A mysterious hacking group has had access to U.S. government files for years and the hackers might still be able to siphon data off government computer networks. The hack apparently dates back to 2011, though it may be linked to attacks on the U.S. government’s computer infrastructure originating in 2008.
No web-connected service is safe. If you need more proof of this, consider a recent alleged attack on a porn site that apparently gave a hacker access to more than 237,000 accounts. In the aftermath of the Apple vs. FBI squabble over iPhone encryption, this is a reminder that strong security is needed for connected devices and products. More →
Unlike the iCloud hack targeting celebrities more than a year ago, Adele’s private photos that were leaked online over the weekend do not originate from iPhone backups, and they’re not nude photos either. However, hackers targeted the famed musician, managing to steal several private images that show various instances of the singer’s private life, including baby scans and selfies during pregnancy. More →
A few days ago, hacker collective Anonymous declared a “total war” on Republican front-runner Donald Trump, and it looks like the group may have already gained access to some personal data belonging to the presidential candidate.
Living in the connected future, software is never broken for long. If you buy a program or an app or a video game that doesn’t work as intended, the developers now have the ability to send out a patch within a matter of days or even hours.
But there’s a downside to software patches being relatively easy to roll out. It means that hackers can fix the malware they distribute after security experts find workarounds, which is exactly what happened in the case of TeslaCrypt.
With so many other hacking threats out there, you probably don’t believe that hackers breaking into Internet-connected sex toys is a big deal. However, this is a serious matter, as cybercriminals are targeting more and more products that are connected to the Internet to steal or temporarily hijack data. More →
Ransomware is a kind of cyber attack that’s growing in popularity. Here’s how it works: hackers infiltrate computers, encrypt files you want to have access to, and demand money from you to get them back via anonymous Bitcoin transactions.
Ransomware attacks are conducted by ordinary individuals with extraordinary computer skills, but recent developments suggest that hackers who may have otherwise worked for the Chinese government are turning to ransomware operations to supplement their fading income. More →
We’ve often heard about hackers stealing personal data from millions of users by attacking retail stores, banks and even the U.S. government. But we’ve never heard about hackers trying to steal $1 billion. And what’s more, they were thwarted because of a simple typo that alerted banks to the fraudulent money transfers. More →
Cunning tech-savvy pirates hacked a shipping company’s systems, enabling them to carefully target cargo on the firm’s vessels.
A report released by Verizon RISK (Research, Investigations, Solutions and Knowledge) Team reveals that “a global shipping conglomerate” fell victim to the high-tech pirates. The unnamed company contacted the Verizon cyber specialists after the pirates adopted a new strategy. More →
On Dec. 23, the entire Ivano-Frankivsk region in Ukraine suffered a major power outage. According to security experts and the Ukrainian Government the attackers used a destructive variant of the popular BlackEnergy malware.
According to a Ukrainian media, the power outage was caused by a destructive malware that disconnected electrical substations. Experts speculate that the hackers targeted Ukrainian power authorities with a spear phishing campaign to spread the malware, leveraging Microsoft Office documents. The incident in Ukraine has refocused attention on the security of critical infrastructure worldwide. More →
We knew somebody hacked CIA Director John Brennan last October, but we had no idea who the person was and how old they may have been. Since the attack on Brennan, the attacker known as “Cracka” struck again, focusing on the Director of National Intelligence in early January. Furthermore, Cracka is believed to have leaked the personal details of thousands of FBI and U.S. Department of Homeland Security employees online recently.
A report now reveals that the person suspected to have done all this is a British 16-year-old boy who was recently arrested for his alleged cybercrimes. More →
Apple has a high regard for security and secrecy, but that doesn’t mean hackers have simply given up the dream of accessing this particular fortress. In fact, a new report says that in Ireland, hackers are ready to pay up to €20,000, or approximately $23,000, to Apple employees willing to sell their login details. More →