A new report shows that hackers from Russia have obtained login credentials for more than 272.3 million email accounts, which are now available for sale in Russia’s criminal underworld, a Most of them are Mail.ru accounts, though the list also includes smaller fractions of Google, Yahoo, and Microsoft email users. More →
Hackers looking to break into companies could do so with the help of a $350 device that can be purchased online from Amazon or eBay, new research shows. By taking advantage of the way most employee ID badges work, hackers could simply manufacture counterfeit access cards that would work just like the original badges. More →
Following the deadly assaults on Europe in late 2015 and early 2016, reports emerged suggesting that ISIS has an army of organized hackers who can provide consistent, round the clock support to foot soldiers. However, new information on the matter seems to suggest that ISIS’s remaining hacking arm is nothing more than a propaganda machine capable of dealing minor hits, if any, to enemies. But ISIS is showing more interest in expanding its hacking capabilities.
The news comes at a time when the U.S. government has declared cyber war on the Islamic paramilitary organization.
Hackers behind massive $81M cyber-heist also compromised the backbone of the global financial system
Hackers stole $81 million in a sophisticated attack on the Bangladesh Bank in February, which makes it one of the most impressive cyber-heist in history. The hackers were planning to steal $951 million in total, using fraudulent transactions. Recently uncovered evidence revealed that poor security – $10 internet routers – offered them access to the bank’s entire infrastructure, including the SWIFT servers that are responsible for financial transactions.
A new report indicates that hackers also breached SWIFT, the backbone of the global financial system that makes possible financial transactions. More →
There has been a lot of talk lately about personal data security, and for good reason. In recent years, more and more hackers have been taking advantage of all sorts of vulnerabilities in web-connected products to steal personal details belonging to millions of consumers, load malicious programs on their machines, and even steal money.
Even so, there are things you can do to protect your data so that it doesn’t fall into the wrong hands. More →
A mysterious hacking group has had access to U.S. government files for years and the hackers might still be able to siphon data off government computer networks. The hack apparently dates back to 2011, though it may be linked to attacks on the U.S. government’s computer infrastructure originating in 2008.
No web-connected service is safe. If you need more proof of this, consider a recent alleged attack on a porn site that apparently gave a hacker access to more than 237,000 accounts. In the aftermath of the Apple vs. FBI squabble over iPhone encryption, this is a reminder that strong security is needed for connected devices and products. More →
Unlike the iCloud hack targeting celebrities more than a year ago, Adele’s private photos that were leaked online over the weekend do not originate from iPhone backups, and they’re not nude photos either. However, hackers targeted the famed musician, managing to steal several private images that show various instances of the singer’s private life, including baby scans and selfies during pregnancy. More →
A few days ago, hacker collective Anonymous declared a “total war” on Republican front-runner Donald Trump, and it looks like the group may have already gained access to some personal data belonging to the presidential candidate.
Living in the connected future, software is never broken for long. If you buy a program or an app or a video game that doesn’t work as intended, the developers now have the ability to send out a patch within a matter of days or even hours.
But there’s a downside to software patches being relatively easy to roll out. It means that hackers can fix the malware they distribute after security experts find workarounds, which is exactly what happened in the case of TeslaCrypt.
With so many other hacking threats out there, you probably don’t believe that hackers breaking into Internet-connected sex toys is a big deal. However, this is a serious matter, as cybercriminals are targeting more and more products that are connected to the Internet to steal or temporarily hijack data. More →