iPhone Hacking

NSA reveals why it couldn’t hack the San Bernardino terrorist’s iPhone 5c

By on June 11, 2016 at 1:15 PM.

NSA reveals why it couldn’t hack the San Bernardino terrorist’s iPhone 5c

One of the more surprising aspects regarding the locked iPhone 5c involved in the San Bernardino terrorist attack of 2015 was that the FBI was unable to unlock the device by themselves. What’s more, we would later find out that even the NSA — who the FBI asked for assistance — lacked the requisite tools to unlock the device, a somewhat startling fact given all we know about the NSA’s activities and expertise.

Speaking at a conference on military technology this past Friday, NSA deputy director Richard Ledgett addressed the topic and explained why the NSA was unable to access Syed Farook’s iPhone 5c. And as it turns out, it’s not necessarily that the task was beyond the NSA’s capabilities. Rather, the iPhone 5c wasn’t a sufficiently popular device that would have warranted the NSA’s attention in the first place. In other words, the iPhone 5c was never on the NSA’s radar because the people it had an interest in tracking and spying on were using other devices.

More →

No Comments
Twitter Hacked 2016

Warning: Change your Twitter password immediately

By on June 9, 2016 at 9:14 AM.

Warning: Change your Twitter password immediately

Welcome to the internet age, where hackers are getting smarter every day and malware is lurking around every corner. We’ve seen a terrifying amount of big data breaches occur over the past few years, and each one seems bigger and scarier than the last. Today, however, we get a new reminder that data breaches are just one of the ways hackers get their hands on our data. Reports are flying that tens of millions of valid Twitter account credentials have been made available for sale on the dark web, though the company has denied that a breach took place.

Whatever the case, the most important takeaway is this: Change your Twitter password immediately. More →

No Comments
Netflix Facebook Password Change

Netflix and Facebook were not hacked, but you should still change your passwords

By on June 8, 2016 at 6:50 AM.

Netflix and Facebook were not hacked, but you should still change your passwords

Netflix and Facebook have not been hacked, but you should still change your passwords right away. The two companies are already prompting certain users to change their passwords in light of the recently revealed LinkedIn, Tumblr, and MySpace hacks. And if you like to recycle your credentials across internet services, you should consider changing the passwords for these services as soon as possible. In fact, you should try to come up with unique passwords for every internet service you use, rather than using the same ones over and over. More →

No Comments
WhatsApp Encrypted Chats Intercepted

Hackers can read your WhatsApp and Telegram chats if they wanted to

By on June 2, 2016 at 7:00 PM.

Hackers can read your WhatsApp and Telegram chats if they wanted to

WhatsApp has recently announced that all its chats are protected by end-to-end encryption, meaning that only the sender and receiver will be able to read the messages in a conversation. Telegram offers end-to-end encryption too in secret chats. But hackers can read WhatsApp and Telegram conversations with relative ease if they wanted to, and that’s all without breaking encryption. More →

No Comments
Windows Zero Day

Newly discovered zero-day exploit affects almost every version of Windows

By on June 1, 2016 at 12:47 PM.

Newly discovered zero-day exploit affects almost every version of Windows

Researchers from Trustwave’s SpiderLabs research team recently discovered a new zero-day exploit that affects all versions of Windows from Windows 2000 all the way up to Windows 10.

Trustwave initially discovered the exploit last month after seeing it advertised on a Russian hacking forum for the not-so-affordable price of $95,000. According to security researcher Brian Krebs, the exploit is of the “local privilege escalation” variety and, as a result, works in tandem with other exploits.

“An attacker may already have a reliable exploit that works remotely,” Krebs explains, “but the trouble is his exploit only succeeds if the current user is running Windows as an administrator. No problem: Chain that remote exploit with a local privilege escalation bug that can bump up the target’s account privileges to that of an admin, and your remote exploit can work its magic without hindrance.”

More →

No Comments
2017 Intelligence Authorization Act FBI Email

New law would let the FBI read your email without a court order

By on May 26, 2016 at 11:34 AM.

New law would let the FBI read your email without a court order

A new Senate bill would let the FBI and other law enforcement agencies access the contents of any US citizen’s email without a court order during investigations. Instead, the FBI would need just a National Security Letter, which would force companies to provide email access to the agency without alerting the person who’s being investigated. The FBI can already access phone records without a court order, but that law doesn’t apply to email conversations.

More →

No Comments
Craigslist Scams 2016

2 new Craigslist scams you need to watch out for

2 new Craigslist scams you need to watch out for

By on May 24, 2016 at 10:54 AM.

Craigslist’s heyday may be behind it at this point, but millions of people still flock to the site in search of all sorts of discounted goods and services. And of course, Craigslist often delivers. The trouble with the site is and always has been weeding out the scams from the genuine deals, a task that’s more difficult now than it has ever been in the past. Scammers are lurking in every corner of the site, just waiting to take advantage of vulnerable people in search of bargains.

There are plenty of potential scams to watch out for, but two in particular were recently brought to our attention. More →

No Comments
Japan ATM Credit Card Heist

Ocean’s 100: Thieves steal $12.7 million from ATMs in just three hours

By on May 23, 2016 at 9:00 PM.

Ocean’s 100: Thieves steal $12.7 million from ATMs in just three hours

The Ocean’s 11 movies are spectacular stories about crazy heists that take lots of effort, careful planning and just a touch of skillful improvisation to pull off. But it turns out that jobs like this exist in real life, too. And they’re equally impressive. A few days ago, 100 coordinated thieves stole no less than $12.7 million (1.4bn yen) from ATMs. The entire thing took just three hours, and no suspect was apprehended since then. More →

No Comments
Hackers Banks SWIFT Heists

Banks are helping hackers pull off the perfect heist

By on May 20, 2016 at 3:30 PM.

Banks are helping hackers pull off the perfect heist

News broke in February that hackers were able to steal no less than $81 million from the Bank of Bangladesh in what MANY described as a perfect heist. Well, maybe it wasn’t perfect, as a silly spelling mistake prevented the culprits from walking away with nearly $1 billion. But the sophisticated attack worked almost flawlessly as the hackers were able to take advantage of the backbone of financial transactions, after infiltrating the bank’s systems.

It turns out that the Bangladesh attack wasn’t an isolated event. Hackers have attacked other banks as well in the past using the same methods. New reports show that some of these attacks could have been prevented, but only if only banks were willing to share more details about these attacks with the SWIFT organization. Apparently, the financial institutions aren’t just worried that they’re going to lose the trust of customers, but also that they might generate additional inquiries into their security systems from local regulators. And nobody wants that. More →

No Comments
Google Tracking Websites Browsing

Huge new study shows that Google is watching you everywhere you go

By on May 20, 2016 at 2:19 PM.

Huge new study shows that Google is watching you everywhere you go

A new study has uncovered what might be one of the least surprising revelations of the decade: Google follows you all over the internet, whether you know about it or not. Earlier this year, Princeton researchers completed the largest online tracking study ever conducted, and found traces of Google code on a vast majority of the web’s million most popular websites.

More →

No Comments
LinkedIn Hacked 2016

Change your LinkedIn password right now

By on May 20, 2016 at 11:04 AM.

Change your LinkedIn password right now

Remember when LinkedIn was hacked a few years ago and the company confirmed that login credentials and other data belonging to 6.5 million accounts were stolen? Well, it turns out that figure might have been a little low. OK it was very, very low — it looks like hackers managed to steal data from not 6.5 million, and not even 65 million, but just over 165 million accounts.

In other words, it’s time to change your LinkedIn password immediately. More →

No Comments
ATM Malware

Old ATM malware is back and infecting machines everywhere

By on May 19, 2016 at 9:00 PM.

Old ATM malware is back and infecting machines everywhere

An old piece of ATM malware is back, and reportedly more dangerous and harder to detect than ever. According to security researchers from Kaspersky Labs, an updated piece of malware dubbed Skimer has infected numerous Windows-based ATMs across all corners of the globe.

More →

No Comments