1467057014586

Hacker looks to sell 655,000 alleged patient healthcare records on the dark web

By on June 27, 2016 at 6:48 PM.

Hacker looks to sell 655,000 alleged patient healthcare records on the dark web

A hacker claims to be selling 655,000 alleged patient healthcare records on the dark web, containing information such as social security numbers, addresses, and insurance details.

The news was first reported by Deep Dot Web Saturday. A hacker who goes by the name ‘thedarkoverlord’ gave Deep Dot Web images of purported records. Identifiable information from the records was redacted “so the target company can remain anonymous for now,” the hacker told Deep Dot Web.

More →

No Comments
Google CEO Sundar Pichai Hacked

The same hackers who hit Zuckerberg take down Google CEO’s Quora account

By on June 27, 2016 at 11:45 AM.

The same hackers who hit Zuckerberg take down Google CEO’s Quora account

No one is safe on the internet these days, not even the savviest users who sit atop powerful tech companies. After hackers successfully hit Mark Zuckerberg’s Pinterest account earlier this month, they hacked Google CEO Sundar Pichai’s Quora account. More →

No Comments
Download Netflix Movies

A bug in Chrome makes pirating Netflix and Amazon movies easy

By on June 24, 2016 at 3:50 PM.

A bug in Chrome makes pirating Netflix and Amazon movies easy

Bad news for Google, good news for pirates: a pair of security researchers have found a flaw in the way the Chrome browser unpacks encrypted video. It’s all rather technical, but the upshot is that pirates have an easy way to save DRM-ed video streams to their desktop.

Wired first reported on the vulnerability, which was discovered by researchers David Livshits from the Cyber Security Research Center at Ben-Gurion University and Alexandra Mikityuk of Telekom Innovation Laboratories.

More →

No Comments
Apple iOS 10 Data Collection Opt-In

You won’t have to give Apple your data if you don’t want to

By on June 24, 2016 at 2:25 PM.

You won’t have to give Apple your data if you don’t want to

If Apple’s going to compete in this industry, it’s going to have to start collecting more data from its users. It’s a hard truth for both the company and its users to accept, but Apple revealed at WWDC 2016 last week that iOS 10 will collect more information from devices than ever in order to improve Siri and other services.

Apple didn’t share many details beyond that, but on Friday, Recode helped clarify exactly what Apple will be collecting (and whether or not you actually have to let Apple collect it from your personal devices).

More →

No Comments
Credit Card Skimmers

The expert’s guide to spotting credit card skimmers

By on June 24, 2016 at 1:25 PM.

The expert’s guide to spotting credit card skimmers

Credit card skimmers are scarily-small devices that thieves attach to credit card readers, capturing the magnetic strip data and allowing clones of cards to be made. These days, they’re so phenominally small that they can be fit inside devices, making them nearly impossible to spot.

Luckily, security researcher Brian Krebs found a guide from credit card terminal manufacturer Ingenico, teaching retailers how to spot skimmers in the wild.

More →

No Comments
mark-zuckerberg-tapes-macbook-camera-mic

Tale of the tape: Why Mark Zuckerberg is smart to cover his webcam

By on June 23, 2016 at 7:00 PM.

Tale of the tape: Why Mark Zuckerberg is smart to cover his webcam

Webcam security was thrust into the spotlight this week when a photo of Mark Zuckerberg appeared to show the camera and microphone on his MacBook covered with tape.

The photo, which was posted on Facebook to celebrate Instagram hitting 500 million followers, sparked plenty of interest. While some worried about the broader effectiveness of Facebook’s security, many see the tape as a shrewd defense against potential hackers. More →

No Comments
Mark Zuckerberg Tapes MacBook Camera Mic

Why does Mark Zuckerberg tape the camera and mic of his MacBook?

By on June 22, 2016 at 7:15 AM.

Why does Mark Zuckerberg tape the camera and mic of his MacBook?

Does Mark Zuckerberg know something about online spying operations that we don’t? Is he just showing the appropriate amount of paranoia that suits his position? Or is this a new fashion statement? Whatever the case, Zuckerberg appears to wear fancy tape over the camera and microphone of his MacBook Pro, as shown in the image above.

More →

No Comments
hillary-clinton-iphone-encryption-backdoors

After DNC attack, hacker Guccifer 2.0 claims Hillary Clinton ‘dossier’ leak

By on June 21, 2016 at 6:40 PM.

After DNC attack, hacker Guccifer 2.0 claims Hillary Clinton ‘dossier’ leak

A hacker who goes by the name ‘Guccifer 2.0’ claims to have  published a dossier of Hillary Clinton-related documents accessed during the recent attackon the Democratic National Committee’s computers.

In a blog post Tuesday, Guccifer 2.0 described the haul as “a big folder of docs devoted to Hillary Clinton that I found on the DNC server.”

The files include a “HRC Defense Master Doc” outlining criticism and defense points on issues such as U.S. military intervention in Libya, the deadly 2012 Benghazi attack and the Clinton email server controversy. More →

No Comments
Google 2 Step Verification

You can now use Touch ID on your iPhone to sign in to your Google account anywhere

You can now use Touch ID on your iPhone to sign in to your Google account anywhere

By on June 21, 2016 at 10:00 AM.

If there is one thing and only one thing that you take away from this site when it comes to online security, it should be this: enable 2-Step Verification (2FV) on every single account you have that supports it. People constantly moan and groan about how annoying it is to use password management software like 1Password and enhanced security features such as 2-Step Verification, also known as 2-Factor Authentication. Trust us when we tell you that the 10 to 15 extra seconds it takes to make use of either of those important security technologies could mean the difference between having your account hijacked and keeping all of your data secure.

And now, a big change will cut the amount of time it takes many Google users to log in with 2FV in half. More →

No Comments
1466181702033

Lone hacker claims responsibility for DNC breach, but fingers still point at Russia

By on June 17, 2016 at 6:45 PM.

Lone hacker claims responsibility for DNC breach, but fingers still point at Russia

Was a lone hacker behind the recent attack on the Democratic National Committee’s computers? An individual describing themselves as ‘Guccifer 2.0’ claimed responsibility for the hack in a blog post Wednesday, touting documents purportedly accessed in the attack.

But experts have been looking for clues about the mysterious self-described hacker, and suspicions still linger that the Russian government played a role in the DNC hack.

Citing security researcher Pwn All The Things, Ars Technica reports that metadata from one of the leaked documents indicates editing by someone using a computer configured to use the Russian language. Additionally, the document was edited by someone using the Russian translation of the computer name ‘Felix Dzerzhinsky,’ according to the research. A Russian revolutionary, Dzerzhinsky was also director of the Cheka, the Soviet secret police. More →

No Comments
ATM Card Skimmer

There’s no way you’d spot these tiny ATM card skimmers

By on June 15, 2016 at 5:10 PM.

There’s no way you’d spot these tiny ATM card skimmers

I’m aware that card skimmers at ATMs and gas stations are a very real threat. I always pay attention when using a card machine, but to date, I’ve never seen a card skimmer in the flesh. Maybe that’s because they’re way, way sneakier than I’d imagined.

More →

No Comments
Trump Research File

A hacker has leaked the Democrats’ dirt file on Trump

By on June 15, 2016 at 4:38 PM.

A hacker has leaked the Democrats’ dirt file on Trump

Yesterday, news leaked that the Democratic National Committee’s opposition research file on Trump had been hacked by Russian state-sponsored hackers. Today, what appears to be that same file — 200+ pages on how to take down Trump — has been leaked to news outlets by a self-proclaimed hacker.

Both Gawker.com and The Smoking Gun have published the same file today. They say they were sent it by a hacker calling himself “Guccifer 2.0,” a reference to the infamous Romanian hacker who penetrated the networks of senior politicians (including Hillary Clinton) in 2013, and is now in the custody of the FBI.

According to Gawker, his motive is to be “a fighter against all those illuminati that captured our world.”

More →

No Comments