Hacking

Verizon’s Visible MVNO may have been hacked

Verizon’s Visible MVNO may have been hacked

Aside from the big three, previously four, US network operators, there are quite a number of smaller carriers catering to more specific segments of the phone market. The advent of MVNOs or Mobile Virtual Network Operators has only increased the number of players, but these often still call those bigger networks their home. Visible, for example, is Verizon's attempt at servicing more budget-conscious customers, and it may have been the latest victim of a security breach that has its subscribers up in arms.

Continue Reading

USB-C iPhone hack made real

USB-C iPhone hack made real

So you're disappointed with the fact that Apple continues to use their own Lightning port on the iPhone here in 2021. You're looking for a way to continue using your iPhone, but also have the... luxury(?) of using USB-C cords whenever you like. A man by the name of Ken Pillonel wanted to use USB-C with his iPhone too - so he went wild with the hacking and the modding.

Continue Reading

iOS 14.8 closes FORCEDENTRY zero-click exploit linked to Pegasus spyware

iOS 14.8 closes FORCEDENTRY zero-click exploit linked to Pegasus spyware

Apple's privacy stance, even in the face of government pressure, may have endeared it to many activists and people of interest, but that also means its devices have become even bigger hacking targets. Several high-profile organizations and companies have made it their business to circumvent Apple's strong protections and pilfer data from compromised iPhones and Macs, often owned by people in danger of state-sponsored espionage. That seems to be the case with a new exploit discovered this year that has been traced to the notorious NSO Group's Pegasus spyware, and all that it takes to trigger the exploit is a seemingly innocuous GIF sent through iMessage.

Continue Reading

Fortinet VPN hacker leaks 500,000 users’ passwords

Fortinet VPN hacker leaks 500,000 users’ passwords

Virtual Private Networks or VPNs have long been used to hide one's actual location and activities on the Internet, either for security purposes or for bypassing region locks. It is one of the standard arsenals in network security, but a VPN isn't a bulletproof solution, especially if the VPN itself is the one that gets hacked. That's the nightmare scenario that users of the popular Fortinet VPN product are now finding themselves in after a hacker just dumped 500,000 user names and passwords on the Internet for absolutely free.

Continue Reading

OMG USB-C to Lightning cable is a keylogger in disguise

OMG USB-C to Lightning cable is a keylogger in disguise

Most of the hacking incidents and security vulnerabilities we often see published happen remotely, often through malware that has been installed without the user's knowledge. Local Privilege Escalations or LPEs are often rarer because they need physical access to a target computer or device. There is, however, a very specific class of security attacks that involve a little bit of both, like in the case of an innocent-looking USB cable that will actually let a hacker see everything you type on a keyboard connected to it.

Continue Reading

How working for Google changed Android hacking for Magisk maker John Wu

How working for Google changed Android hacking for Magisk maker John Wu

The creator of the popular Android hacking (rooting, modifying) system Magisk revealed some key updates this week. After having been hired by Google in May of this year, John Wu went a bit silent for a while. Rumors ran wild - which is understandable, when one of the most prominent Android hackers joins Google's Android Platform Security team. Now we get a bit of clarity.

Continue Reading

T-Mobile confirms data breach but isn’t sure what was accessed

T-Mobile confirms data breach but isn’t sure what was accessed

2021 didn't start out great for T-Mobile, and it seems that its luck isn't turning for the better just yet. In addition to the severe winter freeze earlier this year and increased scrutiny over its Sprint acquisition, it is facing not one but two severe hacking incidents. T-Mobile just confirmed that it has indeed been the victim of a data breach, but it is still investigating what data was illegally accessed and if that data really included customer information.

Continue Reading

T-Mobile data breach spills personal data in bulk

T-Mobile data breach spills personal data in bulk

This week a T-Mobile data breach appears to have spilled the personal data of millions of user across the USA. This breach involved T-Mobile server data that included an array of personal information for T-Mobile customers of all sorts. Data includes names, social security numbers, drivers license info, IMEI numbers, phone numbers, and physical addresses.

Continue Reading

Shiny Pokemon “cheat” in Sword and Shield made easy with Switch Up

Shiny Pokemon “cheat” in Sword and Shield made easy with Switch Up

There's a Pokemon Sword and Pokemon Shield Shiny farming method available now for Nintendo Switch that... isn't exactly cheating, but certainly isn't natural. The Collective Minds "Switch Up 2.0" connects to your Nintendo Switch and works with a Nintendo Switch handheld controller to allow macros to work. A combination of buttons on the controller effectively chains commands to the Switch, allowing you to cut your farming (or any number of other activities) time down a LOT.

Continue Reading

Gigabyte ransomware attack includes Intel, AMD confidential documents

Gigabyte ransomware attack includes Intel, AMD confidential documents

Given how the world today revolves around data and digital files, it shouldn't be a surprise how ransomware has become the most dangerous and also most rampant form of malware in recent years. From individual users to large corporations, anyone and everyone can be a victim, with larger entities promising the biggest potential profits. That could be the case with Taiwan-based computer hardware manufacturer Gigabyte, whose latest cyberattack incident puts other tech giants also at risk.

Continue Reading

700 million LinkedIn user records are now being sold to hackers

700 million LinkedIn user records are now being sold to hackers

Social networks are often associated with a younger demographic and unprofessional behavior, but the term technically includes even networks used for more serious matters. For more than a decade now, LinkedIn's name has become synonymous with professional networking, the kind of thing you'd often do at parties and social gatherings, except completely online. It might not be as big as a catch as Facebook, but that still makes LinkedIn a prime target for hacks and leaks, as shown by this latest incident involving 700 million user records.

Continue Reading

WD My Book Live mass-wipe might have been due to a zero-day bug

WD My Book Live mass-wipe might have been due to a zero-day bug

Very few things in modern computing probably scare people more than the thought of losing years of data in a blink of an eye. That nightmare, unfortunately, became a reality for thousands of owners of Western Digital's discontinued My Book Live storage last week. Years' worth of files, photos, videos, and everything in between were remotely erased because of some malicious actors that may have been competing with each other. What makes matters worse is that Western Digital itself may have had a hand in actually enabling one of two vulnerabilities that made this remote mass-wipe possible.

Continue Reading

1 2 3 4 Next