iOS and Android Encryption

Congress not likely to force iOS and Android decryption for the FBI

By on October 22, 2014 at 7:30 PM.

Congress not likely to force iOS and Android decryption for the FBI

Apple has more than once reminded customers it values their security and privacy and has been reassuring them that they won’t become the company’s “product” and that their data will be safely encrypted. Similarly, Google also said it will encrypt Android devices by default. Since then, the FBI and others have complained that Apple and Google will be basically helping bad guys get away with bad things thanks to encrypted devices. More →

No Comments
Staples Credit Card Breach

Is Staples the latest retailer to get hit with a huge credit card breach?

By on October 21, 2014 at 6:05 PM.

Is Staples the latest retailer to get hit with a huge credit card breach?

Brian Krebs, the man who originally reported the Home Depot data breach earlier this year, now believes that Staples has been subjected to a data breach of its own. Krebs says that at least six banks noticed a pattern of debit and credit card fraud in several Staples branches, indicating that card data might have been accessed. More →

No Comments
Apple China iCloud Attack

Apple falls victim to an iCloud attack from the Chinese government, servers not affected

By on October 21, 2014 at 2:26 PM.

Apple falls victim to an iCloud attack from the Chinese government, servers not affected

The Chinese government is currently staging an attack on Apple’s iCloud, according to Internet censorship monitor Greatfire.org. The report claims that this main-in-the-middle (MITM) attack is an attempt to gain access to the private information of Chinese citizens, including texts, pictures and contacts. The attack coincides with the launch of the iPhone 6 and 6 Plus in China. More →

No Comments
Obama on Credit Card Security

Obama’s new order: U.S. government’s credit card security must be improved

By on October 20, 2014 at 9:45 PM.

Obama’s new order: U.S. government’s credit card security must be improved

In the wake of the numerous sophisticated cyberattacks that managed to steal credit and debit card data from various retail stores in the U.S., President Obama on Friday signed an executive order to improve security for credit cards and payment systems used by the government, The New York Times reports.  More →

No Comments
Phone Bill Premium Number Hack

Hackers perfect a new way to steal money from unsuspecting basic tech users

By on October 20, 2014 at 8:15 PM.

Hackers perfect a new way to steal money from unsuspecting basic tech users

Smart hackers who understand how always-connected devices work — and who know how to exploit the various security bugs found in operating systems — are capable of infecting mobile devices with malware that can of incur costs and/or steal data. They can do this using a number of methods: By grabbing personal data in sophisticated attacks targeting retail store chains and banks, conducting advanced online phishing attacks, or stealing money directly from ATMs, to name just a few of the recent security threats detailed by various reports. More →

No Comments
iOS Android Smartphone Encryption

The FBI ratchets up its scare campaign over smartphone encryption

By on October 17, 2014 at 9:05 PM.

The FBI ratchets up its scare campaign over smartphone encryption

Did you know that if Apple and Google encrypt data on smartphones then terrorists, pedophiles and other very bad people will be able to roam completely free and likely destroy society as we know it? That’s the message that Federal Bureau of Investigation chief James Comey has been sending and he was at it again this week in a speech delivered to the Brookings Institute in which he railed against smartphone encryption as a direct threat to law enforcement’s ability to gather evidence. More →

No Comments
Windows 8.1 Zero-Day Security Bug

A dangerous bug in Windows 8.1 and older versions could be used to spy on you

By on October 14, 2014 at 12:40 PM.

A dangerous bug in Windows 8.1 and older versions could be used to spy on you

Russian hackers have apparently identified a previously unreported bug in Windows, also known as a zero-day attack, which was then used to spy on several Western governments, NATO and the Ukrainian government, The New York Times reports. More →

No Comments
Dropbox Username and Password Hack

Dropbox denies data breach, as hacker says 7M accounts compromised

By on October 14, 2014 at 6:45 AM.

Dropbox denies data breach, as hacker says 7M accounts compromised

An anonymous user posted on Pastebin hundreds of Dropbox usernames and passwords, teasing that he has access to login credentials for as many as 7 million Dropbox accounts. However, it’s not clear where the person got the list, The Next Web reports, and Dropbox says its security hasn’t been compromised. More →

No Comments
Kmart Credit Card Data Breach

Kmart confirms month-long credit card data breach

By on October 13, 2014 at 6:50 AM.

Kmart confirms month-long credit card data breach

Kmart on Friday confirmed that its systems were breached by hackers who were able to steal credit and debit card data for customers shopping in its retail stores since early September to October 9, when the breach was discovered. It’s not clear at this time how many customers may have been affected or how many Kmart stores have been hit, as the company is yet to announce any numbers. More →

No Comments
The Snappening

The Snappening: Massive leak exposes thousands of nude photos and videos

By on October 10, 2014 at 9:30 AM.

The Snappening: Massive leak exposes thousands of nude photos and videos

It looks like celebrities aren’t the only targets for hackers in search of nude photos and videos. Following a series of iCloud hacks dubbed “The Fappening” that led to the release of hundreds of nude and risqué celebrity photos, hundreds of thousands of Snapchat users will wake up on Friday morning to find that their private images and video clips have been stolen and leaked on the web. Snapchat allows users to exchange photo and video messages that are automatically erased after a period of time, but many people utilize third-party Snapchat clients that automatically save the images and videos before they are deleted.

As it turns out, at least one of those third-party clients has been hacked, and the perpetrators have been saving each and every piece of media viewed with its service for the past two years. Now, all of those photos and videos have been leaked. More →

No Comments
Android Security Flaw

Half of all Android phones are still vulnerable to a massive privacy bug – here’s how to protect yourself

Half of all Android phones are still vulnerable to a massive privacy bug – here’s how to protect yourself

By on October 9, 2014 at 9:55 AM.

Software update delays are an inevitability because of the way the Android ecosystem is built, but these delays aren’t just an annoyance for Android users — they can be dangerous. A bug was discovered by security researcher Rafay Baloch in early September, and it caused Android’s stock web browser to fail to enforce same origin policy (SOP), which is a protocol that governs how browsers securely load content from multiple sources. The bug impacted all pre-KitKat devices, and it was patched fairly quickly by Google.

But because it takes so long for handset makers and carriers to test and distribute Android updates, a new study has determined that nearly half of all Android phones are still affected by the bug. More →

No Comments
ATM Malware Hacks

The ultimate ATM heist still works, has netted hackers ‘millions of dollars’

By on October 8, 2014 at 1:25 PM.

The ultimate ATM heist still works, has netted hackers ‘millions of dollars’

In early January, and then again in March, reports detailed some smart ATM attacks that allowed hackers to steal money from malware-infected ATMs without requiring any access to the credit or debit cards used by customers. Instead, hackers managed to steal cash directly from the bank, after taking over the machines with special programs. This ultimate heist appears to still be working, The Register reports, as hackers are still using the practice that has netted them “millions of dollars.” More →

No Comments