The Ashley Madison hacking scandal is far from over and now users have yet another thing to worry about. Reports say there’s evidence Ashley Madison made millions of dollars from users who paid to have their profiles erased from its databases for good, even though the website still kept identifiable data for each of the deleted profiles. More →
Spy agencies like the NSA and many others aren’t the only ones able to bug your calls and text messages, a new investigation shows. It turns out that anyone with the right equipment and know-how can tap into a carrier’s phone network to access calls and text messages for without the target’s knowledge. More →
The U.S. Internal Revenue Service (IRS) revealed on Monday that the hack disclosed to the public in May is bigger in scope than initially believed. According to the IRS, tax information belonging to thousands of other U.S. taxpayers have been stolen during the hack. The purpose of these cyberhits appears to be money related, as hackers have been using the information to generate fraudulent tax returns. More →
Not all hackers out there are looking to steal your information and use it for personal gain. Rather than setting up sophisticated schemes to obtain website logins or get millions of credit card records and personal information from huge retail chains, some hackers preferred to read the news before you do.
And that early access to information is how some of them made millions. More →
If a device is connected to a wireless network, chances are some talented hackers will find a way to take advantage of its software flaws to make it do what they want, whether we’re talking about smartphones, computers, routers, and even rifles. Yes, there’s a smart Internet-connected rifle out there that can turn anyone into a perfect shot — but some hackers found out how to disable it and even change its target. More →
Just when you thought you were safe, a new hacking toy comes along and rocks your world. Imagine a tool exists that lets hackers pluck encryption keys from your laptop right out of the air. You can’t stop it by connecting to protected Wi-Fi networks or even disabling Wi-Fi completely. Turning off Bluetooth also won’t help you protect yourself.
Why? Because the tiny device that can easily be hidden in an object or taped to the underside of a table doesn’t use conventional communications to pull off capers. Instead it reads radio waves emitted by your computer’s processor, and there’s really nothing you can do to stop it. More →
Inventive researchers at Tel Aviv University have come up with a new way of spying on computer users, one that can reportedly steal passwords wirelessly with help of a radio and… pita bread. More →
In case you happen to have one or multiple adult dating website profiles, you might consider securing them right away, as one of the world’s largest such websites has been hit by hackers. The attackers managed to steal highly sensitive personal data for four million users, leaking them online in spreadsheet format. More →
After a Motherboard report in March said that details for at least some Uber accounts had been accessed by hackers who were selling them online for as little as $1, the publication is back with a followup to the story. Now, it looks like American Uber customers have been targeted by hackers, who may have obtained access to some accounts. More →
Last year, hackers hit the unclassified computer network of the White House, accessing in the process the email correspondence between President Obama and some of the people he emails, or used to email frequently, The New York Times reports. Initially, the White House did not disclose this detail, and it’s not clear what kind of sensitive data has been stolen in the processes, but the Times learned the hack has been “more intrusive and worrisome” than publicly acknowledged. More →