We’ve seen ransomware stories popping up left and right this year, detailing how hackers are making money from a scary, yet creative, type of malware. Just as the name of this attack suggests, ransomware encrypts personal files on a computer, demanding a ransom in order to release them back to users. Victims have to pay up a fee and hope that the hackers decrypt their data instead of simply taking the money and running. Sure, you can always refuse to pay the ransom, and you can try to use one of the publicly available tools that can decrypt your files (Microsoft has one too), but hackers have now devised a new method to convince you to pay up: They’ll expose your files online if you don’t. More →
For almost two years now, security breaches of all sorts have made the news. Hackers attacked retail stores and stole credit card numbers and other data, and they have attacked banks, medical insurers, and various governmental institutions. Add to that the odd attack against an online service caught off-guard by hackers – Ashley Madison comes immediately to mind – and the chances are that some of your data may have ended up in the wrong hands.
Criminals can clone your credit cards, at least until you’ve canceled them, but the worst thing that can happen is having your identity stolen. In such a case, you might be in for a wild ride as you’re trying to get your identity back. More →
Using weak passwords makes you a prime target for hackers, who have shown over the years that they can eat such subpar security measures for breakfast. Luckily, there are simple ways to ensure your online accounts are protected. These include using unique passwords for each service, creating long enough passwords that are easily rememberable, using password-managing services, and changing your passwords once in a while.
Interestingly, one 11-year-old girl can help with this by generating a long password for you that’s easily memorable and hard to crack. In fact, she even has an online site where she sells each password for $2 each. More →
Fitbits are popular devices among people who like to track their steps and exercise. But new research reveals that a Fitbit device is unprotected against simple malware attacks. More importantly, the malicious code that can be sent to a Fitbit device without the user’s knowledge can then infect a computer used to sync data collected by the wearable. More →
A teen hacker and two other people managed to hack CIA Director John Brennan’s personal email, revealing sensitive information from his email account. The group used various social-engineering techniques to pull information from tech support departments from Verizon and AOL that ultimately led to accessing the personal account of their target. More →
Most of the recent malware-related security reports detailed various threats targeting Apple’s iOS ecosystem, but that doesn’t mean hackers have stopped attacking Android. A new report claims that a sneaky type of malware has been found in various app stores, including Google’s official Play Store. Once installed on the device, the malware is very hard to remove. Its purpose is to flood a handset with advertising and hackers behind the attack might make as much as $4 milliom from the fraudulent app installs.
How confident are you that your virtual assistant is only listening to your commands? Think there’s any chance Siri or Google Now could be duped into performing actions on iPhones and Android handsets that you haven’t actually asked for? Yes, it seems some smart hackers have found one more way to compromise the security of iPhones and Androids to either spy on users, or initiate secondary malware activities. More →
Hackers looking to steal money from ATMs have targeted your credit cards for years, trying to obtain access to it by hacking online services and retail shops. However, since more and more markets including America are adopting more secure payment methods like chip-and-PIN cards and mobile payments, some talented hackers are adapting their game accordingly.
Rather than trying to steal credit cards, clone them and only then try to obtain cash out of ATMs, some people are simply targeting the machines with malware that makes them spit out cash on command. More →
iOS is safer than Android when it comes to malware attacks, but that doesn’t mean hackers aren’t successfully targeting the iPhone and iPad with malicious programs supposed to steal sensitive data. Usually, iOS malware reports explain that jailbroken devices are at risk, especially in Asian countries and that only a tiny fraction of Apple’s massive number of customers is affected. However, that’s not the case anymore.
A substantial security threat called XcodeGhost managed to fool App Store security and sneak into the App Store inside real App Store apps potentially affecting hundreds of millions of iPhone and iPad users on both stock and jailbroken devices. The one thing that’s common with recent iOS hacks is that the threat comes from China. More →
No wonder the Pentagon has announced it’s working on a plan to fund tools and researchers to help organizations defend themselves against the pervasive threat of cyber assaults known as distributed denial-of-service (DDoS) attacks.
In recent days, the agency said it’s looking to fund researchers who can come up with tools as part of a program starting next April that would, among other things, help organizations recover from DDoS attacks in a maximum of 10 seconds. And the acknowledgement of that hunt for researchers for the program, called Extreme DDoS Defense, arguably comes not a moment too soon. More →
The Ashley Madison hacking scandal is far from over and now users have yet another thing to worry about. Reports say there’s evidence Ashley Madison made millions of dollars from users who paid to have their profiles erased from its databases for good, even though the website still kept identifiable data for each of the deleted profiles. More →
Spy agencies like the NSA and many others aren’t the only ones able to bug your calls and text messages, a new investigation shows. It turns out that anyone with the right equipment and know-how can tap into a carrier’s phone network to access calls and text messages for without the target’s knowledge. More →