NSA Auroragold Cellphone Encryption

Of course the NSA spied on people who were working on better phone encryption

By on December 4, 2014 at 8:00 PM.

Of course the NSA spied on people who were working on better phone encryption

The NSA’s far-reaching powers have been further detailed in an extensive report from The Intercept, which reveals that the agency has conducted an advanced spying operation for years in an effort to spy on mobile operators working on phone encryption. The operation reportedly also targeted bodies that oversee telecom standards, in order to stay updated on new security protocols and identify or even insert vulnerabilities into those communication networks it wanted access to. More →

No Comments
Sony Pictures vs. North Korea

Sony is convinced North Korea was behind massive hack, but DPRK denies

By on December 4, 2014 at 6:50 AM.

Sony is convinced North Korea was behind massive hack, but DPRK denies

Sony Pictures has been the victim of a massive cyber attack a few days ago, with hackers having stolen as much as 100 terabytes of data including various unreleased Sony movies, and plenty of business and personnel data. After investigating the matter, Sony appears to be convinced that North Korea was behind the attack, but the country has denied any involvement after previously refusing to flat-out deny such allegations. More →

No Comments
Iran Operation Cleaver Cylance

Iran hackers might be launching in extensive cyber attack on targeting top companies

By on December 3, 2014 at 6:50 AM.

Iran hackers might be launching in extensive cyber attack on targeting top companies

Iran-based hackers are believed to have infiltrated some of the world’s “top energy, transport and infrastructure companies” from various countries over the past two years, Reuters says, citing an 87-page report from cyber security company Cylance. More →

No Comments
FBI: Destructive Malware Warning

‘Destructive’ malware may have hit Sony Pictures, other companies warned

By on December 2, 2014 at 4:25 PM.

‘Destructive’ malware may have hit Sony Pictures, other companies warned

Sony Pictures was hit by unknown hackers last week who managed to steal various sensitive information, including high-quality digital versions of several unreleased Sony movies, prompting the FBI to issue a five-page warning to certain U.S. businesses regarding a new type of “destructive” malware. A copy of the memo has been obtained by Reuters. More →

No Comments
Apple iPhone Touch ID Hack

Clever 7-year-old discovers how to bypass Apple’s Touch ID in the simplest way possible

By on December 2, 2014 at 1:55 PM.

Clever 7-year-old discovers how to bypass Apple’s Touch ID in the simplest way possible

While we’ve been reading about elaborate hacks of Apple’s Touch ID fingerprint identification system for more than a year now, one clever 7-year-old boy has figured out the simplest way to bypass the system without knowing one line of code. CNN Monday reports that Harrison Green, the 7-year-old son of Johns Hopkins University professor Matthew Green, smartly snuck into his father’s room while he was asleep and pressed his dad’s fingerprint against the Touch ID scanner on his iPhone 6 Plus. Voila — instant “hack.” More →

No Comments
FIN4 Wall Street Phishing Scheme

This could be the most advanced phishing scheme yet… and you might not even be the target

By on December 2, 2014 at 6:50 AM.

This could be the most advanced phishing scheme yet… and you might not even be the target

A new advanced phishing scheme going after a specific type of target has been discovered by security firm FireEye, which detailed the cyber attack in a new report. Specifically, a highly educated group going by the name of FIN4 has been discovered to target certain Wall Street companies, looking to obtain sensitive information about certain companies, transactions, and special deals, in order to later make use of it for financial gain.

More →

No Comments
Cheap Black Friday Android Tablets

Dirt-cheap Android tablets from Best Buy, Walmart, elsewhere found to ship with major security flaws

By on November 26, 2014 at 7:15 PM.

Dirt-cheap Android tablets from Best Buy, Walmart, elsewhere found to ship with major security flaws

Many retailers are ready to offer buyers various interesting deals on smartphones and tablets this year on Black Friday, but not all products are safe for consumers, new research from security company Bluebox Labs reveals. Apparently, certain dirt-cheap Android tablets might come with major security vulnerabilities on board. More →

No Comments
GCHQ/NSA Submarine Cables Spy Operations

Massive surveillance operations possible with explicit help from telecom companies

By on November 26, 2014 at 6:50 AM.

Massive surveillance operations possible with explicit help from telecom companies

U.S. and U.K. spy agencies including the NSA and GCHQ, respectively, have performed a variety of sophisticated spy operations, collecting massive amounts of personal data, as many Edward Snowden leaks revealed in the past year. German publication Süddeutsche Zeitung has published a new report that reveals that as far back as 2009 the GCHQ, and thus also the NSA, had massive access to submarine cable links around the globe with help from now Vodafone-owned Cable & Wireless. More →

No Comments
Google Devices and Activity Dashboard

Google’s latest security tool lets you easily deactivate any connected devices

By on November 25, 2014 at 9:45 PM.

Google’s latest security tool lets you easily deactivate any connected devices

There’s a decent chance that if you read BGR and other technology blogs on a regular basis, you own multiple connected devices. Most of these devices are probably connected to your Google account as well, especially considering the fact that Gmail has become one of the primary email services for work and personal use.

But could you list every single device that currently has access to your Google account? More →

No Comments
Regin Malware Spying Tool

The most advanced malware yet has been spying on you for years

By on November 25, 2014 at 6:50 AM.

The most advanced malware yet has been spying on you for years

Security researchers have discovered a highly advanced malware program, called Regin, that have been used for spying purposes for at least six years. First discovered by Symantec and confirmed by Kaspersky, the security threat is believed to be the work of a government, considering the massive resources behind it and its sophisticated features, rather than a program devised by hacker groups interested in stealing data and/or money from regular Internet users. More →

No Comments
New Malware Password Manager

Frightening new malware targets your password manager

By on November 24, 2014 at 8:00 PM.

Frightening new malware targets your password manager

If you thought hackers gaining access to just one of your online accounts was troublesome, you’ll be terrified to know that the next frontier might put your entire online identity at risk. IBM’s Security Intelligence reports that a new configuration of the Citadel trojan has been designed to start keylogging when specific password managers begin running on an infected user’s computer. More →

No Comments
iOS 8 Security Flaw

Here’s why the iPhone ‘Masque Attack’ security flaw is so scary

By on November 21, 2014 at 12:47 PM.

Here’s why the iPhone ‘Masque Attack’ security flaw is so scary

Earlier this month, researchers at cybersecurity firm FireEye discovered a vulnerability in the iOS operating system which could allow hackers to replace legitimate apps with malicious copies, giving them access to any data the user entered into the hacked app. These “Masque Attacks” were enough of a threat to convince the U.S. government to release a statement warning iPhone users to avoid downloading apps from third-party sources until the issue could be resolved.

Apple was quick to issue its own response, downplaying the severity of the vulnerability, but further research by Trend Micro seems to indicate that the threat is even more serious that originally reported. More →

No Comments