The Anonymous hackers collective declared war on ISIS immediately after the Paris attacks earlier this month. In the days that followed, Anonymous took out thousands of Twitter accounts belonging to the group and also issued warnings about imminent attacks, but that info apparently wasn’t accurate. Anonymous isn’t the only hacker group fighting ISIS right now, and while Anonymous’ efforts might not seem that effective, a person familiar with the group’s efforts explained what’s actually happening behind the scenes. More →
In the aftermath of the Paris attacks, certain hacker groups have declared a digital war on ISIS, with mixed results. But it looks like a hacker had been helping the FBI track and hunt down hackers with alleged ISIS ties even before the Paris attack in mid-November. A former member of the Rustle League hacker collective confessed on Twitter that he recently assisted the FBI, with his actions resulting in a bombing that left one prominent ISIS hacker dead. More →
A brand new kind of war emerged in the aftermath of the November 13th attacks on Paris, as Anonymous hackers declared ISIS a primary target in their cyberwar on terrorism. ISIS was quick to label the hackers “idiots” for declaring war, but the Anonymous collective proved once again that it’s got some serious skills. Soon after the attack began, Anonymous confirmed that it took down some 900 Twitter accounts affiliated with the Islamic State, and the number quickly climbed to more than 6,000 accounts in a matter of hours. More →
While it sounds like a mobile game you’d play to kill time, hackers vs. terrorists is sadly a real war. The hacker collective that goes by the name “Anonymous” recently posted a video on YouTube declaring war on ISIS in response to the attacks on Paris that left 129 dead and hundreds injured on Friday night. Anonymous wants to “launch the biggest operation ever” against the terrorist group, and ISIS is apparently taking notice – though the organization apparently believes Anonymous are “idiots” for even considering digital warfare. More →
About three weeks ago, a team of teenage hackers managed to hack into the personal AOL email account of CIA Director John Brennan. In the process, they were not only able to access Brennan’s personal correspondence, but also sensitive security information regarding top-secret Intelligence matters.
Now comes word via Wired that the same team of hackers has struck again, this time infiltrating a highly sensitive online portal used by law enforcement agencies to enter and share information pertaining to arrest records, live shootings, and terrorist attacks.
We’ve seen ransomware stories popping up left and right this year, detailing how hackers are making money from a scary, yet creative, type of malware. Just as the name of this attack suggests, ransomware encrypts personal files on a computer, demanding a ransom in order to release them back to users. Victims have to pay up a fee and hope that the hackers decrypt their data instead of simply taking the money and running. Sure, you can always refuse to pay the ransom, and you can try to use one of the publicly available tools that can decrypt your files (Microsoft has one too), but hackers have now devised a new method to convince you to pay up: They’ll expose your files online if you don’t. More →
For almost two years now, security breaches of all sorts have made the news. Hackers attacked retail stores and stole credit card numbers and other data, and they have attacked banks, medical insurers, and various governmental institutions. Add to that the odd attack against an online service caught off-guard by hackers – Ashley Madison comes immediately to mind – and the chances are that some of your data may have ended up in the wrong hands.
Criminals can clone your credit cards, at least until you’ve canceled them, but the worst thing that can happen is having your identity stolen. In such a case, you might be in for a wild ride as you’re trying to get your identity back. More →
Using weak passwords makes you a prime target for hackers, who have shown over the years that they can eat such subpar security measures for breakfast. Luckily, there are simple ways to ensure your online accounts are protected. These include using unique passwords for each service, creating long enough passwords that are easily rememberable, using password-managing services, and changing your passwords once in a while.
Interestingly, one 11-year-old girl can help with this by generating a long password for you that’s easily memorable and hard to crack. In fact, she even has an online site where she sells each password for $2 each. More →
Fitbits are popular devices among people who like to track their steps and exercise. But new research reveals that a Fitbit device is unprotected against simple malware attacks. More importantly, the malicious code that can be sent to a Fitbit device without the user’s knowledge can then infect a computer used to sync data collected by the wearable. More →
A teen hacker and two other people managed to hack CIA Director John Brennan’s personal email, revealing sensitive information from his email account. The group used various social-engineering techniques to pull information from tech support departments from Verizon and AOL that ultimately led to accessing the personal account of their target. More →
Most of the recent malware-related security reports detailed various threats targeting Apple’s iOS ecosystem, but that doesn’t mean hackers have stopped attacking Android. A new report claims that a sneaky type of malware has been found in various app stores, including Google’s official Play Store. Once installed on the device, the malware is very hard to remove. Its purpose is to flood a handset with advertising and hackers behind the attack might make as much as $4 milliom from the fraudulent app installs.
How confident are you that your virtual assistant is only listening to your commands? Think there’s any chance Siri or Google Now could be duped into performing actions on iPhones and Android handsets that you haven’t actually asked for? Yes, it seems some smart hackers have found one more way to compromise the security of iPhones and Androids to either spy on users, or initiate secondary malware activities. More →
Hackers looking to steal money from ATMs have targeted your credit cards for years, trying to obtain access to it by hacking online services and retail shops. However, since more and more markets including America are adopting more secure payment methods like chip-and-PIN cards and mobile payments, some talented hackers are adapting their game accordingly.
Rather than trying to steal credit cards, clone them and only then try to obtain cash out of ATMs, some people are simply targeting the machines with malware that makes them spit out cash on command. More →