Flash zero-day vulnerabilities are a dime a dozen these days, so you won’t be surprised to learn there’s another one in the wild. Microsoft and Adobe have independently found two distinct zero-day vulnerabilities for Internet Explorer and Flash, respectively, which means it’s time to update Windows and Flash. Apparently, exploits exist for both that allow for remote code execution. More →
It might seem like your precious iPhone is always at your side and it never leaves your sight, but that’s simply not the case. You might be shocked to learn that oftentimes when an iPhone is hacked, the hack comes about because people gained physical access to the iPhone in question. So many users don’t take full advantage of the iOS security options in place and as a result, malicious software can be installed quicker than you can imagine.
Now, however, there’s a new app available in the iOS App Store that can tell you if your phone might have been hacked. More →
What were you doing when you were just 10 years old? Were you able to find any software bugs and win a boatload of cash for it? I sure wasn’t, but a Finnish boy named Jani recently told Facebook about an Instagram bug would let anyone delete comments inside the app. The social network rewarded him with $10,000 for his discovery.
It turns out that Jani is not only good with computers already, but he has a great sense of humor. More →
A new report shows that hackers from Russia have obtained login credentials for more than 272.3 million email accounts, which are now available for sale in Russia’s criminal underworld, a Most of them are Mail.ru accounts, though the list also includes smaller fractions of Google, Yahoo, and Microsoft email users. More →
Hackers looking to break into companies could do so with the help of a $350 device that can be purchased online from Amazon or eBay, new research shows. By taking advantage of the way most employee ID badges work, hackers could simply manufacture counterfeit access cards that would work just like the original badges. More →
Following the deadly assaults on Europe in late 2015 and early 2016, reports emerged suggesting that ISIS has an army of organized hackers who can provide consistent, round the clock support to foot soldiers. However, new information on the matter seems to suggest that ISIS’s remaining hacking arm is nothing more than a propaganda machine capable of dealing minor hits, if any, to enemies. But ISIS is showing more interest in expanding its hacking capabilities.
The news comes at a time when the U.S. government has declared cyber war on the Islamic paramilitary organization.
Hackers behind massive $81M cyber-heist also compromised the backbone of the global financial system
Hackers stole $81 million in a sophisticated attack on the Bangladesh Bank in February, which makes it one of the most impressive cyber-heist in history. The hackers were planning to steal $951 million in total, using fraudulent transactions. Recently uncovered evidence revealed that poor security – $10 internet routers – offered them access to the bank’s entire infrastructure, including the SWIFT servers that are responsible for financial transactions.
A new report indicates that hackers also breached SWIFT, the backbone of the global financial system that makes possible financial transactions. More →
There has been a lot of talk lately about personal data security, and for good reason. In recent years, more and more hackers have been taking advantage of all sorts of vulnerabilities in web-connected products to steal personal details belonging to millions of consumers, load malicious programs on their machines, and even steal money.
Even so, there are things you can do to protect your data so that it doesn’t fall into the wrong hands. More →
A mysterious hacking group has had access to U.S. government files for years and the hackers might still be able to siphon data off government computer networks. The hack apparently dates back to 2011, though it may be linked to attacks on the U.S. government’s computer infrastructure originating in 2008.
No web-connected service is safe. If you need more proof of this, consider a recent alleged attack on a porn site that apparently gave a hacker access to more than 237,000 accounts. In the aftermath of the Apple vs. FBI squabble over iPhone encryption, this is a reminder that strong security is needed for connected devices and products. More →
Unlike the iCloud hack targeting celebrities more than a year ago, Adele’s private photos that were leaked online over the weekend do not originate from iPhone backups, and they’re not nude photos either. However, hackers targeted the famed musician, managing to steal several private images that show various instances of the singer’s private life, including baby scans and selfies during pregnancy. More →