Dropbox Hack Email Password

Dropbox didn’t tell anyone about a giant hack for four years

August 31st at 7:00 PM

Dropbox didn’t tell anyone about a giant hack for four years

We get it, companies get hacked all the time. And they’re not too eager to share details about data breaches, but they ultimately have to release details about it so that affected users can protect themselves. At least, they should disclose details. But Dropbox failed to do so, hiding for no less than four years the magnitude of a data breach that may have affected up to 68 million accounts. More →

No Comments
USBee Malware Air-Gapped PC

Researchers have replicated one of the NSA’s scariest hacking tools

August 30th at 9:00 PM

Researchers have replicated one of the NSA’s scariest hacking tools

One defense against malware is locking sensitive data that hackers want to steal from the Internet. That’s done through air-gapped PCs or computers that are not connected to the Internet or any network. Theoretically, one could not retrieve anything from such a device without physical access to it. But researchers have been able to replicate a tool the NSA reportedly uses and improve it, to steal information from an air-gapped computer. More →

No Comments
1472573632413

Sri Lankan teen hacks president’s website to demand exam reschedule

August 30th at 8:30 PM

Sri Lankan teen hacks president’s website to demand exam reschedule

It’s no secret that exam schedules can be annoying, but would you write your country’s president to voice your concerns? How about hacking their official website?

Enter this summer’s boldest Sri Lankan teenager. The BBC reported that a 17-year-old student has been arrested for allegedly hacking President Maithripala Sirisena’s website to express frustration over the country’s exam schedule. The announcement that the A-level (or advanced) exams were scheduled for April angered the teen, who pointed out that the exams coincided with celebrations for Sinhala and Tamil New Year.

More →

No Comments
Government Hacking iPhone Tool

Government caught using sophisticated one-click hacking tool in the wild

August 25th at 1:53 PM

Government caught using sophisticated one-click hacking tool in the wild

Researchers have discovered a scarily effective piece of malware, authored by an Israeli “cyber arms dealer,” that can completely hack an iPhone if the user clicks on one link. First found by a UAE human rights defender who was sent a malicious link, the spyware uses a series of zero-day exploits to thoroughly take control of a users’ iPhone.

Ahmed Mansoor, the human rights defender in question, was sent the link earlier in August. It was in a text message which promised him information if he followed the link. Instead, he sent the link to researchers at Citizen Lab, who analyzed the malware installed after the link.

More →

No Comments
Police Surveillance Cessna Plane Baltimore

Planes hovering above Baltimore right now are recording every move people make

August 24th at 11:00 PM

Planes hovering above Baltimore right now are recording every move people make

“Imagine Google Earth with TiVo capability.” That’s how the impressive, and very high-tech, one company’s real-time surveillance system is sold to interested parties. In short, Big Brother is here, and as time goes on it’ll get only better at seeing everything you do. More →

No Comments
Encryption Backdoor France Germany

France and Germany latest countries to want magical backdoors in encryption

August 24th at 5:20 PM

France and Germany latest countries to want magical backdoors in encryption

The recent NSA hack just proved to the world that no system is hack-proof if attackers have what it takes to break the access door. Regardless of whatever protections guarded that NSA server, hackers found a security hole to get in and steal critical documents. The same thing could happen to encrypted services that would feature a backdoor for law enforcement.

But governments around the world still think they’d be able to handle such terrifying scenarios, with France and Germany being the latest nations looking to gain access to private encrypted messages exchanged over the internet by terror plot suspects. More →

No Comments
Windows 10 Upgrade Fail

Privacy group: Microsoft should ‘come clean’ about ‘malicious’ Windows 10

August 24th at 4:15 PM

Privacy group: Microsoft should ‘come clean’ about ‘malicious’ Windows 10

Windows 10 has had a difficult first year in the world. Although the operating system itself has been generally praised, concerns over privacy and the overly pressurized upgrades have made with Windows 10 upgrade into way more of a saga than Microsoft needed.

The Electronic Frontier Foundation, an advocacy group for digital rights, has published a no-holds-barred blog post condemning Windows 10’s collection of data, and the “malicious” way Microsoft pushed 10 onto consumers. If you’re not a fan of seeing Microsoft being verbally beaten up, this will be a rough ride.

More →

No Comments
Fake Netflix iTunes Bill Scam

Netflix phishing scam looks to steal credit card details from iPhone users

August 24th at 2:26 PM

Netflix phishing scam looks to steal credit card details from iPhone users

Whether or not you have active Netflix or Apple accounts makes no difference to hackers looking to steal precious personal data. But you should be aware of a new Netflix email scam that’s using a fake iTunes bill to fool you into giving your credit card details to scammers, so here’s what you need to know about it so you can avoid it.

More →

No Comments
NSA Hacking Tools

Stolen NSA hacking tools reportedly on sale for $8,000

August 22nd at 3:04 PM

Stolen NSA hacking tools reportedly on sale for $8,000

It’s been a rough week for the NSA, to say the least. Last week, a group of hackers collectively known as The Shadow Brokers allegedly stole and released a treasure trove of NSA hacking tools and exploits. What’s more, the group promised to release even more weapons from the NSA’s cyber arsenal for the right price.

While the initial leak was met with skepticism, researchers and security experts who examined the leak subsequently confirmed that the leaked exploits were very much real. “It definitely looks like a toolkit used by the NSA,” French computer researcher Matt Suiche said after taking a look at the code.

As if that weren’t bad enough, now comes word that The Shadow Brokers may not be the only hackers who hold the keys to the NSA’s cache of advanced hacking tools and exploits.

More →

No Comments
NSA Hack Explained Russia

Yup, Russia was probably behind that NSA hack

August 17th at 9:00 PM

Yup, Russia was probably behind that NSA hack

The NSA was hacked by a group that calls itself Shadow Brokers, a report earlier this week revealed, with some of the stolen cyberweapons being auctioned off to the highest bidder. Since then, experts who have seen some of the stolen files believe that the NSA has indeed been hacked, with Russia being one of the prime suspects. As for the strange auction itself, it looks like nobody is really interested in paying for the hacked documents at this point. More →

No Comments
HEI Hotels Credit Card Malware Hack

Hackers may have stolen your credit card data if you stayed at any of these hotels

August 15th at 9:00 PM

Hackers may have stolen your credit card data if you stayed at any of these hotels

Remember when news broke out that a certain retail or hotel chain was hit by a sophisticated malware attack that allowed hackers to steal personal information belonging to a large number of customers, including payment information? Well, this is such a case. And if you stayed at one of the 20 following hotels and paid for goods using your credit cards, then your financial data may be at risk, and you probably have to take various preemptive measures. More →

No Comments
Android Malware

New Android malware steals banking information, and spreads through Google’s own network

August 15th at 5:00 PM

New Android malware steals banking information, and spreads through Google’s own network

Earlier today, researchers from Kaspersky Lab reported that they recently stumbled across a new piece of sophisticated Android malware designed to steal a user’s banking credentials. In a broad sense, the malware is similar to other schemes we’ve seen before insofar that it uses cleverly thought out phishing schemes designed to trick users into entering in their banking user ID and password.

More →

No Comments