Inventive researchers at Tel Aviv University have come up with a new way of spying on computer users, one that can reportedly steal passwords wirelessly with help of a radio and… pita bread. More →
In case you happen to have one or multiple adult dating website profiles, you might consider securing them right away, as one of the world’s largest such websites has been hit by hackers. The attackers managed to steal highly sensitive personal data for four million users, leaking them online in spreadsheet format. More →
After a Motherboard report in March said that details for at least some Uber accounts had been accessed by hackers who were selling them online for as little as $1, the publication is back with a followup to the story. Now, it looks like American Uber customers have been targeted by hackers, who may have obtained access to some accounts. More →
Last year, hackers hit the unclassified computer network of the White House, accessing in the process the email correspondence between President Obama and some of the people he emails, or used to email frequently, The New York Times reports. Initially, the White House did not disclose this detail, and it’s not clear what kind of sensitive data has been stolen in the processes, but the Times learned the hack has been “more intrusive and worrisome” than publicly acknowledged. More →
Free public Wi-Fi hotspots are terrific. They offer users quick and reliable Internet connections where cellular reception is spotty. And even in areas with strong cellular signals, users can connect their phones, tablets and laptops to public Wi-Fi hotspots in order to conserve data on their mobile plans and steer clear of those pesky data caps.
Of course, there is one problem with public Wi-Fi networks, and it’s a big one: They’re completely open, which means any data you send or receive while connected to these networks is vulnerable and can easily be stolen by hackers. More →
Recent reports have shown that Wi-Fi routers are frequent targets for hackers who try to reroute some of the Internet traffic from the homes of unsuspecting users to fake websites that masquerade as genuine trusted sites. From there, they send the users more ads than they’d usually see while online, potentially steal their personal information, and perform other malicious tasks. To help users discover whether their home routers have been taken over by skilled attackers, F-Secure has come up with a simple online tool called Router Checker that lets anyone secure their home network with just one click. More →
When hackers steal money from banks, they usually go for Bonnie and Clyde attacks, taking whatever they can take in a single grab, one Kaspersky executive told The New York Times, as the security research discovered a different type of bank cyber heist, one likened to Ocean’s Eleven in terms of planning, but also when it comes to the significant amount of stolen cash. More →
Earlier this week, noted security researcher and consultant Mark Burnett made waves when he posted 10 million stolen usernames and passwords on his blog. Of course, the security expert didn’t post the passwords with malicious intent. Instead, his goal was to “release a clean set of data” that gives the world insights into user behavior, and also to draw attention once again to the arrest and prosecution of Barrett Brown.
Burnett didn’t steal the passwords in question, of course, but they’re now easily accessible to anyone and everyone — here’s how you can quickly and easily find out if you are affected. More →
Ever wanted to get access to your spouse’s Facebook account without them knowing? Are you looking to order some shady products from the “deep web?” Interested in clearing your record, or improving your grades? There’s a hacker for that, or at least a site where you can list such requests and appropriate rewards, hoping that hackers will be interested in helping out. More →
Surfing the web privately is something many web users are interested in, whether they’re doing it on a desktop, laptop or mobile device, but not many people know how to do it. Recently, a detailed WhoIsHostingThis infographic showed you how to secure your connection using a VPN — a virtual private network created on top of a public network to anonymize web traffic — on Windows, Mac and iOS, assuming the user already has access to a VPN service. Phone Arena has put together a similar step-by-step guide of enabling VPN connectivity on Android devices. More →