FBI Hacking Americans History Tools

The FBI has quietly been hacking Americans for 20 years

By on May 16, 2016 at 11:22 PM.

The FBI has quietly been hacking Americans for 20 years

Countless Snowden leaks have detailed the highly sophisticated tools used by the NSA to collect data in bulk from unsuspecting people, including American citizens. But the NSA isn’t the only agency conducting spying operations. The FBI has been spying on US citizens as part of ongoing investigations for two decades, yet many details about its data collection practices are still secret, despite all of the leaks in recent years. More →

No Comments
Bangladesh Bank Heist Hackers

Thrifty bank’s $10 routers lead to $81 million heist

By on April 22, 2016 at 10:50 AM.

Thrifty bank’s $10 routers lead to $81 million heist

This past February, some clever hackers pulled off a daring bank heist that was aided by a Bangladeshi bank’s decision to buy cheap second-hand $10 routers. In fact, the cheap routers let hackers get away with $81 million by giving them access to the secure computers that handle SWIFT monetary transactions and helping them hide their tracks. More →

No Comments
60 Minutes Congressman Phone Hack Video

It was shockingly easy for ’60 Minutes’ to hack a congressman’s iPhone

By on April 18, 2016 at 10:25 AM.

It was shockingly easy for ’60 Minutes’ to hack a congressman’s iPhone

Mobile security is obviously a major topic these days but it seems very few of us know just how vulnerable our phones are to hacking. 60 Minutes this week decided to give a new iPhone to Representative Ted Lieu (D-Calif.) and then challenge researchers at Security Research Labs to hack it. It goes without saying that the hackers were frighteningly successful in this endeavor and managed to retrieve a lot of sensitive information from the congressman’s device after only learning his phone number. More →

No Comments
Should I Put Tape On My Laptop Camera

So, who else puts tape over their laptop’s webcam?

By on April 12, 2016 at 12:08 PM.

So, who else puts tape over their laptop’s webcam?

I admit it: I put tape over my computer’s webcam. This is a paranoid thing to do. That said, I spend so much time in front of my computer that if a hacker managed to infiltrate my webcam and record everything I do, I’m sure they’d get lots of footage of me doing something embarrassing or disgusting.

As I said earlier, I’m admittedly paranoid. But I’m not alone. More →

No Comments
Credit Card Skimmer Installation Video

Watch a hacker install a credit card skimmer in under 3 seconds

By on March 16, 2016 at 4:40 PM.

Watch a hacker install a credit card skimmer in under 3 seconds

One way that hackers steal unsuspecting consumers’ financial data is by installing skimmer devices on ATMs and payment terminals that record and store all credit card information for the hackers to use at a later date. A video released by the Miami Beach Police this week shows just how shockingly easy it is to install such a device on a payment terminal at a convenience store, as a hacker in the video managed to pull it off in roughly three seconds while the store’s clerk was distracted. More →

No Comments
What Its Like Being Hacked

‘I could have made you homeless’: What happens when you dare hackers to do their worst?

By on February 25, 2016 at 4:07 PM.

‘I could have made you homeless’: What happens when you dare hackers to do their worst?

If you’ve ever been tempted to ask hackers to do their worst to you, you probably shouldn’t. Kevin Roose of Fusion recently made the trip to Las Vegas to ask hackers at DefCon to show off all the ways they could hack into his digital life and ruin everything for him. What he discovered left him pretty horrified. More →

No Comments
Worst Passwords 2016

These are the worst passwords in the world – do you use any of them?

By on January 19, 2016 at 9:43 AM.

These are the worst passwords in the world – do you use any of them?

Each year, security solutions provider SplashData releases a list of what it has determined to be the most commonly used passwords on the Internet. In other words, these passwords are the worst possible options you can choose to safeguard your accounts, because they’re all ridiculously common and are likely among the first options people with any know-how will try when attempting to gain access to your online accounts.

Are you looking to get hacked and you want to make it as easy as possible for anyone and everyone to gain access to your accounts? Feel free to choose any of the 25 options below as your new password. More →

No Comments
Lottery Hacker

How a security director used a rootkit to rig the lottery and steal millions of dollars

By on December 23, 2015 at 12:00 AM.

How a security director used a rootkit to rig the lottery and steal millions of dollars

Not too long ago, Eddie Tipton was convicted of hacking into the Multi-State Lottery Association’s computer system in order to rig a nearly $17 million jackpot in Iowa. Now comes word that an investigation into Tipton’s hacking activities is expanding to include a number of other states. Thus far,  lottery officials from Colorado, Wisconsin and Oklahoma have indicated that Tipton may have also gamed lottery jackpots in their respective states.

More →

No Comments
Russian Hackers Dow Jones Hack

Russian hackers break into Dow Jones, swipe secret trading information

By on October 16, 2015 at 3:14 PM.

Russian hackers break into Dow Jones, swipe secret trading information

In what can only be described as a major security lapse, it seems some hackers from Russia successfully broke into the servers of Dow Jones, Inc. and swiped some key secret trading data before it was made public. Bloomberg reports that the Federal Bureau of Investigation, Secret Service and the Securities and Exchange Commission have been leading an investigation into the hack for at least a year now and it sounds like a very serious breach. More →

No Comments
Featured
DDoS Attacks Report 2015 Trends

DDoS attacks are getting much more powerful and the Pentagon is scrambling for solutions

By on August 31, 2015 at 3:10 PM.

DDoS attacks are getting much more powerful and the Pentagon is scrambling for solutions

No wonder the Pentagon has announced it’s working on a plan to fund tools and researchers to help organizations defend themselves against the pervasive threat of cyber assaults known as distributed denial-of-service (DDoS) attacks.

In recent days, the agency said it’s looking to fund researchers who can come up with tools as part of a program starting next April that would, among other things, help organizations recover from DDoS attacks in a maximum of 10 seconds. And the acknowledgement of that hunt for researchers for the program, called Extreme DDoS Defense, arguably comes not a moment too soon. More →

No Comments
Tesla Hacking

Want to hack a car? Don’t try hacking a Tesla

By on August 14, 2015 at 10:30 PM.

Want to hack a car? Don’t try hacking a Tesla

Stories surrounding car hacking seem to be all the rage these days. The issue was first thrust into the spotlight a few weeks ago when famed hackers Charlie Miller and Chris Valasek were able to take over Wired reporter Andy Greenberg’s jeep as it sped down the highway at 70 mph.

Such is the risk involved with connected cars. On the one hand, the technology that underlies modern vehicles makes driving more convenient, efficient, and enjoyable than ever before. On the other, expanded capabilities opens up the door for hackers to potentially wreak havoc.

That being the case, there’s one car company, above all others, who has their security game on lock down. Not surprisingly, that company is Tesla.

More →

No Comments
Russia Pentagon Hack Joint Chiefs Of Staff

Russia pulls off a major hack of the Pentagon

By on August 6, 2015 at 4:00 PM.

Russia pulls off a major hack of the Pentagon

It looks like Russian hackers made a significant breach into the Pentagon’s email system. Officials tell NBC News that Russia has launched a “sophisticated cyberattack” against the unclassified email system of the Joint Chiefs of Staff. The hack has forced the Pentagon to shut down the email system for almost two weeks now and it’s affected more than 4,000 military and civilian employees who work for the Joint Chiefs. More →

No Comments
Car Hack GM OnStar App

Hacker claims he can use GM’s OnStar app to remotely open and start your car

By on July 30, 2015 at 6:35 PM.

Hacker claims he can use GM’s OnStar app to remotely open and start your car

Connected cars are awesome but they also present big opportunities for hackers to cause significant, and potentially deadly, mischief. Reuters reports that white-hat hacker Samy Kamkar says he’s figured out a way to hack into GM’s OnStar mobile app and then use it to remotely open and start GM cars. More →

No Comments