Pokemon Go might just be the game of the year. Nintendo struck gold with this mobile endeavor, as millions of users around the world have already downloaded the application and are devoting plenty of time to hunting Pokemon. That also means that hackers have adapted their attacks to hunt those Pokemon fans who’re eager to try out the application. Researchers have already discovered malware inside versions of the Pokemon Go app for Android. More →
You might want to think twice when sharing your Netflix or HBO password with a friend or loved one, because it apparently constitutes a punishable federal crime. That’s according to a new ruling from the Ninth Circuit Court of Appeals in a case that has nothing to do with online streaming sites or binge-watching sessions, but does involve the sharing of passwords. More →
So you have an air-gapped computer, or unconnected to the Internet, and you think your data is secured just because it’s not accessible online? In most cases that might be true, but that’s not 100% accurate. There are ways to steal information from computers that are not connected to the web, and smart hackers will not stop looking for such tricks. The newest such malware would let attackers steal information from supposedly secure computers with the help of the sound made by its fans and processor. More →
No one is safe on the internet these days, not even the savviest users who sit atop powerful tech companies. After hackers successfully hit Mark Zuckerberg’s Pinterest account earlier this month, they hacked Google CEO Sundar Pichai’s Quora account. More →
A hacker who goes by the name ‘Guccifer 2.0’ claims to have published a dossier of Hillary Clinton-related documents accessed during the recent attackon the Democratic National Committee’s computers.
In a blog post Tuesday, Guccifer 2.0 described the haul as “a big folder of docs devoted to Hillary Clinton that I found on the DNC server.”
The files include a “HRC Defense Master Doc” outlining criticism and defense points on issues such as U.S. military intervention in Libya, the deadly 2012 Benghazi attack and the Clinton email server controversy. More →
Was a lone hacker behind the recent attack on the Democratic National Committee’s computers? An individual describing themselves as ‘Guccifer 2.0’ claimed responsibility for the hack in a blog post Wednesday, touting documents purportedly accessed in the attack.
But experts have been looking for clues about the mysterious self-described hacker, and suspicions still linger that the Russian government played a role in the DNC hack.
Citing security researcher Pwn All The Things, Ars Technica reports that metadata from one of the leaked documents indicates editing by someone using a computer configured to use the Russian language. Additionally, the document was edited by someone using the Russian translation of the computer name ‘Felix Dzerzhinsky,’ according to the research. A Russian revolutionary, Dzerzhinsky was also director of the Cheka, the Soviet secret police. More →
Welcome to the internet age, where hackers are getting smarter every day and malware is lurking around every corner. We’ve seen a terrifying amount of big data breaches occur over the past few years, and each one seems bigger and scarier than the last. Today, however, we get a new reminder that data breaches are just one of the ways hackers get their hands on our data. Reports are flying that tens of millions of valid Twitter account credentials have been made available for sale on the dark web, though the company has denied that a breach took place.
Whatever the case, the most important takeaway is this: Change your Twitter password immediately. More →
News broke in February that hackers were able to steal no less than $81 million from the Bank of Bangladesh in what MANY described as a perfect heist. Well, maybe it wasn’t perfect, as a silly spelling mistake prevented the culprits from walking away with nearly $1 billion. But the sophisticated attack worked almost flawlessly as the hackers were able to take advantage of the backbone of financial transactions, after infiltrating the bank’s systems.
It turns out that the Bangladesh attack wasn’t an isolated event. Hackers have attacked other banks as well in the past using the same methods. New reports show that some of these attacks could have been prevented, but only if only banks were willing to share more details about these attacks with the SWIFT organization. Apparently, the financial institutions aren’t just worried that they’re going to lose the trust of customers, but also that they might generate additional inquiries into their security systems from local regulators. And nobody wants that. More →
Remember when LinkedIn was hacked a few years ago and the company confirmed that login credentials and other data belonging to 6.5 million accounts were stolen? Well, it turns out that figure might have been a little low. OK it was very, very low — it looks like hackers managed to steal data from not 6.5 million, and not even 65 million, but just over 165 million accounts.
In other words, it’s time to change your LinkedIn password immediately. More →
Although we typically think of malware and phishing attacks being aimed at consumers, some cybercriminals choose to target banks directly rather than their customers so they can siphon money from unsuspecting financial institutions. If successful, these sophisticated techniques can yield impressive results.
A few months ago, unidentified attackers transferred $81 million from the bank of Bangladesh. That’s an serious amount of money, but the hackers wanted to steal close to $1 billion, and only a stroke of luck helped the banks prevent the bigger loss.
It turns out that this wasn’t an isolated incident, and hackers can pull it off again and again by taking advantage of the supposedly secure method banks use to transfer money. More →
Flash zero-day vulnerabilities are a dime a dozen these days, so you won’t be surprised to learn there’s another one in the wild. Microsoft and Adobe have independently found two distinct zero-day vulnerabilities for Internet Explorer and Flash, respectively, which means it’s time to update Windows and Flash. Apparently, exploits exist for both that allow for remote code execution. More →
It might seem like your precious iPhone is always at your side and it never leaves your sight, but that’s simply not the case. You might be shocked to learn that oftentimes when an iPhone is hacked, the hack comes about because people gained physical access to the iPhone in question. So many users don’t take full advantage of the iOS security options in place and as a result, malicious software can be installed quicker than you can imagine.
Now, however, there’s a new app available in the iOS App Store that can tell you if your phone might have been hacked. More →
What were you doing when you were just 10 years old? Were you able to find any software bugs and win a boatload of cash for it? I sure wasn’t, but a Finnish boy named Jani recently told Facebook about an Instagram bug would let anyone delete comments inside the app. The social network rewarded him with $10,000 for his discovery.
It turns out that Jani is not only good with computers already, but he has a great sense of humor. More →