Featured
DDoS Attacks Report 2015 Trends

DDoS attacks are getting much more powerful and the Pentagon is scrambling for solutions

DDoS attacks are getting much more powerful and the Pentagon is scrambling for solutions

By on August 31, 2015 at 3:10 PM.

No wonder the Pentagon has announced it’s working on a plan to fund tools and researchers to help organizations defend themselves against the pervasive threat of cyber assaults known as distributed denial-of-service (DDoS) attacks.

In recent days, the agency said it’s looking to fund researchers who can come up with tools as part of a program starting next April that would, among other things, help organizations recover from DDoS attacks in a maximum of 10 seconds. And the acknowledgement of that hunt for researchers for the program, called Extreme DDoS Defense, arguably comes not a moment too soon. More →

No Comments
Windows 10 Family Accounts Privacy Concerns

The latest Windows 10 privacy scare revolves around family accounts

By on August 27, 2015 at 7:45 PM.

The latest Windows 10 privacy scare revolves around family accounts

I’m not sure we’ve gone a week without a new story about Windows 10 invading our privacy, and this week is no exception. Earlier this week, The Independent noticed that Windows 10 will automatically send parents detailed logs of their childrens’ Internet activity by default if they open up a family account on the computer.

There’s no warning for either the children or the parents that this is happening, which raises some very serious questions about Microsoft’s right to decide what information parents have access to. More →

No Comments
iPhone iOS 8 Ins0mnia Malware

Scary iPhone malware can spy on you even after you close infected apps

By on August 27, 2015 at 2:07 PM.

Scary iPhone malware can spy on you even after you close infected apps

A rather scary piece of iPhone malware would let an attacker spy on a target using an approved App Store app without the person’s knowledge. In fact, the malware app could continue to gather data for the hackers — or for a spy agency — even after the infected app is closed by the user. Apple apparently fixed this huge vulnerability beginning with iOS 8.4.1, but earlier iOS builds are still affected. More →

No Comments
NSA Encryption Quantum Computers

Irony: NSA worried hackers with super computers might break current encryption standards

By on August 25, 2015 at 6:35 PM.

Irony: NSA worried hackers with super computers might break current encryption standards

The National Security Agency (NSA) has a bunch of sophisticated tools at its disposal to conduct massive data collection operations all in the name of doing good – and that’s definitely something you’d want from your intelligence agencies. Ironically, the NSA is already worried about the advanced computers that might be available to humans in the not so distant future, which could be used by hackers to break the complex cryptography that makes possible encryption.  More →

No Comments
Ashley Madison Hack $500,000 Reward

Ashley Madison puts out $500,000 bounty on hackers who ruined its business

By on August 24, 2015 at 5:25 PM.

Ashley Madison puts out $500,000 bounty on hackers who ruined its business

To say it’s been a rough week for cheating website Ashley Madison would be an understatement. Hackers last week posted personal information for tens of millions of Ashley Madison users, including their names and email addresses. Days later, the hackers made things even worse by publishing internal emails from Noel Biderman, the CEO of Ashley Madison parent company Avid Life, as well as the source code for Ashley Madison’s website and mobile apps. More →

No Comments
How To Encrypt Android Phones

Do this now: A step-by-step guide for encrypting your Android phone

By on August 24, 2015 at 8:35 AM.

Do this now: A step-by-step guide for encrypting your Android phone

It seems like every week there’s a major new vulnerability found in Android. What makes this even worse for users is that it will likely take them forever to get desperately needed patches thanks to Android’s fragmented and decentralized software upgrade system. All the same, there is something that you can do right now to improve the security of your Android phone’s data: You can enable encryption on your device. More →

No Comments
Ashley Madison Hack Profile Data Delete

Think you’re safe from the Ashley Madison hack because you erased your profile? Think again

By on August 21, 2015 at 7:15 AM.

Think you’re safe from the Ashley Madison hack because you erased your profile? Think again

The Ashley Madison hacking scandal is far from over and now users have yet another thing to worry about. Reports say there’s evidence Ashley Madison made millions of dollars from users who paid to have their profiles erased from its databases for good, even though the website still kept identifiable data for each of the deleted profiles. More →

No Comments
Ashley Madison Hack CEO Emails Source Code

Ashley Madison is so, so screwed

By on August 20, 2015 at 7:15 PM.

Ashley Madison is so, so screwed

The last time we saw a company that was this totally hosed was probably the time that Bitcoin exchange Mt. Gox admitted it had lost all of its customers’ Bitcoins. Ashley Madison, the notorious cheating website whose clientele got exposed this week as part of a massive hack, has just suffered another massive blow in the form of a second huge dump of stolen data onto the web. More →

No Comments
Ashley Madison Hack Search Email

How to figure out if your email was exposed in the Ashley Madison hack

By on August 19, 2015 at 3:30 PM.

How to figure out if your email was exposed in the Ashley Madison hack

What should be a dream for divorce attorneys is a nightmare for many people who thought they would be able to discreetly cheat on their spouses through the website Ashley Madison. Now that an estimated 33 million Ashley Madison users have had their personal information online, you may be wondering whether your own email address will pop up on the list. The Verge informs us that there are now at least two websites that have popped up that will help you see if your email was part of the massive data breach. More →

No Comments
Ashley Madison Hack User Data Posted

Divorce lawyers’ dream: Hackers post Ashley Madison user info online

By on August 19, 2015 at 7:45 AM.

Divorce lawyers’ dream: Hackers post Ashley Madison user info online

Oh dear. There’s about to be a spike in America’s divorce rate. Ars Technica brings us word that the Impact Team, which previously hacked into the database of infamous cheating website Ashley Madison, has now posted user information for its tens of millions of members online. And this hack is a lot more than just users’ names and email addresses — it also includes “PayPal accounts used by Ashley Madison executives, Windows domain credentials for employees, and a large number of proprietary internal documents.” Oh dear. More →

No Comments
Call Text Messages Bugging SS7 Hack

Huge phone network security flaw lets anyone bug calls and text messages

By on August 18, 2015 at 12:46 PM.

Huge phone network security flaw lets anyone bug calls and text messages

Spy agencies like the NSA and many others aren’t the only ones able to bug your calls and text messages, a new investigation shows. It turns out that anyone with the right equipment and know-how can tap into a carrier’s phone network to access calls and text messages for without the target’s knowledge. More →

No Comments
IRS Hack Fraudulent Tax Returns

IRS hack bigger in scope than initially believed, up to $50M stolen in fraudulent refunds

By on August 18, 2015 at 6:50 AM.

IRS hack bigger in scope than initially believed, up to $50M stolen in fraudulent refunds

The U.S. Internal Revenue Service (IRS) revealed on Monday that the hack disclosed to the public in May is bigger in scope than initially believed. According to the IRS, tax information belonging to thousands of other U.S. taxpayers have been stolen during the hack. The purpose of these cyberhits appears to be money related, as hackers have been using the information to generate fraudulent tax returns. More →

No Comments