How to Not Get Hacked

Follow these 5 steps to keep yourself safe from hackers

By on February 5, 2016 at 1:22 PM.

Follow these 5 steps to keep yourself safe from hackers

No matter how secure you think your devices are, someone could access your data if they put their mind to it. It’s just the reality of the Information Age, but you should still do everything in your power to make yourself less of a target for hackers. More →

No Comments
eBay Malware Vulnerability

Unpatched eBay vulnerability leaves shoppers at risk of downloading malware

By on February 3, 2016 at 9:45 PM.

Unpatched eBay vulnerability leaves shoppers at risk of downloading malware

Be extra careful the next time you visit a suspicious-looking eBay store page.

According to Help Net Security, researchers from the Check Point security firm have discovered a vulnerability in the eBay platform that allows criminals to distribute malware by bypassing the site’s code validation process and control the code themselves.

More →

No Comments
1454431953914

NASA probes AnonSec hack claims, denies that one of its drones was hacked

By on February 2, 2016 at 9:00 PM.

NASA probes AnonSec hack claims, denies that one of its drones was hacked

Hacking group AnonSec says that it has accessed a trove of NASA data and hacked one of the space agency’s drones, prompting an investigation by NASA, which has questioned the validity of the claims.

AnonSec dubbed the alleged hack “OpNasaDrones” and claims to have accessed a slew of drone flight logs as well as email addresses and phone numbers of NASA employees, according to documents posted online Sunday. The hackers say they even attempted to crash a NASA Global Hawk drone. More →

No Comments
NSA Hacking Chief

NSA’s chief hacker explains how to keep the NSA out of your business

By on January 29, 2016 at 11:00 PM.

NSA’s chief hacker explains how to keep the NSA out of your business

The level, reach, and breadth of NSA surveillance activities, which were originally brought to the surface by Edward Snowden, undoubtedly opened the eyes of many. As a result, the public over the past three years has learned an awful lot about the NSA’s capabilities and some of the more clever approaches they incorporate when conducting surveillance.

More →

No Comments
Baby Monitor Security Flaws Search

Baby monitor security is so bad that there’s a chance someone is watching your sleeping kid

By on January 25, 2016 at 6:55 PM.

Baby monitor security is so bad that there’s a chance someone is watching your sleeping kid

This is disturbing news for anyone who has a web-connected baby monitor. Ars Technica brings us word of search engine called Shodan whose main purpose is to give you access to live web camera streams. Among other things, the search engine reveals live feeds for “marijuana plantations, back rooms of banks, children, kitchens, living rooms, garages, front gardens, back gardens, ski slopes, swimming pools, colleges and schools, laboratories, and cash register cameras in retail stores.” More →

No Comments
Harman AMX Backdoors Batman Black Widow

Did Batman and Black Widow spy on the White House?

By on January 22, 2016 at 9:23 PM.

Did Batman and Black Widow spy on the White House?

This isn’t some strange fiction story in which two popular superheroes team up against the U.S. government. “Batman” – specifically “1MB@tMan” – and “BlackWindow” are codenames used for backdoor logins into conference room tools used by various governments around the world, including White House staff and other branches of the U.S. government.

The recently discovered backdoors could be used for spying, a research firm has said, although the creator of the affected products denies it all. More →

No Comments
NSA Encryption Backdoors Privacy

The NSA has a brilliant stance on encryption

By on January 22, 2016 at 8:24 PM.

The NSA has a brilliant stance on encryption

Discussions about the U.S. government’s need for breaking encryption have intensified following the mid-November attacks in Paris. Law enforcement agencies including the FBI and politicians have challenged tech leaders from Silicon Valley to find ways to include backdoors in encrypted products. That way, surveillance operations targeting potential terror suspects might have a better chance of successfully intercepting relevant communication.

Tech leaders, meanwhile, have stood firm against crippling encryption with backdoors, with Apple and Tim Cook at the forefront of this argument. That doesn’t mean tech companies unwilling to help intelligence agencies address terrorist threats – but they’ll just do it differently for the time being.

With all that in mind, one can’t help but applaud the NSA’s brilliant stance on encryption while simultaneously feeling a chill running down your spine. More →

No Comments
Stolen Uber Account Ghost Rides

Hacked Uber accounts are more valuable than stolen credit cards on the dark web

By on January 21, 2016 at 10:40 PM.

Hacked Uber accounts are more valuable than stolen credit cards on the dark web

What’s the hottest thing you can buy on the dark web today? According to new research, PayPal accounts with at least $500 in them and Uber accounts are among the most expensive items hackers are selling. In fact, it looks like Uber logins, which would let buyers score free rides on the popular taxi service, are even more expensive than Netflix logins and credit card account numbers. More →

No Comments
Worst Passwords 2016

These are the worst passwords in the world – do you use any of them?

By on January 19, 2016 at 9:43 AM.

These are the worst passwords in the world – do you use any of them?

Each year, security solutions provider SplashData releases a list of what it has determined to be the most commonly used passwords on the Internet. In other words, these passwords are the worst possible options you can choose to safeguard your accounts, because they’re all ridiculously common and are likely among the first options people with any know-how will try when attempting to gain access to your online accounts.

Are you looking to get hacked and you want to make it as easy as possible for anyone and everyone to gain access to your accounts? Feel free to choose any of the 25 options below as your new password. More →

No Comments
Jeb Bush Police State NSA

Meet Jeb Bush’s police state: The NSA in charge of civilian data

By on January 15, 2016 at 7:45 PM.

Meet Jeb Bush’s police state: The NSA in charge of civilian data

Given the various recent terrorist attacks, it’s no wonder that hackers, cybersecurity, encryption and surveillance are all major topics of this year’s presidential campaign. Encryption was on the table during the sixth Republican debate on Thursday night, with Jeb Bush proposing a solution for guarding the American people that seems to be taken out of a George Orwell novel. More →

No Comments
iPhone Encryption Backdoors New York

New York bill would force Apple to include encryption backdoors in new iPhones

By on January 14, 2016 at 5:30 PM.

New York bill would force Apple to include encryption backdoors in new iPhones

Tim Cook might not like it, but lawmakers around the world are far from being done asking Apple to include backdoors in its iOS and OS X operating systems to allow law enforcement agencies to access user data. According to On the Wire, a bill is making its way through the New York state assembly that is seeking to require smartphone makers to include encryption backdoors in all smartphones manufactured on or after January 1st, 2016 and sold in New York. More →

No Comments