How To Rob An ATM iPod Nano

How to steal cash from an ATM using just an iPod nano and a piece of plastic

By on May 14, 2015 at 6:20 PM.

How to steal cash from an ATM using just an iPod nano and a piece of plastic

There’s a new and depressingly simple way to steal cash from ATMs and rob other people’s bank accounts, Business Insider informs us. Apparently, thieves have started rigging ATMs to grab people’s ATM cards while at the same time hooking up a concealed fifth-generation iPod nano near the machine to record a video of the users entering in their PINs. Once the users walk away because they figure the machines have simply eaten their cards, the thieves walk in, dislodge their card from the machine and then use their PIN to rob them blind. More →

No Comments
Verizon Security Vulnerability

Massive Verizon security hole made accessing private customer information a breeze

By on May 13, 2015 at 5:10 PM.

Massive Verizon security hole made accessing private customer information a breeze

Verizon made headlines this week with the surprise $4.4 billion acquisition of AOL, but a new report from BuzzFeed reveals that a major security flaw could have made this a much more challenging week for the telecommunications giant.

More →

No Comments
Breaking Bad Malware

‘Breaking Bad’ themed malware has been discovered

By on May 11, 2015 at 6:45 PM.

‘Breaking Bad’ themed malware has been discovered

Security researchers at Symantec recently discovered a new piece of malware that, believe it or not, incorporates a number of themes from the hit TV show Breaking Bad. The malware itself primarily affects users in Australia and represents a new strain of an existing ransomware trojan dubbed Trojan.Cryptolocker.S.

The ransomware, which only targets Windows machines, operates by encrypting all of a user’s files and subsequently demanding a timely payment of $450 Australian Dollars (about $355 in U.S. dollars) to decrypt them. Failure to promptly make the $450 payment results in the decryption fee rising to $1000 Australian Dollars.

More →

No Comments
Android Apps Malware Tracking Sites

Study finds many Android apps connect to a frightening number of shady tracking sites

By on May 4, 2015 at 12:25 PM.

Study finds many Android apps connect to a frightening number of shady tracking sites

By now we’re all familiar with the upsides and downsides to the Google Play store’s approach to vetting apps: The upside is that it’s incredibly easy for new apps to get posted on the store. The downside is that it’s incredibly easy for shady mobile apps to get posted on the store. Technology Review points us to a new study from the Institut Eurécom that shows us how shady Android apps might be even shadier than we ever imagined. More →

No Comments
Uber Username and Password Change

Warning: Uber may have been hacked – change your password immediately

By on May 4, 2015 at 10:45 AM.

Warning: Uber may have been hacked – change your password immediately

After a Motherboard report in March said that details for at least some Uber accounts had been accessed by hackers who were selling them online for as little as $1, the publication is back with a followup to the story. Now, it looks like American Uber customers have been targeted by hackers, who may have obtained access to some accounts. More →

No Comments
iPhone Android Smartphone Encryption Law Enforcement

This is the stupidest argument against iPhone and Android encryption we’ve ever heard

By on April 30, 2015 at 11:05 AM.

This is the stupidest argument against iPhone and Android encryption we’ve ever heard

Why are we so suspicious of law enforcement officials who are howling bloody murder about Apple and Google’s decision to encrypt smartphone traffic? Largely because they keep making totally boneheaded arguments. The latest such argument comes to us courtesy of Motherboard, which reports that Daniel Conley, the Suffolk County District Attorney in Massachusetts, has argued that widespread smartphone encryption will lead to an outbreak of perverts snapping “upskirt” photos of women who are riding public transportation. More →

No Comments
How To Crack A Master Lock Tips Video

Watch: A hacker has learned how to crack almost any Master Lock code in 8 tries or less

By on April 29, 2015 at 12:15 PM.

Watch: A hacker has learned how to crack almost any Master Lock code in 8 tries or less

We mostly think of hackers as people who use their knowledge of coding to virtually break into computer systems. It turns out, however, that hackers can be pretty good at breaking into physical locks as well. Via Ars Technica, hacker Samy Kamkar this week posted a video that shows how you can crack the code of a Master Lock combination in eight tries or fewer. More →

No Comments
White House Hack: Obama's Emails

Russian hackers accessed Obama’s email in ‘worrisome’ White House hit

By on April 27, 2015 at 6:50 AM.

Russian hackers accessed Obama’s email in ‘worrisome’ White House hit

Last year, hackers hit the unclassified computer network of the White House, accessing in the process the email correspondence between President Obama and some of the people he emails, or used to email frequently, The New York Times reports. Initially, the White House did not disclose this detail, and it’s not clear what kind of sensitive data has been stolen in the processes, but the Times learned the hack has been “more intrusive and worrisome” than publicly acknowledged. More →

No Comments
Groupon Security

Why Groupon refused to pay a security researcher who discovered serious XSS bugs

By on April 24, 2015 at 8:15 PM.

Why Groupon refused to pay a security researcher who discovered serious XSS bugs

It’s very common these days for tech companies Google and Microsoft to offer hackers and security researchers big bucks if they’re able to find security vulnerabilities that could pose serious threats to important software and services. Google in particular often hosts its own hacking competition where the search giant puts millions of dollars on the line for anyone savvy enough to skirt around Google’s built-in security schemes.

Recently, one security researcher found a number of high-level vulnerabilities on Groupon’s website. Groupon promptly patched the security holes but, as it turns out, is refusing to pay him.

Here’s why.

More →

No Comments
Public WiFi Safety Guide

How to use free public Wi-Fi without hackers stealing your data

By on April 23, 2015 at 12:25 PM.

How to use free public Wi-Fi without hackers stealing your data

Free public Wi-Fi hotspots are terrific. They offer users quick and reliable Internet connections where cellular reception is spotty. And even in areas with strong cellular signals, users can connect their phones, tablets and laptops to public Wi-Fi hotspots in order to conserve data on their mobile plans and steer clear of those pesky data caps.

Of course, there is one problem with public Wi-Fi networks, and it’s a big one: They’re completely open, which means any data you send or receive while connected to these networks is vulnerable and can easily be stolen by hackers. More →

No Comments
Samsung Galaxy S5 Fingerprint Scanner Hack

Scary Galaxy S5 scanner flaw will let hackers copy your fingerprints

By on April 22, 2015 at 8:15 PM.

Scary Galaxy S5 scanner flaw will let hackers copy your fingerprints

Well, let’s hope you never used the Galaxy S5’s fingerprint scanner. Forbes reports that researchers from security firm FireEye have found a scary flaw in the Galaxy S5’s fingerprint scanner that could let hackers copy your fingerprints and use them for nefarious purposes. More →

No Comments
iPhone Security Flaw

Security flaw lets attackers cripple your iPhone and there’s no way to stop them

By on April 22, 2015 at 11:46 AM.

Security flaw lets attackers cripple your iPhone and there’s no way to stop them

Wondering how difficult it is for attackers to cripple your iPhone? The answer isn’t going to make you happy — in a nutshell, all the have to do is create a Wi-Fi network. That’s right, thanks to a newly detailed security flaw in iOS, malicious hackers can send an iPhone into an endless reboot loop simply by creating a Wi-Fi network. And the worst part is that iPhones will connect to these networks automatically, and the only way to stop it is to disable Wi-Fi completely. More →

No Comments