hacking

SwiftKey hack can remotely take over Samsung mobile devices

SwiftKey hack can remotely take over Samsung mobile devices

Android users on Samsung mobile devices could be vulnerable to a new type of security hack. The security flaw was discovered by Ryan Welton from NowSecure. He detailed his findings at the Blackhat Security Summit in London. The hackable exploit arises from the pre-installed SwiftKey keyboard. As Swiftkey searches for updates to its language packs over unencrypted lines, via plain text, it is susceptible to malicious security apps from any spoofed proxy server. Using this as a keyhole, Welton could scale up the attack to basically take over a vulnerable mobile device while the user remains unaware. The bug affects over 600 million Samsung users, including those using the Galaxy S6.

Continue Reading

LastPass reveals breach that compromised user data

LastPass reveals breach that compromised user data

LastPass has revealed that it was breached recently, and that some account data was compromised as a result. The discovery was made this past Friday when, says LastPass, it found (and subsequently blocked) “suspicious activity” on its network. Encrypted user vault data doesn’t seem to have been taken, says LastPass, and there's also no sign that users' accounts were accessed. Some details pertaining to them, however, like email addresses were compromised, and so users need to update their master passwords among other things.

Continue Reading

Apple Watch hacked to run “true” native apps

Apple Watch hacked to run “true” native apps

Developers hack the Apple Watch to allow apps to run on UIKit, the software bones of the smart wearable device. While Apple has provided the developer world with a software kit called "WatchKit", WatchKit itself remote-drives another bit of software called PepperUICore which lives on top of UIKit. Apple's own apps on the Watch, save the Weather app, do not use WatchKit. To show that it is possible - albeit not recommended for those hoping to get in to Apple's official app store - three developers have gotten both UIKit and SceneKit apps running on the Apple Watch.

Continue Reading

Be wary of pop-ups in iOS Mail, bug leads to phishing attacks

Be wary of pop-ups in iOS Mail, bug leads to phishing attacks

Hacking and phishing are ever-evolving cat and mouse games. As soon as one attack method is quashed, another leaps to fill its place. A new type of phishing attack has been brought to attention and iOS users should take heed. This specific phishing attack launches a pop-up window when a user is checking his iOS mail. The pop-up appears to be genuine, asking to verify iCloud login information.

Continue Reading

Stuxnet malware child hits Kaspersky with “zero-day trampoline”

Stuxnet malware child hits Kaspersky with “zero-day trampoline”

While you don't hear the words "trampoline" and "malware" in the same sentence very often, today it's entirely warranted. Moscow-based Kaspersky Lab, a research organization that concentrates on hackers and hacking activity, have discovered a second state-sponsored group of hackers that've created malware derived from Stuxnet. A second, that is, after the USA and Isreali group discovered in 2012, creators of the Stuxnet malware used for hacking international groups, the same malware this new group used to create their own sophisticated worm.

Continue Reading

NSA expanded warrantless internet surveillance in attempt to stop hackers

NSA expanded warrantless internet surveillance in attempt to stop hackers

New documents from Edward Snowden have revealed that since 2012, the US's National Security Agency has had an expanded ability to spy on Americans' internet data and communications, with no need to get a warrant. The documents were published in a New York Times article this week, and reveal that the NSA's goal is to find and stop hackers attempting cyberattacks from outside the country. Until now, this program was never disclosed to the public.

Continue Reading

Matchlight searches for stolen data on the darkweb

Matchlight searches for stolen data on the darkweb

Data theft is a big issue. From the hacking of celebrity photos serious data breaches like the recent hacking of the IRS, unsecured data often ends up in the wrong hands and on the dark net. A new data service, Matchlight, launched last week and claims it can trace the source of a data breach all the way through the underbelly of the internet, the dark web.

Continue Reading

IRS hacked; data stolen from over 100,000 taxpayers

IRS hacked; data stolen from over 100,000 taxpayers

Hackers successfully accessed—stole—personal information, including tax return data, from over 100,000 U.S. taxpayers. In a series of attacks that took place from February to mid-May, the hackers utilized the IRS's "Get Transcript" system to access all of the personal information that would be on a tax return, from birthdays and social security numbers to addresses. The motivation behind the attack is, apparently, an extensive plot to claim fraudulent tax returns using stolen identities. According to the IRS, over $5.8 billion USD in fraudulent refunds were sent out in the year 2013, alone.

Continue Reading

MediaTek’s LinkIt ONE developer kit targets makers and hobbyists

MediaTek’s LinkIt ONE developer kit targets makers and hobbyists

MediaTek is dipping its toe in the market for makers and builders. The company recently showed off its newest offering at the Wearable World Congress. MediaTek put together the LinkIt One development kit, which is a reasonably priced ($79 USD) kit designed for entrepreneurs to make devices ready for the Internet of Things (IoT) and wearables. The chip on the board is tiny, only about the size of a fingernail. Its diminutive size leaves space to integrate additional hardware, and its relatively powerful specs would make it a good fit for small devices, like smart coffee makers.

Continue Reading

Raspberry Pi gets an ePaper display screen from PaPiRus

Raspberry Pi gets an ePaper display screen from PaPiRus

Raspberry Pi has practically unlimited possibilities in the hands of talented hackers and makers. Even Silicon Valley giants like Microsoft are realizing Raspberry Pi's potential, as Windows 10 will have support for the DIY developer's board. Now, the same e-ink that has been successfully used in various devices from the original Amazon Kindle to Pebble's smartwatch can be incorporated into Pi creations. Pi Supply is using Kickstarter to crowdfund its PaPiRus HAT, so hackers will now have the choice of an e-ink screen HAT for their mini computers.

Continue Reading

CareFirst health insurer hacked: up to 1.1m customers affected

CareFirst health insurer hacked: up to 1.1m customers affected

Recently we reported that the number of health care providers that have suffered some sort of breach sit at the 90-percent mark (over the last two years), and though some have taken steps to protect their networks, many are still vulnerable. Today it was announced that the health insurer CareFirst had been breached, making it the third in the United States to suffer such an attack (or, at least, to disclose as much). The attack took place in June of last year, and is said to have been sophisticated, affecting up to 1.1 million of the insurer’s customers. The company is based in Maryland but services the Washington DC region.

Continue Reading

Experts say researcher’s in-flight hacking claims are dubious

Experts say researcher’s in-flight hacking claims are dubious

Making headlines yesterday, security researcher Chris Roberts is being investigated by the FBI for claiming the ability to mess with a plane's flight systems from onboard. An ill-received tweet started it all, as Roberts claimed he could hack his flight's oxygen regulation. Roberts went on to tell the FBI that he hacked en-route 15 to 20 times over the several years using his laptop, modified cables, and the in-flight entertainment systems. He even claimed to be able to access engine commands and make his plane move sideways. Industry experts are calling Roberts out on his claims, citing a range of reasons why his claims are dubious, if not impossible.

Continue Reading

Prev 3 4 5 6 7 8 9 10 11 Next