movie based on a Nerd Rap musical experience. It launches today. It's the 5th of November, and this date hasn't been chosen randomly. Just like the real Guy Fawkes Day, and previous celebrations, today was chosen by YT Cracker to exemplify the outline of the story he's attempting to tell. Introducing Neals is a "retrofuture," says Bryce Case JR, aka YT Cracker, a place where you'll hear the story of "the open source movement, hacktivism, government surveillance, and net neutrality with familiar 1980s tropes and familiar 1980s corniness."

Continue Reading

Samsung Find My Mobile reported to be vulnerable to attack

Samsung Find My Mobile reported to be vulnerable to attack

One of the biggest objections that detractors of the kill switch have against the theft deterrent measure is that the feature could be used for good or for ill, depending on who holds the power. Those fears might have just materialized with the discovery that Samsung's Find My Mobile feature, which lets users remotely lock or unlock their devices in case of loss or theft, can easily be broken into, giving hackers the power to remotely control access to a victim's Samsung Galaxy smartphone.

Continue Reading

iCloud attacks were real: Apple comments

iCloud attacks were real: Apple comments

This week it was reported that Apple’s iCloud servers were under attack by China - as it turns out that’s not entirely true. Apple has made clear in a statement that there were indeed "intermittent organized network attacks" this week, but that they were done on people attempting to access the iCloud webpage. There weren’t any attacks on the iCloud servers themselves, nor were there any drops of user information. Apple does, however, suggest that you pay attention to "certificate warnings."

Continue Reading

Facebook proactively searching for compromised user data

Facebook proactively searching for compromised user data

We see it a lot lately — some hacker makes a big data grab, then dumps the info in a dark corner of the web. The most recent victim of polarizing headlines about compromised data has been Dropbox. While claiming the username/password combinations taken were dated, they still faced a lot of furrowed brows at the data grab. Securing your own servers is a smart measure, but Facebook — perhaps the biggest data fish in the sea — is taking it a step further, and has taken to hunting in the deep waters.

Continue Reading

Russian hackers use Windows flaw to target NATO and more

Russian hackers use Windows flaw to target NATO and more

Hackers have been in the news on a regular basis -- sometimes for their escapades, other times for their convictions. The latest among them is a Russian hacking collective that has been spying on high-profile targets for the last five years. The collective is being referred to as the Sandworm Team by iSight Partners, which made the discovery, due to Dune references spotted in the hackers' code. The hacking efforts are said to be ongoing even now, and involve phishing tactics to infect the various targets' computers.

Continue Reading

Kmart registers hacked, customers’ credit & debit cards numbers stolen

Kmart registers hacked, customers’ credit & debit cards numbers stolen

Retail chain Kmart has just announced that its in-store payment systems have been compromised for over a month now, and there is a strong chance that customers' credit and debit card numbers have been compromised. Details are still scarce at this point, but it is clear that Kmart joins recent retail victims Target and Home Depot in having their registers affected by malware.

Continue Reading

Yahoo servers breached via Shellshock bug

Yahoo servers breached via Shellshock bug

Remember the shellshock bug that caused a lot of hoopla in recent weeks? According to Future South Technologies security researcher Jonathon Hall, some of Yahoo's servers have been breached by hackers via the security vulnerability. The researcher took to Reddit to talk about his discovery, saying that he had contacted Yahoo before going public, but then had to eventually contact both the FBI and "several media outlets" before the company responded to his message. In its response, according to Hall, Yahoo confirmed the security breach.

Continue Reading

Google says thousands of pics were deleted in wake of celeb hacking scandal

Google says thousands of pics were deleted in wake of celeb hacking scandal

In the aftermath of a large hacking attack that saw the personal photos of many celebrities released on the internet earlier this year, Google has now come forward saying that "tens of thousands" of said images were removed from the search giant's services promptly after requests were made. This disclosure comes almost immediately after Google was threatened with a $100 million lawsuit from lawyers representing the celebrities who had their pictures stolen.

Continue Reading

Prev 3 4 5 6 7 8 9 10 11 Next