A few days ago, hacker collective Anonymous declared a “total war” on Republican front-runner Donald Trump, and it looks like the group may have already gained access to some personal data belonging to the presidential candidate.
Living in the connected future, software is never broken for long. If you buy a program or an app or a video game that doesn’t work as intended, the developers now have the ability to send out a patch within a matter of days or even hours.
But there’s a downside to software patches being relatively easy to roll out. It means that hackers can fix the malware they distribute after security experts find workarounds, which is exactly what happened in the case of TeslaCrypt.
With so many other hacking threats out there, you probably don’t believe that hackers breaking into Internet-connected sex toys is a big deal. However, this is a serious matter, as cybercriminals are targeting more and more products that are connected to the Internet to steal or temporarily hijack data. More →
Ransomware is a kind of cyber attack that’s growing in popularity. Here’s how it works: hackers infiltrate computers, encrypt files you want to have access to, and demand money from you to get them back via anonymous Bitcoin transactions.
Ransomware attacks are conducted by ordinary individuals with extraordinary computer skills, but recent developments suggest that hackers who may have otherwise worked for the Chinese government are turning to ransomware operations to supplement their fading income. More →
We’ve often heard about hackers stealing personal data from millions of users by attacking retail stores, banks and even the U.S. government. But we’ve never heard about hackers trying to steal $1 billion. And what’s more, they were thwarted because of a simple typo that alerted banks to the fraudulent money transfers. More →
Cunning tech-savvy pirates hacked a shipping company’s systems, enabling them to carefully target cargo on the firm’s vessels.
A report released by Verizon RISK (Research, Investigations, Solutions and Knowledge) Team reveals that “a global shipping conglomerate” fell victim to the high-tech pirates. The unnamed company contacted the Verizon cyber specialists after the pirates adopted a new strategy. More →
On Dec. 23, the entire Ivano-Frankivsk region in Ukraine suffered a major power outage. According to security experts and the Ukrainian Government the attackers used a destructive variant of the popular BlackEnergy malware.
According to a Ukrainian media, the power outage was caused by a destructive malware that disconnected electrical substations. Experts speculate that the hackers targeted Ukrainian power authorities with a spear phishing campaign to spread the malware, leveraging Microsoft Office documents. The incident in Ukraine has refocused attention on the security of critical infrastructure worldwide. More →
We knew somebody hacked CIA Director John Brennan last October, but we had no idea who the person was and how old they may have been. Since the attack on Brennan, the attacker known as “Cracka” struck again, focusing on the Director of National Intelligence in early January. Furthermore, Cracka is believed to have leaked the personal details of thousands of FBI and U.S. Department of Homeland Security employees online recently.
A report now reveals that the person suspected to have done all this is a British 16-year-old boy who was recently arrested for his alleged cybercrimes. More →
Apple has a high regard for security and secrecy, but that doesn’t mean hackers have simply given up the dream of accessing this particular fortress. In fact, a new report says that in Ireland, hackers are ready to pay up to €20,000, or approximately $23,000, to Apple employees willing to sell their login details. More →
You’re probably sharing your Netflix account with your loved ones, exes, and their best friends’ dads. There’s really nothing wrong with that and Netflix doesn’t care. But what Netflix does care about is where its content is seen. That’s why you absolutely must check who’s using your account and where they’re located. You should also remember that Netflix credentials are one of the cheapest commodities on the dark web, with accounts selling for less than $1 a pop.
This isn’t some strange fiction story in which two popular superheroes team up against the U.S. government. “Batman” – specifically “1MB@tMan” – and “BlackWindow” are codenames used for backdoor logins into conference room tools used by various governments around the world, including White House staff and other branches of the U.S. government.
The recently discovered backdoors could be used for spying, a research firm has said, although the creator of the affected products denies it all. More →
Discussions about the U.S. government’s need for breaking encryption have intensified following the mid-November attacks in Paris. Law enforcement agencies including the FBI and politicians have challenged tech leaders from Silicon Valley to find ways to include backdoors in encrypted products. That way, surveillance operations targeting potential terror suspects might have a better chance of successfully intercepting relevant communication.
Tech leaders, meanwhile, have stood firm against crippling encryption with backdoors, with Apple and Tim Cook at the forefront of this argument. That doesn’t mean tech companies unwilling to help intelligence agencies address terrorist threats – but they’ll just do it differently for the time being.