Items tagged with security

Law enforcement officials are seeking help from a professor at Michigan State University with creating a special 3D printed replica of a homicide victim's fingers in order to unlock his phone using his fingerprints. In theory it sounds like a brilliant idea, one that would sidestep the potentially contentious process of trying to get Apple or Google to assist with unlocking the device, only there's a pretty major roadblock that stands in the way. There are safeguards in place that require a passcode if a fingerprint scanner hasn't been used in quite some time. For example, as of iOS 9, Apple added... Read more...
We reported earlier on France's demands to Microsoft with regards to bolstering its Windows 10 OS to better protect user data, and ultimately, their privacy. The fact that a watchdog would target Microsoft for collecting too much data probably strikes no one as a surprise, as that very complaint has been one shared by many users since the launch of Microsoft's latest OS. In the complaint, France's Chair of the National Data Protection Commission noted a couple of big issues, from the fact that the PIN code can be entered as many times as an attacker needs it to be and also that certain mechanisms... Read more...
The same hacking group that claimed responsibility for ticking off every Pokemon Go player on the planet by overwhelming the game's servers with a DDoS attack last weekend is planning another attack. Poodle Corp, as the hacker group calls itself, issued a notice on Twitter that the next barrage on Pokemon Go's servers will take place August 1. Pokemon Go, for those of you who've taken residence under a rock, is a wildly popular mobile game that uses augmented reality. It's really a glorified scavenger hunt, tasking players with catching Pokemon characters by flinging Poke balls at them. The twist... Read more...
With Nintendo's latest game - a mobile one, at that - the company has proven that there is still a lot of innovating to do in the market. While Pokemon GO is based on another title, Ingress, any game is going to have a greater chance of success when it features one of the most popular franchises ever. GO isn't just some regular Pokemon game: it's making the masses realize that augmented reality can be really cool. What's not cool, though, is that popular mobile apps are a hot target for malware. And since Pokemon GO hasn't been released worldwide yet, many have taken to the scarier parts of the... Read more...
It's beginning to look like some rather sophisticated hackers have made their way into Apple's core and crippled iCloud security so severely that some iPhones have essentially been held hostage. A few iPhones here and there might not seem like a big deal, but ultimately, there could be a staggering 40 million iCloud accounts (approximately) at risk here. According to CSO Online, some iPhone users, dating back to February this year, have found their devices compromised, held hostage by Russian hackers. The attack is almost too simple. An iCloud account is broken into (with the help of leaked credentials),... Read more...
For a brief moment, Oculus CEO Brendan Iribe experienced a far less threatening version of what Captain Phillips went through when a Somalian pirate commandeered his ship and declared, "I'm the captain now." But instead of guns and a boat, Iribe seemingly lost control of his company when a hacker took control of his Twitter account and used it to announce a new boss."We here at Oculus are very excited to announce our new CEO, @Lid!," the Twitter post declared, followed by a smiling emoticon. To keep the ruse going, @Lid stated on his own Twitter account, "Lol just became CEO of this sh*t company,... Read more...
Security researchers on Google's Project Zero team have discovered critical security flaws in several of Symantec's software security products, including its popular Norton line for consumers and Endpoint Protection for enterprises. No small thing, among the vulnerabilities are several wormable remote code execution flaws."These vulnerabilities are as bad as it gets. They don't require any user interaction, they affect the default configuration, and the software runs at the highest privilege levels possible. In certain cases on Windows, vulnerable code is even loaded into the kernel, resulting... Read more...
It seems impossible for the world to go a single week without a major security breach, so to fill the inevitable void this week is a hacker that goes by the name "thedarkoverlord," who claims to be in possession of a staggering 655,000 healthcare records. Of course, he is looking to sell them off. This latest records leak was first reported by Deep Dot Web, which has exclusive images to prove that the leak is real (one can be seen below). These images were not sourced by the website; rather, thedarkoverlord himself provided the images, probably as a way to build up some notoriety, and to flaunt... Read more...
Intel, the world's largest chipmaker, is reportedly mulling a sale of its cyber security business, depending on how much it's worth on the open market. The Santa Clara outfit would like to recoup the nearly $7.7 billion it paid for McAfee in 2010. Now known as Intel Security, it could be an enticing option for private equity investors looking to buy a stake in the fast growing cyber security market.With high profile security breaches on the rise, corporate entities are looking for ways to keep their businesses safe from online threats. That's created a hot market for security firms. As the Financial... Read more...
It's a dangerous online world out there and to keep the bad guys at bay, many companies require that employees use two-factor authentication. Typically the second method of verification entails tapping a Security Key or entering a verification code that's sent to a mobile device, but to make things easier Google is adding a third method, an approval prompt that pops up on a user's phone.This is something that's built right into the latest version of Google Play Services, which gives just about every Android user access to the feature. If you're rocking an iOS device, don't sweat it, you just need... Read more...
We wrote earlier about the kind of success Google has been seeing with its Android bug bounty program -- success that has led the company to actually increase its rewards. Over the years, we've seen other major companies offer bug bounties as well, such as Facebook and Microsoft, so it's clear that they can provide some real value. Could that value be important enough for the US government to get in on the action? It appears that "yes", it certainly can. In a new report from the Pentagon, the groundwork is laid for future programs that target much more than some front-facing websites, which is... Read more...
If you've shopped at Acer's US website at any point between May 12, 2015 and April 28, 2016, you have immediate reason for concern. Acer has just revealed to the California Attorney General's office that its ecommerce servers were hit last spring, and remained vulnerable up until this spring. Unfortunately, this isn't a mere case of someone gaining access to names and addresses - it gets much worse. Acer admits that credit card information could have been fetched by these third parties, which includes not only the credit card number, but also the CCV security code and expiry date. It's not clear... Read more...
Has it been a long time since you've changed up your passwords? Now is a good time to think about doing so. A hacker or band of hackers obtained the login credentials of 45 million Internet users spread across 1,100 websites and communities, including many major and popular online destinations  such as Motorcycle.com, Mothering.com, and others. The folks at LeakedSource, a breach notification website, says VerticalScope and all of its domains were hacked in February of this year. It's not known how the attack was carried out, though LeakedSource surmises that VerticalScope stored too much... Read more...
It doesn't matter who you are or how much money you make, if you don't practice good security habits on the web you're likely to get hacked. Case in point, Mark Zuckerberg, the billionaire whiz kid and co-founder of Facebook, the most popular social media site on the planet, had his Twitter and Pinterest accounts hacked into over the weekend. To be fair, Zuckerberg is a bigger target than most people, but that wasn't the real reason his social media accounts outside of Facebook were compromised. It's because he was lazy with security, both with the password he chose and in reusing the same one... Read more...
1 2 3 4 5 Next ... Last