A teen hacker and two other people managed to hack CIA Director John Brennan’s personal email, revealing sensitive information from his email account. The group used various social-engineering techniques to pull information from tech support departments from Verizon and AOL that ultimately led to accessing the personal account of their target. More →
Most of the recent malware-related security reports detailed various threats targeting Apple’s iOS ecosystem, but that doesn’t mean hackers have stopped attacking Android. A new report claims that a sneaky type of malware has been found in various app stores, including Google’s official Play Store. Once installed on the device, the malware is very hard to remove. Its purpose is to flood a handset with advertising and hackers behind the attack might make as much as $4 milliom from the fraudulent app installs.
How confident are you that your virtual assistant is only listening to your commands? Think there’s any chance Siri or Google Now could be duped into performing actions on iPhones and Android handsets that you haven’t actually asked for? Yes, it seems some smart hackers have found one more way to compromise the security of iPhones and Androids to either spy on users, or initiate secondary malware activities. More →
Hackers looking to steal money from ATMs have targeted your credit cards for years, trying to obtain access to it by hacking online services and retail shops. However, since more and more markets including America are adopting more secure payment methods like chip-and-PIN cards and mobile payments, some talented hackers are adapting their game accordingly.
Rather than trying to steal credit cards, clone them and only then try to obtain cash out of ATMs, some people are simply targeting the machines with malware that makes them spit out cash on command. More →
iOS is safer than Android when it comes to malware attacks, but that doesn’t mean hackers aren’t successfully targeting the iPhone and iPad with malicious programs supposed to steal sensitive data. Usually, iOS malware reports explain that jailbroken devices are at risk, especially in Asian countries and that only a tiny fraction of Apple’s massive number of customers is affected. However, that’s not the case anymore.
A substantial security threat called XcodeGhost managed to fool App Store security and sneak into the App Store inside real App Store apps potentially affecting hundreds of millions of iPhone and iPad users on both stock and jailbroken devices. The one thing that’s common with recent iOS hacks is that the threat comes from China. More →
No wonder the Pentagon has announced it’s working on a plan to fund tools and researchers to help organizations defend themselves against the pervasive threat of cyber assaults known as distributed denial-of-service (DDoS) attacks.
In recent days, the agency said it’s looking to fund researchers who can come up with tools as part of a program starting next April that would, among other things, help organizations recover from DDoS attacks in a maximum of 10 seconds. And the acknowledgement of that hunt for researchers for the program, called Extreme DDoS Defense, arguably comes not a moment too soon. More →
The Ashley Madison hacking scandal is far from over and now users have yet another thing to worry about. Reports say there’s evidence Ashley Madison made millions of dollars from users who paid to have their profiles erased from its databases for good, even though the website still kept identifiable data for each of the deleted profiles. More →
Spy agencies like the NSA and many others aren’t the only ones able to bug your calls and text messages, a new investigation shows. It turns out that anyone with the right equipment and know-how can tap into a carrier’s phone network to access calls and text messages for without the target’s knowledge. More →
The U.S. Internal Revenue Service (IRS) revealed on Monday that the hack disclosed to the public in May is bigger in scope than initially believed. According to the IRS, tax information belonging to thousands of other U.S. taxpayers have been stolen during the hack. The purpose of these cyberhits appears to be money related, as hackers have been using the information to generate fraudulent tax returns. More →
Not all hackers out there are looking to steal your information and use it for personal gain. Rather than setting up sophisticated schemes to obtain website logins or get millions of credit card records and personal information from huge retail chains, some hackers preferred to read the news before you do.
And that early access to information is how some of them made millions. More →
If a device is connected to a wireless network, chances are some talented hackers will find a way to take advantage of its software flaws to make it do what they want, whether we’re talking about smartphones, computers, routers, and even rifles. Yes, there’s a smart Internet-connected rifle out there that can turn anyone into a perfect shot — but some hackers found out how to disable it and even change its target. More →