After a Motherboard report in March said that details for at least some Uber accounts had been accessed by hackers who were selling them online for as little as $1, the publication is back with a followup to the story. Now, it looks like American Uber customers have been targeted by hackers, who may have obtained access to some accounts. More →
Last year, hackers hit the unclassified computer network of the White House, accessing in the process the email correspondence between President Obama and some of the people he emails, or used to email frequently, The New York Times reports. Initially, the White House did not disclose this detail, and it’s not clear what kind of sensitive data has been stolen in the processes, but the Times learned the hack has been “more intrusive and worrisome” than publicly acknowledged. More →
Free public Wi-Fi hotspots are terrific. They offer users quick and reliable Internet connections where cellular reception is spotty. And even in areas with strong cellular signals, users can connect their phones, tablets and laptops to public Wi-Fi hotspots in order to conserve data on their mobile plans and steer clear of those pesky data caps.
Of course, there is one problem with public Wi-Fi networks, and it’s a big one: They’re completely open, which means any data you send or receive while connected to these networks is vulnerable and can easily be stolen by hackers. More →
Recent reports have shown that Wi-Fi routers are frequent targets for hackers who try to reroute some of the Internet traffic from the homes of unsuspecting users to fake websites that masquerade as genuine trusted sites. From there, they send the users more ads than they’d usually see while online, potentially steal their personal information, and perform other malicious tasks. To help users discover whether their home routers have been taken over by skilled attackers, F-Secure has come up with a simple online tool called Router Checker that lets anyone secure their home network with just one click. More →
When hackers steal money from banks, they usually go for Bonnie and Clyde attacks, taking whatever they can take in a single grab, one Kaspersky executive told The New York Times, as the security research discovered a different type of bank cyber heist, one likened to Ocean’s Eleven in terms of planning, but also when it comes to the significant amount of stolen cash. More →
Earlier this week, noted security researcher and consultant Mark Burnett made waves when he posted 10 million stolen usernames and passwords on his blog. Of course, the security expert didn’t post the passwords with malicious intent. Instead, his goal was to “release a clean set of data” that gives the world insights into user behavior, and also to draw attention once again to the arrest and prosecution of Barrett Brown.
Burnett didn’t steal the passwords in question, of course, but they’re now easily accessible to anyone and everyone — here’s how you can quickly and easily find out if you are affected. More →
Ever wanted to get access to your spouse’s Facebook account without them knowing? Are you looking to order some shady products from the “deep web?” Interested in clearing your record, or improving your grades? There’s a hacker for that, or at least a site where you can list such requests and appropriate rewards, hoping that hackers will be interested in helping out. More →
Surfing the web privately is something many web users are interested in, whether they’re doing it on a desktop, laptop or mobile device, but not many people know how to do it. Recently, a detailed WhoIsHostingThis infographic showed you how to secure your connection using a VPN — a virtual private network created on top of a public network to anonymize web traffic — on Windows, Mac and iOS, assuming the user already has access to a VPN service. Phone Arena has put together a similar step-by-step guide of enabling VPN connectivity on Android devices. More →
Most Internet users are scared of hackers, and rightfully so. While the terms is sometimes used to describe any computer programmer, it typically has a negative connotation and is used to describe nefarious coders who make digital chaos their mission on the web.
Sometimes, hackers target large companies and steal customers’ credit card data. That data is then sold on the black market, potentially causing huge headaches for victims. And sometimes, hackers target companies or individuals just for fun — they cause as much chaos as possible just because they can.
There is no end in sight for the battle between security researchers and hackers, and now things have gotten even scarier thanks to a new service that makes it shockingly easy for anyone to hire a hacker. More →
If we learned anything in 2014, it’s the simple but painful truth that here in the digital age, we are not safe. Nefarious hackers are lurking around every virtual corner of the Internet, constantly developing new ways to attack us and steal our private data. Many times, these hackers target the large companies that store our data and as troubling as it is, there is simply nothing we can do to safeguard information that is held by third parties. Instead, we must rely on these companies to take the necessary measures to protect our data.
When it comes to our own data and our personal browsing habits, there are measures we all can and should take to protect ourselves. More →
The recent Sony Pictures hack might be the most talked-about cyber attack of the Christmas season, and one of the biggest online data heists to date, but there were plenty of other attacks this past year that affected tens of millions of consumers. Information is Beautiful has set up an interactive page on its website that shows the world’s biggest data breaches to date, revealing the severity of this issue that now affects us more and more frequently. More →
Even though the recent Sony Pictures hack did not affect as many individuals as the Target or Home Depot hacks, the cyber heist is still one of the most talked-about attacks to date, considering the massive amount of internal information the hackers stole, releasing some of it online and exposing personal data belonging to Sony employees in the process. Many reports have detailed the various things hackers revealed about Sony’s daily operations and business plans, but a new report gives us an idea of how the cyber caper felt from the inside. More →