hackers

Massive cyberattack the result of malware-infected IoT devices

Massive cyberattack the result of malware-infected IoT devices

The widespread internet outage that affected a number of the US's biggest websites on Friday was the result of a huge distributed denial of service (DDoS) attack on Dyn, a domain name registration provider. Now security expert Brian Krebs, of Krebs on Security, has reported that the attack was carried out through the use of a botnet using the Mirai malware, which made use of a wide range of compromised IoT (Internet of Things) devices.

Continue Reading

Netflix is down, so is Spotify and Twitter

Netflix is down, so is Spotify and Twitter

Netflix and Twitter were amongst an array of websites and services taken down this morning by a DDoS attack. This list of sites and services also appears to have included SoundCloud, Disqus, PayPal, Spotify, and Reddit. Spotify reported issues to the public starting at 8AM Central time this morning, the 21st of October, 2016.

Continue Reading

Diabetics warned that insulin pump has security vulnerability

Diabetics warned that insulin pump has security vulnerability

Johnson & Johnson has told people using one of its insulin pumps that there is a vulnerability in the device's security that could allow hackers to gain access to the pump and make the device deliver an overdose of insulin. An overdose of insulin could be fatal. Despite the vulnerability and risk of death if the vulnerability were exploited, Johnson & Johnson says that the risk to users of the pump is low.

Continue Reading

iPhone 7 “hack” drills hole for headphones

iPhone 7 “hack” drills hole for headphones

It would appear that some massively uninformed iPhone 7 users are falling for a hoax of epic proportions. The folks at TechRax have created a video which suggests - in title, only, really - that there is a secret "hack" to gain access to the iPhone 7's (perhaps hidden) headphone jack. The idea here is that the iPhone 7 has the hardware it needs to allow a headphone jack, but Apple has just covered up the area we'd need to plug the cord in. Then comes the power drill.

Continue Reading

Hacking group OurMine takes control of Variety website, spams readers with email

Hacking group OurMine takes control of Variety website, spams readers with email

The group of hackers going by the name OurMine managed to briefly take over the website for the entertainment new outlet Variety this weekend. If the name OurMine sounds familiar, it's because the same collective was responsible for hacking social media accounts belonging to high-profile tech CEOs recently, including Twitter's Jack Dorsey, Google's Sundar Pichai, and even Mark Zuckerberg of Facebook.

Continue Reading

Twitter hackers manage to reactivate banned accounts

Twitter hackers manage to reactivate banned accounts

Twitter has been known to ban accounts for several reasons, such as if they're connected to known hacking groups or extremist organizations, and sometimes if the use is offensive/abusive. Once an account has been suspended, there's really not supposed to be anyway to reverse the ban unless the social network itself decides to. That's why is comes as a surprise that hackers have not only gained control of a handful of said accounts, but actually managed to reactivate them as well.

Continue Reading

Twitter’s Jack Dorsey is latest tech CEO to get account hacked

Twitter’s Jack Dorsey is latest tech CEO to get account hacked

The last few weeks have seen a number of social networking accounts belonging to high-profile tech company CEOs getting hacked and making posts. First there was Facebook's Mark Zuckerberg, with his accounts on LinkedIn, Twitter, and Pinterest getting breached. Then the same thing happened to Google CEO Sundar Pichai and his Quora profile. The latest to join the club is Twitter's Jack Dorsey, who saw his account on his own platform briefly compromised this weekend.

Continue Reading

The Pentagon expands program for hackers to test its security

The Pentagon expands program for hackers to test its security

Back in March, the US's Department of Defense launched a "Hack the Pentagon" campaign to get hackers to test their websites and security networks for vulnerabilities, without the threat of jail time. The project was so successful that the government agency has announced it's being expanded, including more DoD websites and networks, with further cash incentives for hackers. Think of it like the bug bounty programs that Google, Facebook, and other tech companies offer, except hackers get to put the government's most secure facilities to the test.

Continue Reading

Twitter didn’t have a password breach, your uncle did

Twitter didn’t have a password breach, your uncle did

This week a leak to the dark web included the passwords of thousands if not millions of Twitter users. Through our first report on this leak, LeakedSource suggests that the bulk of the users affected by this data breach were and are in Russia. It was also reported earlier this week that it was not Twitter itself that was hacked, but a vast number of users that, via malware, were being monitored and, as they used Twitter, their Twitter passwords were recorded.

Continue Reading

Why the MySpace hack matters to you, a non-MySpace user

Why the MySpace hack matters to you, a non-MySpace user

If you've ever used MySpace in the past, now is the time to change your current passwords. Don't bother changing your MySpace password - that ship has essentially sailed (unless you still use MySpace). I mean change every other password you have, especially if you happen to be using the same password now that you used back then, but here and now for a different service. This is more common than you might think. Lots of people do it.

Continue Reading

Android SoC security keys extracted: Qualcomm TrustZone in question [UPDATE]

Android SoC security keys extracted: Qualcomm TrustZone in question [UPDATE]

A security exploit appears to have been discovered which allows smart devices (mostly Android) with Qualcomm processors to be hacked into easily. This story began as documented on the blog Bits, Please back in April of 2015, when user "laginimaineb" decided to reverse-engineer Qualcomm's TrustZone implementation on Snapdragon processors. Using a Nexus 5 smartphone, this user detailed "a chain of vulnerabilities that I've discovered which will enable us to escalate our privileges from any user up to the highest privilege of all - executing our code within TrustZone itself."

Continue Reading

Milwaukee Bucks prove even NBA teams fall victim to email phishing

Milwaukee Bucks prove even NBA teams fall victim to email phishing

Internet fraud tricks new victims all the time, but what you don't hear about everyday is an entire NBA team getting duped. Sadly, that's what's happened to the Milwaukee Bucks, who have revealed that financial data on all employees of the basketball team, including players, has been compromised. Turns out the old tactic of email phishing was used, with an employee releasing 2015 tax records after someone impersonated team president Peter Feigin.

Continue Reading

1 2 3 4 5 Next