UPS Malware Data Breach

UPS is the latest company to acknowledge major malware breach

By on August 21, 2014 at 8:05 AM.

UPS is the latest company to acknowledge major malware breach

Following the many cases of malware attacks targeting various retail stores to steal personal customer data, including Target, Neiman Marcus, or P.F. Chang’s, UPS is the next in line to acknowledge such a security breach. The Wall Street Journal reports that 51 UPS locations have been hit in a heist where hackers have accessed data for approximately 105,000 customer transactions between January and August.
More →

No Comments
TSA Scanners Security Issues

Researchers can easily fool former TSA X-ray scanners and sneak in dangerous weapons

By on August 20, 2014 at 10:30 PM.

Researchers can easily fool former TSA X-ray scanners and sneak in dangerous weapons

This isn’t the first time someone managed to sneak by a weapon past a TSA Rapiscan full-body X-ray scanner, but Wired reports that scientists have taken the procedure to a new level and have come up with various techniques to completely fool the security device. More →

No Comments
iPhone Jailbreak Malware App

Watch out for this frighteningly smart malware that’s infected over 75,000 jailbroken iPhones

By on August 20, 2014 at 2:35 PM.

Watch out for this frighteningly smart malware that’s infected over 75,000 jailbroken iPhones

The malware protection that comes with Apple’s walled-off garden is only so good as long as you stay in that confined space, as otherwise hackers will be able to attack you with malicious programs. Specifically, jailbroken iPhones, which can install any iOS app whether it’s approved by Apple or not, are obviously susceptible to malware attacks, and a Virus Bulletin advisory notice details one such malicious program that has infected at least 75,000 iOS devices to date. More →

No Comments
Smartphone Gyroscope Security Flaw

Researchers figure out how to spy on your smartphone in a way you’ll never see coming

By on August 15, 2014 at 9:15 PM.

Researchers figure out how to spy on your smartphone in a way you’ll never see coming

One common smartphone sensor that never seemed to pose much of a threat might in fact be the key to eavesdropping on a stranger’s conversation from afar. According to Wired, a group of researchers from Stanford University and the Israeli defense research group Rafael are going to hold a presentation at the Usenix security conference next week that will demonstrate how the gyroscope in your phone can be converted into “crude microphones” which can pick up sound waves in the area. More →

No Comments
Top 8 Worst Security Breaches

Is your data really safe? These are the 8 worst security breaches in history

Is your data really safe? These are the 8 worst security breaches in history

By on August 14, 2014 at 12:20 PM.

Can your online data ever really be safe? Not when malicious hackers are lurking around every virtual corner, constantly developing devious new ways to steal sensitive data including passwords and credit card information. Online security is constantly improving, of course, but even the biggest companies in the world are susceptible to security breaches. And the sad truth of the matter is that there’s nothing you can do to protect your data once it’s stored on a company’s servers.

In case that harsh realization isn’t scary enough on its own, a new graphic helps remind us of the eight worst online security breaches in recent history. More →

No Comments
Snowden NSA MonsterMind Program

The NSA wants to eliminate malware once and for all, no matter the cost

By on August 13, 2014 at 8:15 PM.

The NSA wants to eliminate malware once and for all, no matter the cost

Well over a year after the Snowden leaks changed the way we think of security in the United States, the man still has plenty of information left to reveal. In an exhaustive interview with Wired’s James Bamford, Snowden discussed the NSA’s development of a new cyberwarfare program codenamed MonsterMind which could automatically seek out patterns that indicate a looming cyberattack and stop them at the source. More →

No Comments
BlackBerry Vs. Blackphone Hackers

The world’s most secure Android phone gets rooted in just 5 minutes

By on August 11, 2014 at 11:30 AM.

The world’s most secure Android phone gets rooted in just 5 minutes

That sound you hear is BlackBerry executives cackling madly. N4BB points out that hacker @TeamAndIRC managed to root the Blackphone in just five minutes by enabling the Android Debugging Bridge (ADB) without unlocking the bootloader.  More →

No Comments
Android SMS Banking Malware

Dangerous Android malware can do anything it wants with over 500K infected devices

By on August 7, 2014 at 11:35 AM.

Dangerous Android malware can do anything it wants with over 500K infected devices

A new piece of dangerous malware has apparently been discovered, RT.com reports, and it’s running on more than half a million Android devices from the U.S., Europe and Russia. The malicious program, which has been discovered by Russian security firm Group-IB, gives attackers complete control of those devices once it’s installed. More →

No Comments
Chinese Government Bans Apple Products

Apple has a brand-new reason to hate the NSA

By on August 6, 2014 at 12:20 PM.

Apple has a brand-new reason to hate the NSA

Because of security concerns, the Chinese government has banned Apple tablets and laptops from the list of devices its departments can purchase for their employees with public money. According to Bloomberg, government officials familiar with the matter say that ten Apple products, from the iPad and iPad mini to the MacBook Air and MacBook Pro, were not included in a government  procurement list sent out in July. More →

No Comments
Russian Hackers Internet Login Heist

Russian hackers have stolen an astonishing 1.2 billion login credentials

By on August 6, 2014 at 11:55 AM.

Russian hackers have stolen an astonishing 1.2 billion login credentials

Less than a dozen young  Russian hackers have “audited the Internet,” as one security researcher told The New York Times, and have stolen a massive amount of usernames and password combinations that are used for login purposes on hundreds of thousands of websites. Instead of selling them on the black market, the hackers are apparently using them to sell spamming services to interested parties. More →

No Comments
In-Flight Wi-Fi Hack

Gulp: Researcher finds that you can hack airplanes through in-flight Wi-Fi

By on August 4, 2014 at 10:30 PM.

Gulp: Researcher finds that you can hack airplanes through in-flight Wi-Fi

Everyone loves in-flight Wi-Fi… until it allows a hacker to infiltrate the plane’s satellite communications equipment. CBCNews brings us word that security researcher Ruben Santamarta of IOActive is going to present new findings at the Black Hat conference in Las Vegas this week showing how to use a plane’s Wi-Fi and even its in-flight entertainment system to hack into its satellite equipment. More →

No Comments
Smartphone Hack

Hackers can seize control of your phone using software preinstalled by your carrier

By on August 1, 2014 at 9:20 AM.

Hackers can seize control of your phone using software preinstalled by your carrier

With fears over hacking and NSA spying still mounting, the last thing we needed was yet another report of a serious vulnerability that leaves millions of people at risk — but that’s exactly what we got recently when news broke of a huge security vulnerability that impacts millions upon millions of Android phones, BlackBerry handsets and even some iPhones. More →

No Comments