Linux Forums Hacked

Here’s another really great reason to never touch Linux

By on July 15, 2016 at 1:50 PM.

Here’s another really great reason to never touch Linux

As a desktop OS, Linux leaves a lot to be desired compared to OS X or Windows. But one thing we’re always hearing about is the Linux community, a frequently-sweary place likeminded geeks can gather and work towards the greater good.

Well, that community — or at least one of its more prominent message boards — has been badly hacked.

More →

No Comments
Download Netflix Movies

A bug in Chrome makes pirating Netflix and Amazon movies easy

By on June 24, 2016 at 3:50 PM.

A bug in Chrome makes pirating Netflix and Amazon movies easy

Bad news for Google, good news for pirates: a pair of security researchers have found a flaw in the way the Chrome browser unpacks encrypted video. It’s all rather technical, but the upshot is that pirates have an easy way to save DRM-ed video streams to their desktop.

Wired first reported on the vulnerability, which was discovered by researchers David Livshits from the Cyber Security Research Center at Ben-Gurion University and Alexandra Mikityuk of Telekom Innovation Laboratories.

More →

No Comments
ATM Card Skimmer

There’s no way you’d spot these tiny ATM card skimmers

By on June 15, 2016 at 5:10 PM.

There’s no way you’d spot these tiny ATM card skimmers

I’m aware that card skimmers at ATMs and gas stations are a very real threat. I always pay attention when using a card machine, but to date, I’ve never seen a card skimmer in the flesh. Maybe that’s because they’re way, way sneakier than I’d imagined.

More →

No Comments
uTorrent Security Breach

Hundreds of thousands of pirates exposed by uTorrent security breach

By on June 8, 2016 at 1:38 PM.

Hundreds of thousands of pirates exposed by uTorrent security breach

Torrenting TV shows isn’t a particularly risky activity, but most pirates tend to prefer to keep their identity a secret. That’s why a security breach on the forums of uTorrent, the internet’s most widely used torrenting software, is not a good thing.

More →

No Comments
Teamviewer Hack

Hackers are using remote-control software Teamviewer to hijack PCs and drain PayPal accounts

By on June 1, 2016 at 6:47 PM.

Hackers are using remote-control software Teamviewer to hijack PCs and drain PayPal accounts

Teamviewer, a piece of software that people can use to remote-control PCs, appears to have been hacked. Numerous user reports have indicated that unknown third parties are taking control of PCs and trying to steal money, through services like PayPal or eBay. Needless to say, this looks bad.

Teamviewer has denied the allegations, but something’s definitely going on. Dozens of Reddit users are flooding the /r/teamviewer forum looking for advice, and one of my personal friends asked my advice after reporting something very similar.

More →

No Comments
Windows Zero Day

Newly discovered zero-day exploit affects almost every version of Windows

By on June 1, 2016 at 12:47 PM.

Newly discovered zero-day exploit affects almost every version of Windows

Researchers from Trustwave’s SpiderLabs research team recently discovered a new zero-day exploit that affects all versions of Windows from Windows 2000 all the way up to Windows 10.

Trustwave initially discovered the exploit last month after seeing it advertised on a Russian hacking forum for the not-so-affordable price of $95,000. According to security researcher Brian Krebs, the exploit is of the “local privilege escalation” variety and, as a result, works in tandem with other exploits.

“An attacker may already have a reliable exploit that works remotely,” Krebs explains, “but the trouble is his exploit only succeeds if the current user is running Windows as an administrator. No problem: Chain that remote exploit with a local privilege escalation bug that can bump up the target’s account privileges to that of an admin, and your remote exploit can work its magic without hindrance.”

More →

No Comments
Norton Antivirus Hacked

Norton antivirus has a gaping security flaw

By on May 17, 2016 at 11:34 AM.

Norton antivirus has a gaping security flaw

A security researcher has discovered a “bug” in Symantec antivirus software, which affects “the core Symantec Antivirus Engine used in most Symantec and Norton branded Antivirus products.” I say “bug” because it’s less bug, and more a gaping security flaw that makes it incredibly easy to hack any PC, Mac or Linux box running Symantec software.

The flaw (spotted by The Register) was found by Tavis Ormandy, a white-hat hacker whose previous work has involved hacking internet-connected scales. The Symantec bug is to do with how the antivirus engine scans code, in particular an old compression tool.

More →

No Comments
Apple Vs FBI

iPhone hacking case highlights FBI’s lack of tech expertise

By on March 30, 2016 at 5:50 PM.

iPhone hacking case highlights FBI’s lack of tech expertise

Apple’s legal saga with the FBI may have finally come to an anti-climactic resolution, but the issues that the case brought to the forefront will undoubtedly rise again. In the future, there will inevitably be another strategically important smartphone, perhaps an iPhone, that the FBI won’t be able to access by itself.

One of the more interesting issues to arise out of Apple’s legal wrangling with the FBI is that the mighty FBI’s tech prowess is seemingly far less sophisticated than some may have initially assumed. In fact, the FBI’s inability to access the locked iPhone of one of the San Bernardino shooters was so surprising and incongruous that Apple in one of its legal briefs was even compelled to ask if the FBI really tried all that hard to hack into the device.

More →

No Comments
iPhone Hacking

Is Apple’s reluctance to implement a bug bounty program a security risk?

By on March 25, 2016 at 6:30 PM.

Is Apple’s reluctance to implement a bug bounty program a security risk?

While many Silicon Valley tech companies famously employ ‘bug bounty’ programs whereby individuals or third-party groups can receive substantial monetary rewards for finding critical software bugs, Apple is curiously the odd man out. Whether it’s Google handing out $12,000 to a former employee who managed to purchase the Google.com domain name or Facebook paying $15,000 to a security researcher who happened upon a way to unlock any user’s account, paying cold hard cash to learn about previously undetected security vulnerabilities is not only commonplace, but also makes a lot of sense.

More →

No Comments
iPhone Hacking Apple Engineers

Apple engineers would rather quit than develop an iPhone backdoor for the FBI

By on March 18, 2016 at 8:17 AM.

Apple engineers would rather quit than develop an iPhone backdoor for the FBI

Apple’s legal wrangling with the FBI over mobile encryption continues to play out in dramatic fashion. On one hand, we have the DOJ going so far as to boldly claim that they might seek to compel Apple to hand over its iOS source code along with the electronic signature needed to run a modified version of iOS on an iPhone. And on the other hand, we have Tim Cook articulating that the FBI wants Apple to effectively create the “software equivalent of cancer.”

With this particular backdrop, one can see why Tim Cook feels that he’s been living in a “bad dream” ever since the issue of encryption exploded onto the scene and took over the news cycle. Expounding on the matter in a recent TIME interview, Cook said the FBI’s approach to the issue has been unprofessional and that he was “deeply offended” by the FBI “lying” about Apple’s intentions.

And yet, in the midst of all this, one group we haven’t heard much of anything from are Apple engineers, the very people who, if the FBI has its way, would be responsible for creating an entirely new version of iOS that one might reasonably categorize as a backdoor.

More →

No Comments
iPhone iOS Backdoor San Bernardino

With its refusal to unlock San Bernardino shooter’s iPhone, Apple is fighting for us all

By , on February 17, 2016 at 8:19 AM.

With its refusal to unlock San Bernardino shooter’s iPhone, Apple is fighting for us all

A federal judge on Tuesday afternoon ordered Apple to provide technical assistance to the FBI with respect to accessing an iPhone 5c owned by Syed Farook, one of the San Bernardino shooters. Presumptively, the device was used to help plan and coordinate the December 2015 shooting that tragically left 14 people dead and many more wounded.

More →

No Comments
FBI Hack

Hacker group just doxxed 22,000 FBI employees

By on February 9, 2016 at 10:55 PM.

Hacker group just doxxed 22,000 FBI employees

Shortly after revealing the contact information of nearly 10,000 Department of Homeland Security employees, a group of hackers on Monday also published the contact information of more than 22,000 FBI employees. The leaked information, in addition to disclosing names and job titles, also includes employee phone numbers, states of residence, and email addresses.

Notably, identifiable information of FBI employees from all areas of the bureau was compromised, including special agents, intelligence analysts, technicians, language specialists and more.

More →

No Comments