hacking

Keyless-entry cars can be stolen with this new ‘mystery hack’

Keyless-entry cars can be stolen with this new ‘mystery hack’

As cars become more and more reliant on computers and operating systems, not just in their engines but in the ways drivers interact with them, they continue to be susceptible to hacks and other software-based attacks. The latest example comes from the US's National Insurance Crime Bureau (NICB), which has identified a new tool that can allow thieves to unlock cars equipped with keyless-entry, start the engine, and simply drive off.

Continue Reading

CIA report says Russia interfered with election in effort to help Trump

CIA report says Russia interfered with election in effort to help Trump

Only yesterday it was revealed that US President Obama has ordered an investigation into the effects Russian cyber attacks had on this year's election, however it appears the CIA has already made its own assessment, determining that the goal was to benefit Donald Trump. Both the Washington Post and NY Times have reported that the CIA has already briefed senators on its conclusion, noting that it was "clear" Russia wanted to see Trump get into the White House.

Continue Reading

Obama orders review of hacks during Trump Clinton election cycle

Obama orders review of hacks during Trump Clinton election cycle

The White House has ordered an investigation into hacking done to disrupt the 2016 Presidential Elections here in the United States. This order from President Obama came not long after Trump's most recent Time Magazine interview in which he said he does not believe the U.S. intelligence community in their assessment that Russia attempted to affect the outcome of this year's Presidential Election. Word of an investigation directed by President Obama came through Lisa Monaco, the Obama's top counterterrorism adviser, earlier today.

Continue Reading

AdultFriendFinder hacked, 412 million accounts in jeopardy

AdultFriendFinder hacked, 412 million accounts in jeopardy

Let’s face it. Adult sites are just begging to be hacked, seen as treasure troves not just of sensitive data but also of details that most people would prefer to keep secret. Of course, that hasn’t stopped said people from flocking to these kinds of networks anyway. Case in point is a recent hack that target the Friend Finder Network, which includes AdultFriendFinder, Cams, and Penthouse, among other sites, which has yielded more than 400 million customer accounts representing 20 years worth of data.

Continue Reading

Massive cyberattack the result of malware-infected IoT devices

Massive cyberattack the result of malware-infected IoT devices

The widespread internet outage that affected a number of the US's biggest websites on Friday was the result of a huge distributed denial of service (DDoS) attack on Dyn, a domain name registration provider. Now security expert Brian Krebs, of Krebs on Security, has reported that the attack was carried out through the use of a botnet using the Mirai malware, which made use of a wide range of compromised IoT (Internet of Things) devices.

Continue Reading

Netflix is down, so is Spotify and Twitter

Netflix is down, so is Spotify and Twitter

Netflix and Twitter were amongst an array of websites and services taken down this morning by a DDoS attack. This list of sites and services also appears to have included SoundCloud, Disqus, PayPal, Spotify, and Reddit. Spotify reported issues to the public starting at 8AM Central time this morning, the 21st of October, 2016.

Continue Reading

How the Yahoo mail hack affects you, and what to do

How the Yahoo mail hack affects you, and what to do

Today is was revealed that Yahoo experienced a breach of account names and passwords of epic proportions. Now we're running down the ways which users - any user of Yahoo products of all sorts, with Yahoo accounts - should move forward. This includes password changing. This includes the potential use of Yahoo's Account Key. It includes not having a heart attack about the situation while, at the same time, understanding that one's account breach could mean some very serious things.

Continue Reading

Tencent security lab says Tesla Model S is easily hacked

Tencent security lab says Tesla Model S is easily hacked

Along with the promise of hi-tech features like full or semi autonomous driving, modern cars that sport all kinds of sensors, connectivity features, and remote controls have also brought concerns about security and safety. In particularly, cars that can be controlled remotely have become the target of many researchers’ hacking attempts. Such was the case with the Tesla Model S and Tencent’s Keen Security Lab, revealing how it was possible to manipulate the electric car from a distance, whether it’s parked or even while it’s moving.

Continue Reading

Hacking group OurMine takes control of Variety website, spams readers with email

Hacking group OurMine takes control of Variety website, spams readers with email

The group of hackers going by the name OurMine managed to briefly take over the website for the entertainment new outlet Variety this weekend. If the name OurMine sounds familiar, it's because the same collective was responsible for hacking social media accounts belonging to high-profile tech CEOs recently, including Twitter's Jack Dorsey, Google's Sundar Pichai, and even Mark Zuckerberg of Facebook.

Continue Reading

Twitter hackers manage to reactivate banned accounts

Twitter hackers manage to reactivate banned accounts

Twitter has been known to ban accounts for several reasons, such as if they're connected to known hacking groups or extremist organizations, and sometimes if the use is offensive/abusive. Once an account has been suspended, there's really not supposed to be anyway to reverse the ban unless the social network itself decides to. That's why is comes as a surprise that hackers have not only gained control of a handful of said accounts, but actually managed to reactivate them as well.

Continue Reading

Hackers can steal data via the sounds of a hard drive

Hackers can steal data via the sounds of a hard drive

Just about anytime you think you and your computer are safe from hackers and security weaknesses, some bizarre, unexpected method or flaw gets discovered. Case in point: security researchers have come up with a way to steal data from a computer's hard drive just by listening to the sounds it makes. Not only can information be transmitted without a users' knowledge, but their computer doesn't even need to be connected to the internet.

Continue Reading

Samsung Pay MST tech shown to be susceptible to theft, fraud [UPDATE]

Samsung Pay MST tech shown to be susceptible to theft, fraud [UPDATE]

Samsung Pay has surprisingly been enjoying a significant amount of popularity and support in the US, rivaling even Apple Pay. Part of its success can perhaps be attributed to its Magnetic Secure Transmission or MST, a technology it acquired from LoopPay, which allows Samsung Pay to be used with traditional magstrip-based terminals. It seems, however, there might be a very high price to pay for that convenience. In a talk at the Black Hat security conference in Las Vegas, researcher Salvador Mendoza showed how easy it was to steal Samsung Pay's MST data so that hackers and thieves can use credit card data with almost no restrictions.

Continue Reading

1 2 3 4 5 Next