No wonder the Pentagon has announced it’s working on a plan to fund tools and researchers to help organizations defend themselves against the pervasive threat of cyber assaults known as distributed denial-of-service (DDoS) attacks.
In recent days, the agency said it’s looking to fund researchers who can come up with tools as part of a program starting next April that would, among other things, help organizations recover from DDoS attacks in a maximum of 10 seconds. And the acknowledgement of that hunt for researchers for the program, called Extreme DDoS Defense, arguably comes not a moment too soon. More →
The Ashley Madison hacking scandal is far from over and now users have yet another thing to worry about. Reports say there’s evidence Ashley Madison made millions of dollars from users who paid to have their profiles erased from its databases for good, even though the website still kept identifiable data for each of the deleted profiles. More →
Spy agencies like the NSA and many others aren’t the only ones able to bug your calls and text messages, a new investigation shows. It turns out that anyone with the right equipment and know-how can tap into a carrier’s phone network to access calls and text messages for without the target’s knowledge. More →
The U.S. Internal Revenue Service (IRS) revealed on Monday that the hack disclosed to the public in May is bigger in scope than initially believed. According to the IRS, tax information belonging to thousands of other U.S. taxpayers have been stolen during the hack. The purpose of these cyberhits appears to be money related, as hackers have been using the information to generate fraudulent tax returns. More →
Not all hackers out there are looking to steal your information and use it for personal gain. Rather than setting up sophisticated schemes to obtain website logins or get millions of credit card records and personal information from huge retail chains, some hackers preferred to read the news before you do.
And that early access to information is how some of them made millions. More →
If a device is connected to a wireless network, chances are some talented hackers will find a way to take advantage of its software flaws to make it do what they want, whether we’re talking about smartphones, computers, routers, and even rifles. Yes, there’s a smart Internet-connected rifle out there that can turn anyone into a perfect shot — but some hackers found out how to disable it and even change its target. More →
Just when you thought you were safe, a new hacking toy comes along and rocks your world. Imagine a tool exists that lets hackers pluck encryption keys from your laptop right out of the air. You can’t stop it by connecting to protected Wi-Fi networks or even disabling Wi-Fi completely. Turning off Bluetooth also won’t help you protect yourself.
Why? Because the tiny device that can easily be hidden in an object or taped to the underside of a table doesn’t use conventional communications to pull off capers. Instead it reads radio waves emitted by your computer’s processor, and there’s really nothing you can do to stop it. More →
Inventive researchers at Tel Aviv University have come up with a new way of spying on computer users, one that can reportedly steal passwords wirelessly with help of a radio and… pita bread. More →
In case you happen to have one or multiple adult dating website profiles, you might consider securing them right away, as one of the world’s largest such websites has been hit by hackers. The attackers managed to steal highly sensitive personal data for four million users, leaking them online in spreadsheet format. More →