CIA Director Email Hack

The high school student who hacked the CIA Director’s personal email explains how easy it was

By on October 20, 2015 at 10:50 AM.

The high school student who hacked the CIA Director’s personal email explains how easy it was

A teen hacker and two other people managed to hack CIA Director John Brennan’s personal email, revealing sensitive information from his email account. The group used various social-engineering techniques to pull information from tech support departments from Verizon and AOL that ultimately led to accessing the personal account of their target. More →

No Comments
Ghost Push Android Malware Apps

Android malware apps might net hackers millions, fool Google Play Store security

By on October 15, 2015 at 6:50 AM.

Android malware apps might net hackers millions, fool Google Play Store security

Most of the recent malware-related security reports detailed various threats targeting Apple’s iOS ecosystem, but that doesn’t mean hackers have stopped attacking Android. A new report claims that a sneaky type of malware has been found in various app stores, including Google’s official Play Store. Once installed on the device, the malware is very hard to remove. Its purpose is to flood a handset with advertising and hackers behind the attack might make as much as $4 milliom from the fraudulent app installs.

More →

No Comments
Siri Google Now Malware Attacks

Hackers find a sneaky new way to attack your phone through Siri and Google Now

By on October 14, 2015 at 5:35 PM.

Hackers find a sneaky new way to attack your phone through Siri and Google Now

How confident are you that your virtual assistant is only listening to your commands? Think there’s any chance Siri or Google Now could be duped into performing actions on iPhones and Android handsets that you haven’t actually asked for? Yes, it seems some smart hackers have found one more way to compromise the security of iPhones and Androids to either spy on users, or initiate secondary malware activities. More →

No Comments
GreenDispenser ATM Malware Cash

Hackers cash out directly from ATMs, don’t need to steal your card first

By on September 25, 2015 at 8:00 PM.

Hackers cash out directly from ATMs, don’t need to steal your card first

Hackers looking to steal money from ATMs have targeted your credit cards for years, trying to obtain access to it by hacking online services and retail shops. However, since more and more markets including America are adopting more secure payment methods like chip-and-PIN cards and mobile payments, some talented hackers are adapting their game accordingly.

Rather than trying to steal credit cards, clone them and only then try to obtain cash out of ATMs, some people are simply targeting the machines with malware that makes them spit out cash on command. More →

No Comments
iOS App Store XcodeGhost Malware

Nobody is safe: Major App Store malware breach may affect millions of iPhone users

By on September 21, 2015 at 6:50 AM.

Nobody is safe: Major App Store malware breach may affect millions of iPhone users

iOS is safer than Android when it comes to malware attacks, but that doesn’t mean hackers aren’t successfully targeting the iPhone and iPad with malicious programs supposed to steal sensitive data. Usually, iOS malware reports explain that jailbroken devices are at risk, especially in Asian countries and that only a tiny fraction of Apple’s massive number of customers is affected. However, that’s not the case anymore.

A substantial security threat called XcodeGhost managed to fool App Store security and sneak into the App Store inside real App Store apps potentially affecting hundreds of millions of iPhone and iPad users on both stock and jailbroken devices. The one thing that’s common with recent iOS hacks is that the threat comes from China. More →

No Comments
Featured
DDoS Attacks Report 2015 Trends

DDoS attacks are getting much more powerful and the Pentagon is scrambling for solutions

By on August 31, 2015 at 3:10 PM.

DDoS attacks are getting much more powerful and the Pentagon is scrambling for solutions

No wonder the Pentagon has announced it’s working on a plan to fund tools and researchers to help organizations defend themselves against the pervasive threat of cyber assaults known as distributed denial-of-service (DDoS) attacks.

In recent days, the agency said it’s looking to fund researchers who can come up with tools as part of a program starting next April that would, among other things, help organizations recover from DDoS attacks in a maximum of 10 seconds. And the acknowledgement of that hunt for researchers for the program, called Extreme DDoS Defense, arguably comes not a moment too soon. More →

No Comments
Ashley Madison Hack Profile Data Delete

Think you’re safe from the Ashley Madison hack because you erased your profile? Think again

By on August 21, 2015 at 7:15 AM.

Think you’re safe from the Ashley Madison hack because you erased your profile? Think again

The Ashley Madison hacking scandal is far from over and now users have yet another thing to worry about. Reports say there’s evidence Ashley Madison made millions of dollars from users who paid to have their profiles erased from its databases for good, even though the website still kept identifiable data for each of the deleted profiles. More →

No Comments
Call Text Messages Bugging SS7 Hack

Huge phone network security flaw lets anyone bug calls and text messages

By on August 18, 2015 at 12:46 PM.

Huge phone network security flaw lets anyone bug calls and text messages

Spy agencies like the NSA and many others aren’t the only ones able to bug your calls and text messages, a new investigation shows. It turns out that anyone with the right equipment and know-how can tap into a carrier’s phone network to access calls and text messages for without the target’s knowledge. More →

No Comments
IRS Hack Fraudulent Tax Returns

IRS hack bigger in scope than initially believed, up to $50M stolen in fraudulent refunds

By on August 18, 2015 at 6:50 AM.

IRS hack bigger in scope than initially believed, up to $50M stolen in fraudulent refunds

The U.S. Internal Revenue Service (IRS) revealed on Monday that the hack disclosed to the public in May is bigger in scope than initially believed. According to the IRS, tax information belonging to thousands of other U.S. taxpayers have been stolen during the hack. The purpose of these cyberhits appears to be money related, as hackers have been using the information to generate fraudulent tax returns. More →

No Comments
Hackers Traders Hacked Press Releases Millions

How hackers made millions by reading the news before you

By on August 12, 2015 at 10:20 AM.

How hackers made millions by reading the news before you

Not all hackers out there are looking to steal your information and use it for personal gain. Rather than setting up sophisticated schemes to obtain website logins or get millions of credit card records and personal information from huge retail chains, some hackers preferred to read the news before you do.

And that early access to information is how some of them made millions. More →

No Comments
Popcorn Time Security Vulnerability Hackers

Popcorn Time vulnerability could allow hackers to take over your computer

By on August 3, 2015 at 7:15 PM.

Popcorn Time vulnerability could allow hackers to take over your computer

One of the most popular movie streaming apps online might be a prime target for hackers. On Monday, TorrentFreak shared a report from Antonios Chariton (aka DaKnOb), a security engineer and researcher who discovered a major vulnerability in one of the most popular forks of Popcorn Time. More →

No Comments
Hackers Smart Sniper Rifle Disabled

Hackers can now crack Wi-Fi enabled ‘smart’ sniper rifles

By on July 30, 2015 at 10:00 PM.

Hackers can now crack Wi-Fi enabled ‘smart’ sniper rifles

If a device is connected to a wireless network, chances are some talented hackers will find a way to take advantage of its software flaws to make it do what they want, whether we’re talking about smartphones, computers, routers, and even rifles. Yes, there’s a smart Internet-connected rifle out there that can turn anyone into a perfect shot — but some hackers found out how to disable it and even change its target. More →

No Comments