Anonymous Hack Donald Trump

Anonymous says it hacked Donald Trump and leaked his social security number

By on March 18, 2016 at 10:47 AM.

Anonymous says it hacked Donald Trump and leaked his social security number

A few days ago, hacker collective Anonymous declared a “total war” on Republican front-runner Donald Trump, and it looks like the group may have already gained access to some personal data belonging to the presidential candidate.

More →

No Comments
How to Remove Ransomware

Hackers are now patching ransomware, making it impossible to crack

By on March 17, 2016 at 5:30 PM.

Hackers are now patching ransomware, making it impossible to crack

Living in the connected future, software is never broken for long. If you buy a program or an app or a video game that doesn’t work as intended, the developers now have the ability to send out a patch within a matter of days or even hours.

But there’s a downside to software patches being relatively easy to roll out. It means that hackers can fix the malware they distribute after security experts find workarounds, which is exactly what happened in the case of TeslaCrypt.
More →

No Comments
Hackers Cracking Internet Sex Toys

There’s nothing funny about hackers cracking web-connected sex toys

By on March 16, 2016 at 3:45 PM.

There’s nothing funny about hackers cracking web-connected sex toys

With so many other hacking threats out there, you probably don’t believe that hackers breaking into Internet-connected sex toys is a big deal. However, this is a serious matter, as cybercriminals are targeting more and more products that are connected to the Internet to steal or temporarily hijack data. More →

No Comments
Ransomware Chinese Hackers Attacks

Professional Chinese hackers are responsible for U.S. ransomware attacks

By on March 15, 2016 at 7:40 PM.

Professional Chinese hackers are responsible for U.S. ransomware attacks

Ransomware is a kind of cyber attack that’s growing in popularity. Here’s how it works: hackers infiltrate computers, encrypt files you want to have access to, and demand money from you to get them back via anonymous Bitcoin transactions.

Ransomware attacks are conducted by ordinary individuals with extraordinary computer skills, but recent developments suggest that hackers who may have otherwise worked for the Chinese government are turning to ransomware operations to supplement their fading income. More →

No Comments
Hackers $1 Billion Bank Heist Bangladesh

A hacker’s typo stopped the biggest bank heist in history

By on March 10, 2016 at 3:56 PM.

A hacker’s typo stopped the biggest bank heist in history

We’ve often heard about hackers stealing personal data from millions of users by attacking retail stores, banks and even the U.S. government. But we’ve never heard about hackers trying to steal $1 billion. And what’s more, they were thwarted because of a simple typo that alerted banks to the fraudulent money transfers. More →

No Comments
1456940956297

From high seas to high tech: Pirates hack shipping company

By on March 2, 2016 at 6:35 PM.

From high seas to high tech: Pirates hack shipping company

Cunning tech-savvy pirates hacked a shipping company’s systems, enabling them to carefully target cargo on the firm’s vessels.

A report released by Verizon RISK (Research, Investigations, Solutions and Knowledge) Team reveals that “a global shipping conglomerate” fell victim to the high-tech pirates. The unnamed company contacted the Verizon cyber specialists after the pirates adopted a new strategy.   More →

No Comments
Hacker Protection

Why protecting critical infrastructure from cyberattacks is a global emergency

By on February 15, 2016 at 5:35 PM.

Why protecting critical infrastructure from cyberattacks is a global emergency

On Dec. 23, the entire Ivano-Frankivsk region in Ukraine suffered a major power outage. According to security experts and the Ukrainian Government the attackers used a destructive variant of the popular BlackEnergy malware.

According to a Ukrainian media, the power outage was caused by a destructive malware that disconnected electrical substations. Experts speculate that the hackers targeted Ukrainian power authorities with a spear phishing campaign to spread the malware, leveraging Microsoft Office documents. The incident in Ukraine has refocused attention on the security of critical infrastructure worldwide. More →

No Comments
CIA FBI Cracka Hacker Arrested

16-year-old British boy suspected to have hacked CIA director and the FBI arrested

By on February 12, 2016 at 8:00 PM.

16-year-old British boy suspected to have hacked CIA director and the FBI arrested

We knew somebody hacked CIA Director John Brennan last October, but we had no idea who the person was and how old they may have been. Since the attack on Brennan, the attacker known as “Cracka” struck again, focusing on the Director of National Intelligence in early January. Furthermore, Cracka is believed to have leaked the personal details of thousands of FBI and U.S. Department of Homeland Security employees online recently.

A report now reveals that the person suspected to have done all this is a British 16-year-old boy who was recently arrested for his alleged cybercrimes. More →

No Comments
Apple Employee Login Hackers

Hackers are offering to pay $23,000 for valid Apple employee login details

By on February 9, 2016 at 1:17 PM.

Hackers are offering to pay $23,000 for valid Apple employee login details

Apple has a high regard for security and secrecy, but that doesn’t mean hackers have simply given up the dream of accessing this particular fortress. In fact, a new report says that in Ireland, hackers are ready to pay up to €20,000, or approximately $23,000, to Apple employees willing to sell their login details. More →

No Comments
How to Not Get Hacked

Follow these 5 steps to keep yourself safe from hackers

By on February 5, 2016 at 1:22 PM.

Follow these 5 steps to keep yourself safe from hackers

No matter how secure you think your devices are, someone could access your data if they put their mind to it. It’s just the reality of the Information Age, but you should still do everything in your power to make yourself less of a target for hackers. More →

No Comments
Netflix Account Access Hack

The quick and easy way to see whether your Netflix account has been hacked

By on January 26, 2016 at 7:45 PM.

The quick and easy way to see whether your Netflix account has been hacked

You’re probably sharing your Netflix account with your loved ones, exes, and their best friends’ dads. There’s really nothing wrong with that and Netflix doesn’t care. But what Netflix does care about is where its content is seen. That’s why you absolutely must check who’s using your account and where they’re located. You should also remember that Netflix credentials are one of the cheapest commodities on the dark web, with accounts selling for less than $1 a pop.

More →

No Comments
Harman AMX Backdoors Batman Black Widow

Did Batman and Black Widow spy on the White House?

By on January 22, 2016 at 9:23 PM.

Did Batman and Black Widow spy on the White House?

This isn’t some strange fiction story in which two popular superheroes team up against the U.S. government. “Batman” – specifically “1MB@tMan” – and “BlackWindow” are codenames used for backdoor logins into conference room tools used by various governments around the world, including White House staff and other branches of the U.S. government.

The recently discovered backdoors could be used for spying, a research firm has said, although the creator of the affected products denies it all. More →

No Comments
NSA Encryption Backdoors Privacy

The NSA has a brilliant stance on encryption

By on January 22, 2016 at 8:24 PM.

The NSA has a brilliant stance on encryption

Discussions about the U.S. government’s need for breaking encryption have intensified following the mid-November attacks in Paris. Law enforcement agencies including the FBI and politicians have challenged tech leaders from Silicon Valley to find ways to include backdoors in encrypted products. That way, surveillance operations targeting potential terror suspects might have a better chance of successfully intercepting relevant communication.

Tech leaders, meanwhile, have stood firm against crippling encryption with backdoors, with Apple and Tim Cook at the forefront of this argument. That doesn’t mean tech companies unwilling to help intelligence agencies address terrorist threats – but they’ll just do it differently for the time being.

With all that in mind, one can’t help but applaud the NSA’s brilliant stance on encryption while simultaneously feeling a chill running down your spine. More →

No Comments