Ransomware Chinese Hackers Attacks

Professional Chinese hackers are responsible for U.S. ransomware attacks

By on March 15, 2016 at 7:40 PM.

Professional Chinese hackers are responsible for U.S. ransomware attacks

Ransomware is a kind of cyber attack that’s growing in popularity. Here’s how it works: hackers infiltrate computers, encrypt files you want to have access to, and demand money from you to get them back via anonymous Bitcoin transactions.

Ransomware attacks are conducted by ordinary individuals with extraordinary computer skills, but recent developments suggest that hackers who may have otherwise worked for the Chinese government are turning to ransomware operations to supplement their fading income. More →

No Comments
Hackers $1 Billion Bank Heist Bangladesh

A hacker’s typo stopped the biggest bank heist in history

By on March 10, 2016 at 3:56 PM.

A hacker’s typo stopped the biggest bank heist in history

We’ve often heard about hackers stealing personal data from millions of users by attacking retail stores, banks and even the U.S. government. But we’ve never heard about hackers trying to steal $1 billion. And what’s more, they were thwarted because of a simple typo that alerted banks to the fraudulent money transfers. More →

No Comments
1456940956297

From high seas to high tech: Pirates hack shipping company

By on March 2, 2016 at 6:35 PM.

From high seas to high tech: Pirates hack shipping company

Cunning tech-savvy pirates hacked a shipping company’s systems, enabling them to carefully target cargo on the firm’s vessels.

A report released by Verizon RISK (Research, Investigations, Solutions and Knowledge) Team reveals that “a global shipping conglomerate” fell victim to the high-tech pirates. The unnamed company contacted the Verizon cyber specialists after the pirates adopted a new strategy.   More →

No Comments
Hacker Protection

Why protecting critical infrastructure from cyberattacks is a global emergency

By on February 15, 2016 at 5:35 PM.

Why protecting critical infrastructure from cyberattacks is a global emergency

On Dec. 23, the entire Ivano-Frankivsk region in Ukraine suffered a major power outage. According to security experts and the Ukrainian Government the attackers used a destructive variant of the popular BlackEnergy malware.

According to a Ukrainian media, the power outage was caused by a destructive malware that disconnected electrical substations. Experts speculate that the hackers targeted Ukrainian power authorities with a spear phishing campaign to spread the malware, leveraging Microsoft Office documents. The incident in Ukraine has refocused attention on the security of critical infrastructure worldwide. More →

No Comments
CIA FBI Cracka Hacker Arrested

16-year-old British boy suspected to have hacked CIA director and the FBI arrested

By on February 12, 2016 at 8:00 PM.

16-year-old British boy suspected to have hacked CIA director and the FBI arrested

We knew somebody hacked CIA Director John Brennan last October, but we had no idea who the person was and how old they may have been. Since the attack on Brennan, the attacker known as “Cracka” struck again, focusing on the Director of National Intelligence in early January. Furthermore, Cracka is believed to have leaked the personal details of thousands of FBI and U.S. Department of Homeland Security employees online recently.

A report now reveals that the person suspected to have done all this is a British 16-year-old boy who was recently arrested for his alleged cybercrimes. More →

No Comments
Apple Employee Login Hackers

Hackers are offering to pay $23,000 for valid Apple employee login details

By on February 9, 2016 at 1:17 PM.

Hackers are offering to pay $23,000 for valid Apple employee login details

Apple has a high regard for security and secrecy, but that doesn’t mean hackers have simply given up the dream of accessing this particular fortress. In fact, a new report says that in Ireland, hackers are ready to pay up to €20,000, or approximately $23,000, to Apple employees willing to sell their login details. More →

No Comments
How to Not Get Hacked

Follow these 5 steps to keep yourself safe from hackers

By on February 5, 2016 at 1:22 PM.

Follow these 5 steps to keep yourself safe from hackers

No matter how secure you think your devices are, someone could access your data if they put their mind to it. It’s just the reality of the Information Age, but you should still do everything in your power to make yourself less of a target for hackers. More →

No Comments
Netflix Account Access Hack

The quick and easy way to see whether your Netflix account has been hacked

By on January 26, 2016 at 7:45 PM.

The quick and easy way to see whether your Netflix account has been hacked

You’re probably sharing your Netflix account with your loved ones, exes, and their best friends’ dads. There’s really nothing wrong with that and Netflix doesn’t care. But what Netflix does care about is where its content is seen. That’s why you absolutely must check who’s using your account and where they’re located. You should also remember that Netflix credentials are one of the cheapest commodities on the dark web, with accounts selling for less than $1 a pop.

More →

No Comments
Harman AMX Backdoors Batman Black Widow

Did Batman and Black Widow spy on the White House?

By on January 22, 2016 at 9:23 PM.

Did Batman and Black Widow spy on the White House?

This isn’t some strange fiction story in which two popular superheroes team up against the U.S. government. “Batman” – specifically “1MB@tMan” – and “BlackWindow” are codenames used for backdoor logins into conference room tools used by various governments around the world, including White House staff and other branches of the U.S. government.

The recently discovered backdoors could be used for spying, a research firm has said, although the creator of the affected products denies it all. More →

No Comments
NSA Encryption Backdoors Privacy

The NSA has a brilliant stance on encryption

By on January 22, 2016 at 8:24 PM.

The NSA has a brilliant stance on encryption

Discussions about the U.S. government’s need for breaking encryption have intensified following the mid-November attacks in Paris. Law enforcement agencies including the FBI and politicians have challenged tech leaders from Silicon Valley to find ways to include backdoors in encrypted products. That way, surveillance operations targeting potential terror suspects might have a better chance of successfully intercepting relevant communication.

Tech leaders, meanwhile, have stood firm against crippling encryption with backdoors, with Apple and Tim Cook at the forefront of this argument. That doesn’t mean tech companies unwilling to help intelligence agencies address terrorist threats – but they’ll just do it differently for the time being.

With all that in mind, one can’t help but applaud the NSA’s brilliant stance on encryption while simultaneously feeling a chill running down your spine. More →

No Comments
Stolen Uber Account Ghost Rides

Hacked Uber accounts are more valuable than stolen credit cards on the dark web

By on January 21, 2016 at 10:40 PM.

Hacked Uber accounts are more valuable than stolen credit cards on the dark web

What’s the hottest thing you can buy on the dark web today? According to new research, PayPal accounts with at least $500 in them and Uber accounts are among the most expensive items hackers are selling. In fact, it looks like Uber logins, which would let buyers score free rides on the popular taxi service, are even more expensive than Netflix logins and credit card account numbers. More →

No Comments
Jeb Bush Police State NSA

Meet Jeb Bush’s police state: The NSA in charge of civilian data

By on January 15, 2016 at 7:45 PM.

Meet Jeb Bush’s police state: The NSA in charge of civilian data

Given the various recent terrorist attacks, it’s no wonder that hackers, cybersecurity, encryption and surveillance are all major topics of this year’s presidential campaign. Encryption was on the table during the sixth Republican debate on Thursday night, with Jeb Bush proposing a solution for guarding the American people that seems to be taken out of a George Orwell novel. More →

No Comments
Teen Hacks James Clapper

Teen who hacked CIA director’s email hits Director of National Intelligence next

By on January 13, 2016 at 9:45 PM.

Teen who hacked CIA director’s email hits Director of National Intelligence next

Remember the teenage hackers who managed to break into CIA director John Brennan’s email account several times? It looks like they’re back doing the same sort of activity, and this time they’ve targeted Director of National Intelligence James Clapper.

More →

No Comments