Tips Tricks Internet Hackers

With smartphone vulnerabilities skyrocketing, here are 9 things you can do to stay safe

By on April 14, 2016 at 11:11 AM.

With smartphone vulnerabilities skyrocketing, here are 9 things you can do to stay safe

There has been a lot of talk lately about personal data security, and for good reason. In recent years, more and more hackers have been taking advantage of all sorts of vulnerabilities in web-connected products to steal personal details belonging to millions of consumers, load malicious programs on their machines, and even steal money.

Even so, there are things you can do to protect your data so that it doesn’t fall into the wrong hands. More →

No Comments
Hackers Identity Theft Internet

It’s cheaper than ever to buy someone’s stolen identity off the internet

By on April 7, 2016 at 4:12 PM.

It’s cheaper than ever to buy someone’s stolen identity off the internet

Business is apparently booming for hackers who deal with a certain type of digital product: identity theft. Buying someone’s identity off the internet is now cheaper than ever, a new report shows, suggesting that there’s both a strong demand for such products as well as strong supply. More →

No Comments
U.S. Government Hacked APT6

A mysterious hacking group has been stealing U.S. secrets for years

By on April 5, 2016 at 8:00 PM.

A mysterious hacking group has been stealing U.S. secrets for years

A mysterious hacking group has had access to U.S. government files for years and the hackers might still be able to siphon data off government computer networks. The hack apparently dates back to 2011, though it may be linked to attacks on the U.S. government’s computer infrastructure originating in 2008.

More →

No Comments
Porn Site Security Breach

Hacker allegedly breaches porn site, steals more than 237K accounts

By on April 1, 2016 at 9:45 PM.

Hacker allegedly breaches porn site, steals more than 237K accounts

No web-connected service is safe. If you need more proof of this, consider a recent alleged attack on a porn site that apparently gave a hacker access to more than 237,000 accounts. In the aftermath of the Apple vs. FBI squabble over iPhone encryption, this is a reminder that strong security is needed for connected devices and products. More →

No Comments
Adele Hacked Private Photos

Adele is the latest celebrity to have private pictures exposed online

By on March 21, 2016 at 6:50 AM.

Adele is the latest celebrity to have private pictures exposed online

Unlike the iCloud hack targeting celebrities more than a year ago, Adele’s private photos that were leaked online over the weekend do not originate from iPhone backups, and they’re not nude photos either. However, hackers targeted the famed musician, managing to steal several private images that show various instances of the singer’s private life, including baby scans and selfies during pregnancy. More →

No Comments
Anonymous Hack Donald Trump

Anonymous says it hacked Donald Trump and leaked his social security number

By on March 18, 2016 at 10:47 AM.

Anonymous says it hacked Donald Trump and leaked his social security number

A few days ago, hacker collective Anonymous declared a “total war” on Republican front-runner Donald Trump, and it looks like the group may have already gained access to some personal data belonging to the presidential candidate.

More →

No Comments
How to Remove Ransomware

Hackers are now patching ransomware, making it impossible to crack

By on March 17, 2016 at 5:30 PM.

Hackers are now patching ransomware, making it impossible to crack

Living in the connected future, software is never broken for long. If you buy a program or an app or a video game that doesn’t work as intended, the developers now have the ability to send out a patch within a matter of days or even hours.

But there’s a downside to software patches being relatively easy to roll out. It means that hackers can fix the malware they distribute after security experts find workarounds, which is exactly what happened in the case of TeslaCrypt.
More →

No Comments
Hackers Cracking Internet Sex Toys

There’s nothing funny about hackers cracking web-connected sex toys

By on March 16, 2016 at 3:45 PM.

There’s nothing funny about hackers cracking web-connected sex toys

With so many other hacking threats out there, you probably don’t believe that hackers breaking into Internet-connected sex toys is a big deal. However, this is a serious matter, as cybercriminals are targeting more and more products that are connected to the Internet to steal or temporarily hijack data. More →

No Comments
Ransomware Chinese Hackers Attacks

Professional Chinese hackers are responsible for U.S. ransomware attacks

By on March 15, 2016 at 7:40 PM.

Professional Chinese hackers are responsible for U.S. ransomware attacks

Ransomware is a kind of cyber attack that’s growing in popularity. Here’s how it works: hackers infiltrate computers, encrypt files you want to have access to, and demand money from you to get them back via anonymous Bitcoin transactions.

Ransomware attacks are conducted by ordinary individuals with extraordinary computer skills, but recent developments suggest that hackers who may have otherwise worked for the Chinese government are turning to ransomware operations to supplement their fading income. More →

No Comments
Hackers $1 Billion Bank Heist Bangladesh

A hacker’s typo stopped the biggest bank heist in history

By on March 10, 2016 at 3:56 PM.

A hacker’s typo stopped the biggest bank heist in history

We’ve often heard about hackers stealing personal data from millions of users by attacking retail stores, banks and even the U.S. government. But we’ve never heard about hackers trying to steal $1 billion. And what’s more, they were thwarted because of a simple typo that alerted banks to the fraudulent money transfers. More →

No Comments
1456940956297

From high seas to high tech: Pirates hack shipping company

By on March 2, 2016 at 6:35 PM.

From high seas to high tech: Pirates hack shipping company

Cunning tech-savvy pirates hacked a shipping company’s systems, enabling them to carefully target cargo on the firm’s vessels.

A report released by Verizon RISK (Research, Investigations, Solutions and Knowledge) Team reveals that “a global shipping conglomerate” fell victim to the high-tech pirates. The unnamed company contacted the Verizon cyber specialists after the pirates adopted a new strategy.   More →

No Comments
Hacker Protection

Why protecting critical infrastructure from cyberattacks is a global emergency

By on February 15, 2016 at 5:35 PM.

Why protecting critical infrastructure from cyberattacks is a global emergency

On Dec. 23, the entire Ivano-Frankivsk region in Ukraine suffered a major power outage. According to security experts and the Ukrainian Government the attackers used a destructive variant of the popular BlackEnergy malware.

According to a Ukrainian media, the power outage was caused by a destructive malware that disconnected electrical substations. Experts speculate that the hackers targeted Ukrainian power authorities with a spear phishing campaign to spread the malware, leveraging Microsoft Office documents. The incident in Ukraine has refocused attention on the security of critical infrastructure worldwide. More →

No Comments