Windows 10 Scam Email

Watch out: A dangerous Windows 10 scam is being circulated online

By on July 31, 2015 at 5:30 PM.

Watch out: A dangerous Windows 10 scam is being circulated online

The Windows 10 rollout has been relatively smooth, but there are plenty of users who never received the Get Windows 10 app and are still waiting in line for their turn to update. Unfortunately, scammers have seen how desperate Windows users are for the update, which is why it should come as no surprise that a phishing campaign has been discovered. More →

No Comments
Hackers Smart Sniper Rifle Disabled

Hackers can now crack Wi-Fi enabled ‘smart’ sniper rifles

By on July 30, 2015 at 10:00 PM.

Hackers can now crack Wi-Fi enabled ‘smart’ sniper rifles

If a device is connected to a wireless network, chances are some talented hackers will find a way to take advantage of its software flaws to make it do what they want, whether we’re talking about smartphones, computers, routers, and even rifles. Yes, there’s a smart Internet-connected rifle out there that can turn anyone into a perfect shot — but some hackers found out how to disable it and even change its target. More →

No Comments
Car Hack GM OnStar App

Hacker claims he can use GM’s OnStar app to remotely open and start your car

By on July 30, 2015 at 6:35 PM.

Hacker claims he can use GM’s OnStar app to remotely open and start your car

Connected cars are awesome but they also present big opportunities for hackers to cause significant, and potentially deadly, mischief. Reuters reports that white-hat hacker Samy Kamkar says he’s figured out a way to hack into GM’s OnStar mobile app and then use it to remotely open and start GM cars. More →

No Comments
Tor Security Privacy

MIT researchers can break Tor anonymity without even touching encryption

By on July 30, 2015 at 2:25 PM.

MIT researchers can break Tor anonymity without even touching encryption

Before the arrest of Silk Road creator Ross Ulbricht made headlines a few years ago, most everyday web users had never heard of Tor. Originally developed by US Naval Research Laboratory employees, Tor (an acronym for “The Onion Router”) is a popular piece of software designed to enable truly anonymous communications online. Today, it’s estimated that approximately 2.5 million users use Tor on a daily basis.

More →

No Comments
Android Security

Warning: Crazy new Android security flaw can render your phone completely lifeless

By on July 30, 2015 at 9:55 AM.

Warning: Crazy new Android security flaw can render your phone completely lifeless

Another day, another Android vulnerability. Just days after researchers disclosed an MMS-based Android vulnerability that potentially puts 950 million Android devices at risk, a different group of researchers have come forward with yet another Android-based security exploit.

The latest Android vulnerability affects more than half of all Android devices in circulation today and has the potential to render handsets completely inert, which is to say infected phones cannot make calls or receive any other type of notification. What’s more, the screen itself may become lifeless, effectively turning Android phones into expensive screen savers.

More →

No Comments
Data Breach

Have hackers stolen your personal information? This handy quiz will let you know

By on July 29, 2015 at 10:15 PM.

Have hackers stolen your personal information? This handy quiz will let you know

Over the past few years, there has been no shortage of high-profile credit card breaches at some of the largest retailers in the country. From Target to Home Depot, it seems that we can’t go a few months without hearing a story regarding some new worrisome data breach. With respect to Home Depot in particular, it’s estimated that nearly 60 million credit cards were compromised over a 5-month period.

Compounding the problem is that retailers aren’t the only target that hackers have their eyes on. In recent months, hackers have managed to obtain confidential information from targets as varied as the U.S. Government, health insurance providers, and even popular apps like Twitter and Snapchat. Indeed, it can get a bit tiring trying to keep up with what sites have been exposed to security breaches and when.

More →

No Comments
White House Edward Snowden Pardon

White House: No pardon for Edward Snowden

By on July 28, 2015 at 8:45 PM.

White House: No pardon for Edward Snowden

The White House is not quite ready to give Edward Snowden a free pass. The former NSA contractor turned whistleblower made some of the most important revelations in modern history about the covert operations conducted by Western intelligence agencies. Despite his many supporters, however, the U.S. government isn’t about to just let bygones be bygones. More →

No Comments
Brinks Safe Hack USB

Brinks safe hacked with USB stick and 100 lines of code

By on July 28, 2015 at 5:10 PM.

Brinks safe hacked with USB stick and 100 lines of code

As typically portrayed in action movies, breaking into an ostensibly impenetrable safe often requires a world class lock-picker or, barring that, an array or C4 explosives positioned in just the right orientation.

But in the real world, surprisingly enough, defeating the security mechanisms on a top-notch Brinks safe can be done with nothing more than a USB stick and 100 lines of code. At the always entertaining Def Con Hacking Conference set to kick off in Las Vegas next week, researchers Daniel Petro and Oscar Salazar of Bishop Fox will detail how they were able to skirt around the defenses of the Brinks CompuSafe Galileo with relative ease.

More →

No Comments
Android Security Flaw

950 million Android users at risk as researcher uncovers massive security flaw

By on July 27, 2015 at 11:35 AM.

950 million Android users at risk as researcher uncovers massive security flaw

A security researcher has recently uncovered a worrisome new Android exploit which allows hackers to compromise a device simply by sending either an MMS message or a multimedia file. Once a device has been targeted and infected, hackers can access a user’s microphone, camera, external storage, and in some cases (depending on the device in question), even gain root access.

Initially discovered by Joshua Drake from the security firm Zimperium, the exploit takes advantage of a number of vulnerabilities found within the software framework Android uses to “process, play and record multimedia files.”

More →

No Comments
Hillary Clinton Email Classified Information

Hillary Clinton sent classified info over her private email server – everything we know so far

By on July 24, 2015 at 2:56 PM.

Hillary Clinton sent classified info over her private email server – everything we know so far

Well, this is not the kind of headline Hillary Clinton’s presidential campaign was hoping to see on a Friday afternoon. The Wall Street Journal on Friday reported that an internal government review has concluded Clinton sent at least four different emails containing classified information over her home email server while she was serving as Secretary of State. The information contained in those emails should have been considered “secret,” which is a notch below the “top secret” level of intelligence classification. More →

No Comments
Car Hacking Experiment Charlie Miller

Terrifying: Hackers take over a Jeep driving down the highway at 70 mph

By on July 21, 2015 at 3:15 PM.

Terrifying: Hackers take over a Jeep driving down the highway at 70 mph

Driverless cars promise to be safer than cars driven by humans… but that’s assuming they don’t get hacked by malicious actors. Hackers Charlie Miller and Chris Valasek recently used Wired’s Andy Greenberg as a human guinea pig for their latest experiment that involved taking over his car while it was driving at a high speed. More →

No Comments
Ashley Madison Cheating Website Hacked

Cheaters’ nightmare: Affair website Ashley Madison hacked, user data vulnerable

By on July 20, 2015 at 7:50 AM.

Cheaters’ nightmare: Affair website Ashley Madison hacked, user data vulnerable

So you decided to cheat on your spouse and you thought extramarital affair website Ashley Madison would keep your identity safe? Oops. KrebsonSecurity reports that Ashley Madison has suffered a major hack that has left personal information of its 37 million members vulnerable. More →

No Comments