In the wake of the numerous sophisticated cyberattacks that managed to steal credit and debit card data from various retail stores in the U.S., President Obama on Friday signed an executive order to improve security for credit cards and payment systems used by the government, The New York Times reports. More →
Smart hackers who understand how always-connected devices work — and who know how to exploit the various security bugs found in operating systems — are capable of infecting mobile devices with malware that can of incur costs and/or steal data. They can do this using a number of methods: By grabbing personal data in sophisticated attacks targeting retail store chains and banks, conducting advanced online phishing attacks, or stealing money directly from ATMs, to name just a few of the recent security threats detailed by various reports. More →
In early January, and then again in March, reports detailed some smart ATM attacks that allowed hackers to steal money from malware-infected ATMs without requiring any access to the credit or debit cards used by customers. Instead, hackers managed to steal cash directly from the bank, after taking over the machines with special programs. This ultimate heist appears to still be working, The Register reports, as hackers are still using the practice that has netted them “millions of dollars.” More →
JPMorgan and at least four other unnamed U.S. banks have been targeted by hackers, The New York Times and Bloomberg report, although it’s not clear what the purpose of this “sophisticated cyberattack” really was. More →
Can your online data ever really be safe? Not when malicious hackers are lurking around every virtual corner, constantly developing devious new ways to steal sensitive data including passwords and credit card information. Online security is constantly improving, of course, but even the biggest companies in the world are susceptible to security breaches. And the sad truth of the matter is that there’s nothing you can do to protect your data once it’s stored on a company’s servers.
In case that harsh realization isn’t scary enough on its own, a new graphic helps remind us of the eight worst online security breaches in recent history. More →
Less than a dozen young Russian hackers have “audited the Internet,” as one security researcher told The New York Times, and have stolen a massive amount of usernames and password combinations that are used for login purposes on hundreds of thousands of websites. Instead of selling them on the black market, the hackers are apparently using them to sell spamming services to interested parties. More →
AT&T late last week confirmed that three employees of one of the company’s vendors accessed personal data belonging to some of its customers for almost two weeks in April. The company did not say how many accounts were affected during the data breach, or why it took so long to confirm it. More →
Following Target, Neiman Marcus and Michael’s Stores, all major retailers which have been targeted by hackers in the past months, restaurant chain P.F. Chang’s China Bistro on Thursday confirmed that its payment system has also been breached, with credit and debit card data from some of its locations having been exposed. More →
Nefarious hackers are lurking around every corner of the Internet, constantly working on new ways to beat Web security and steal our data. Some methods they employ involve remote digital attacks that utilize security flaws to steal data from corporate servers. And sometimes they perpetrate physical breaches, as was the case with the major Target attack we saw last year. Large corporations aren’t the only targets though, and one reporter recently found out firsthand what it’s like to be an Internet spy. More →
EBay initially thought that user data was safe following the security breach it fell victim to recently. As it turns out, that wasn’t the case at all; as Reuters noted in a recent report, eBay has now confirmed that personal data belonging to all 145 million of its users was accessed and compromised in the attack, making it one of the biggest breaches of all time.
If it wasn’t our devices and data at risk, it would be pretty fascinating to see the creative new ways hackers find to attack various systems. But it is our data and devices being compromised constantly by nefarious hackers, and their latest tactics use Apple’s own security tools against Apple device owners in one of the most devious hacks we have seen in quite some time. More →