Car Hack GM OnStar App

Hacker claims he can use GM’s OnStar app to remotely open and start your car

By on July 30, 2015 at 6:35 PM.

Hacker claims he can use GM’s OnStar app to remotely open and start your car

Connected cars are awesome but they also present big opportunities for hackers to cause significant, and potentially deadly, mischief. Reuters reports that white-hat hacker Samy Kamkar says he’s figured out a way to hack into GM’s OnStar mobile app and then use it to remotely open and start GM cars. More →

No Comments
Tor Security Privacy

MIT researchers can break Tor anonymity without even touching encryption

By on July 30, 2015 at 2:25 PM.

MIT researchers can break Tor anonymity without even touching encryption

Before the arrest of Silk Road creator Ross Ulbricht made headlines a few years ago, most everyday web users had never heard of Tor. Originally developed by US Naval Research Laboratory employees, Tor (an acronym for “The Onion Router”) is a popular piece of software designed to enable truly anonymous communications online. Today, it’s estimated that approximately 2.5 million users use Tor on a daily basis.

More →

No Comments
Android Security

Warning: Crazy new Android security flaw can render your phone completely lifeless

By on July 30, 2015 at 9:55 AM.

Warning: Crazy new Android security flaw can render your phone completely lifeless

Another day, another Android vulnerability. Just days after researchers disclosed an MMS-based Android vulnerability that potentially puts 950 million Android devices at risk, a different group of researchers have come forward with yet another Android-based security exploit.

The latest Android vulnerability affects more than half of all Android devices in circulation today and has the potential to render handsets completely inert, which is to say infected phones cannot make calls or receive any other type of notification. What’s more, the screen itself may become lifeless, effectively turning Android phones into expensive screen savers.

More →

No Comments
Data Breach

Have hackers stolen your personal information? This handy quiz will let you know

By on July 29, 2015 at 10:15 PM.

Have hackers stolen your personal information? This handy quiz will let you know

Over the past few years, there has been no shortage of high-profile credit card breaches at some of the largest retailers in the country. From Target to Home Depot, it seems that we can’t go a few months without hearing a story regarding some new worrisome data breach. With respect to Home Depot in particular, it’s estimated that nearly 60 million credit cards were compromised over a 5-month period.

Compounding the problem is that retailers aren’t the only target that hackers have their eyes on. In recent months, hackers have managed to obtain confidential information from targets as varied as the U.S. Government, health insurance providers, and even popular apps like Twitter and Snapchat. Indeed, it can get a bit tiring trying to keep up with what sites have been exposed to security breaches and when.

More →

No Comments
White House Edward Snowden Pardon

White House: No pardon for Edward Snowden

By on July 28, 2015 at 8:45 PM.

White House: No pardon for Edward Snowden

The White House is not quite ready to give Edward Snowden a free pass. The former NSA contractor turned whistleblower made some of the most important revelations in modern history about the covert operations conducted by Western intelligence agencies. Despite his many supporters, however, the U.S. government isn’t about to just let bygones be bygones. More →

No Comments
Brinks Safe Hack USB

Brinks safe hacked with USB stick and 100 lines of code

By on July 28, 2015 at 5:10 PM.

Brinks safe hacked with USB stick and 100 lines of code

As typically portrayed in action movies, breaking into an ostensibly impenetrable safe often requires a world class lock-picker or, barring that, an array or C4 explosives positioned in just the right orientation.

But in the real world, surprisingly enough, defeating the security mechanisms on a top-notch Brinks safe can be done with nothing more than a USB stick and 100 lines of code. At the always entertaining Def Con Hacking Conference set to kick off in Las Vegas next week, researchers Daniel Petro and Oscar Salazar of Bishop Fox will detail how they were able to skirt around the defenses of the Brinks CompuSafe Galileo with relative ease.

More →

No Comments
Android Security Flaw

950 million Android users at risk as researcher uncovers massive security flaw

By on July 27, 2015 at 11:35 AM.

950 million Android users at risk as researcher uncovers massive security flaw

A security researcher has recently uncovered a worrisome new Android exploit which allows hackers to compromise a device simply by sending either an MMS message or a multimedia file. Once a device has been targeted and infected, hackers can access a user’s microphone, camera, external storage, and in some cases (depending on the device in question), even gain root access.

Initially discovered by Joshua Drake from the security firm Zimperium, the exploit takes advantage of a number of vulnerabilities found within the software framework Android uses to “process, play and record multimedia files.”

More →

No Comments
Hillary Clinton Email Classified Information

Hillary Clinton sent classified info over her private email server – everything we know so far

By on July 24, 2015 at 2:56 PM.

Hillary Clinton sent classified info over her private email server – everything we know so far

Well, this is not the kind of headline Hillary Clinton’s presidential campaign was hoping to see on a Friday afternoon. The Wall Street Journal on Friday reported that an internal government review has concluded Clinton sent at least four different emails containing classified information over her home email server while she was serving as Secretary of State. The information contained in those emails should have been considered “secret,” which is a notch below the “top secret” level of intelligence classification. More →

No Comments
Car Hacking Experiment Charlie Miller

Terrifying: Hackers take over a Jeep driving down the highway at 70 mph

By on July 21, 2015 at 3:15 PM.

Terrifying: Hackers take over a Jeep driving down the highway at 70 mph

Driverless cars promise to be safer than cars driven by humans… but that’s assuming they don’t get hacked by malicious actors. Hackers Charlie Miller and Chris Valasek recently used Wired’s Andy Greenberg as a human guinea pig for their latest experiment that involved taking over his car while it was driving at a high speed. More →

No Comments
Ashley Madison Cheating Website Hacked

Cheaters’ nightmare: Affair website Ashley Madison hacked, user data vulnerable

By on July 20, 2015 at 7:50 AM.

Cheaters’ nightmare: Affair website Ashley Madison hacked, user data vulnerable

So you decided to cheat on your spouse and you thought extramarital affair website Ashley Madison would keep your identity safe? Oops. KrebsonSecurity reports that Ashley Madison has suffered a major hack that has left personal information of its 37 million members vulnerable. More →

No Comments
How to Avoid Online Scams

How to avoid seven of the most common online scams

By on July 16, 2015 at 1:01 PM.

How to avoid seven of the most common online scams

The Internet is great for a lot of things — research, entertainment, getting caught up on world news — but it can also be a dangerous minefield if you aren’t careful. Ever since the Internet became commonplace in society, scammers have found ways to take advantage of the unsuspecting masses.

On Thursday, WhoIsHostingThis? shared its latest infographic, highlighting seven of the most common online scams, as well as offering tips for how to avoid them. More →

No Comments
Proxyham WiFi

Anonymizing Wi-Fi device with 2.5 mile range just mysteriously disappeared from Def Con

By on July 14, 2015 at 7:45 AM.

Anonymizing Wi-Fi device with 2.5 mile range just mysteriously disappeared from Def Con

Earlier this month, we highlighted an intriguing new piece of hardware capable of providing secure and anonymous Wi-Fi connectivity within a 2.5 mile radius. The brainchild of researcher Ben Caudill, the device, dubbed ProxyHam, was scheduled to be officially introduced at Def Con in Las Vegas early next month.

But then something funny happened.

Caudill’s talk was abruptly cancelled under extremely mysterious circumstances over the weekend.

More →

No Comments