Countless Snowden leaks have detailed the highly sophisticated tools used by the NSA to collect data in bulk from unsuspecting people, including American citizens. But the NSA isn’t the only agency conducting spying operations. The FBI has been spying on US citizens as part of ongoing investigations for two decades, yet many details about its data collection practices are still secret, despite all of the leaks in recent years. More →
This past February, some clever hackers pulled off a daring bank heist that was aided by a Bangladeshi bank’s decision to buy cheap second-hand $10 routers. In fact, the cheap routers let hackers get away with $81 million by giving them access to the secure computers that handle SWIFT monetary transactions and helping them hide their tracks. More →
Mobile security is obviously a major topic these days but it seems very few of us know just how vulnerable our phones are to hacking. 60 Minutes this week decided to give a new iPhone to Representative Ted Lieu (D-Calif.) and then challenge researchers at Security Research Labs to hack it. It goes without saying that the hackers were frighteningly successful in this endeavor and managed to retrieve a lot of sensitive information from the congressman’s device after only learning his phone number. More →
I admit it: I put tape over my computer’s webcam. This is a paranoid thing to do. That said, I spend so much time in front of my computer that if a hacker managed to infiltrate my webcam and record everything I do, I’m sure they’d get lots of footage of me doing something embarrassing or disgusting.
As I said earlier, I’m admittedly paranoid. But I’m not alone. More →
One way that hackers steal unsuspecting consumers’ financial data is by installing skimmer devices on ATMs and payment terminals that record and store all credit card information for the hackers to use at a later date. A video released by the Miami Beach Police this week shows just how shockingly easy it is to install such a device on a payment terminal at a convenience store, as a hacker in the video managed to pull it off in roughly three seconds while the store’s clerk was distracted. More →
If you’ve ever been tempted to ask hackers to do their worst to you, you probably shouldn’t. Kevin Roose of Fusion recently made the trip to Las Vegas to ask hackers at DefCon to show off all the ways they could hack into his digital life and ruin everything for him. What he discovered left him pretty horrified. More →
Each year, security solutions provider SplashData releases a list of what it has determined to be the most commonly used passwords on the Internet. In other words, these passwords are the worst possible options you can choose to safeguard your accounts, because they’re all ridiculously common and are likely among the first options people with any know-how will try when attempting to gain access to your online accounts.
Are you looking to get hacked and you want to make it as easy as possible for anyone and everyone to gain access to your accounts? Feel free to choose any of the 25 options below as your new password. More →
Not too long ago, Eddie Tipton was convicted of hacking into the Multi-State Lottery Association’s computer system in order to rig a nearly $17 million jackpot in Iowa. Now comes word that an investigation into Tipton’s hacking activities is expanding to include a number of other states. Thus far, lottery officials from Colorado, Wisconsin and Oklahoma have indicated that Tipton may have also gamed lottery jackpots in their respective states.
In what can only be described as a major security lapse, it seems some hackers from Russia successfully broke into the servers of Dow Jones, Inc. and swiped some key secret trading data before it was made public. Bloomberg reports that the Federal Bureau of Investigation, Secret Service and the Securities and Exchange Commission have been leading an investigation into the hack for at least a year now and it sounds like a very serious breach. More →
No wonder the Pentagon has announced it’s working on a plan to fund tools and researchers to help organizations defend themselves against the pervasive threat of cyber assaults known as distributed denial-of-service (DDoS) attacks.
In recent days, the agency said it’s looking to fund researchers who can come up with tools as part of a program starting next April that would, among other things, help organizations recover from DDoS attacks in a maximum of 10 seconds. And the acknowledgement of that hunt for researchers for the program, called Extreme DDoS Defense, arguably comes not a moment too soon. More →
Stories surrounding car hacking seem to be all the rage these days. The issue was first thrust into the spotlight a few weeks ago when famed hackers Charlie Miller and Chris Valasek were able to take over Wired reporter Andy Greenberg’s jeep as it sped down the highway at 70 mph.
Such is the risk involved with connected cars. On the one hand, the technology that underlies modern vehicles makes driving more convenient, efficient, and enjoyable than ever before. On the other, expanded capabilities opens up the door for hackers to potentially wreak havoc.
That being the case, there’s one car company, above all others, who has their security game on lock down. Not surprisingly, that company is Tesla.
It looks like Russian hackers made a significant breach into the Pentagon’s email system. Officials tell NBC News that Russia has launched a “sophisticated cyberattack” against the unclassified email system of the Joint Chiefs of Staff. The hack has forced the Pentagon to shut down the email system for almost two weeks now and it’s affected more than 4,000 military and civilian employees who work for the Joint Chiefs. More →
Connected cars are awesome but they also present big opportunities for hackers to cause significant, and potentially deadly, mischief. Reuters reports that white-hat hacker Samy Kamkar says he’s figured out a way to hack into GM’s OnStar mobile app and then use it to remotely open and start GM cars. More →