Items tagged with Hacking

Apple is not going to play ball with a group of hackers that is threatening to remotely wipe hundreds of millions of iPhone devices if the Cupertino outfit refuses to pay a ransom. While the hackers claim to have a large cache of iCloud and other Apple email account data at their disposal, Apple insists that its systems and servers remain secure and have not been infiltrated."There have not been any breaches in any of Apple's systems including iCloud and Apple ID," an Apple spokesperson told multiple media outlets. "The alleged list of email addresses and passwords appears to have been obtained... Read more...
Security researchers at Cybellum, a PC security firm in Tel Aviv, Israel, have discovered a rather nasty new zero-day attack that allows remote attackers to hijack popular antivirus programs and turn them into malicious agents. The technique is called DoubleAgent, named after the fact that a compromised antivirus agent might give the illusion that it's protecting a PC when it's actually installing malware. "DoubleAgent exploits a 15 year old vulnerability which works on all versions of Microsoft Windows, starting from Windows XP right up to the latest release of Windows 10. The sad, but plain fact... Read more...
Bitcoin seems to be the currency of choice when it comes to demanding ransoms, and that is because culprits demanding payment can hide behind a pseudonym (Bitcoin itself is not actually anonymous). So it is no surprise that a hacking organization has instructed Apple to fork over a Bitcoin ransom in exchange for not leaking a cache of iCloud and other Apple email accounts belonging to hundreds of millions of iPhone owners.The hackers call themselves the "Turkish Crime Family." In addition to accepting Bitcoin, the group has told Apple it would also be fine with being paid in Ethereum, which is... Read more...
There are many different methods of hacking. Most of them involve some sort of software code, whether it is installing malware on a system or hacking a vulnerability to gain unauthorized access to a system or device. The Internet of Things (IoT) category is especially susceptible to hacking due to a surprising lack of basic security practices. However, researchers at the University of Michigan discovered a different way of wreaking havoc, and it involves sound waves. What the group of researchers found is that accelerometers can be manipulated through sound. This is called an analog acoustic injection... Read more...
Just a couple of weeks ago, we wrote about the Israeli security firm Cellebrite, and how it suffered a major data breach. After the information began to trickle out, it seemed like no real damage was done. Cellebrite itself said that what leaked was an old, irrelevant backup. A new discovery, however, questions that answer. If you're not familiar with Cellebrite, it was the firm that the U.S. government hired to break into an iPhone 5c to aide with investigation of the December 2015 San Bernardino terror attack. Apple at the time refused to help crack the phone, so Cellebrite was brought in, and... Read more...
There seems to be no limit to the number of ways that exist to trip up an iPhone or other iOS device. The latest method involves a rather simple text message consisting of just three characters, and unfortunately for the recipient, just receiving the text message is enough to freeze an iPhone running iOS 10 or later. The good news is that it will only cause the phone to crash rather than brick it or otherwise result in more permanent damage. What's scary about this particular exploit is that it works instantly and does not require any interaction by the recipient. All it involves is sending an... Read more...
One of the biggest fears of companies that say they can hack virtually anything is to be found out that they've been hacked themselves. Case-in-point: Israeli firm Cellebrite. We've reported on the company multiple times in the past, notably after it aided the FBI in cracking open a terrorist's iPhone 5c. Since then, the company has boasted lots, even going as far to say that it can crack "nearly any smartphone". Fast-forward to the present time, and we learn that Cellebrite itself wasn't just hacked; it had a staggering 900GB worth of data stolen. The firm says in a statement: Cellebrite recently... Read more...
If you were super good last year (and super lucky), you might have scored an NES Classic Edition console on Christmas morning. The retro game system was one of the hottest and most in-demand items this past holiday season, commanding more than three times its value from second-hand sellers on eBay and Craigslist. Though in short supply, hackers have already managed to mod the console to accept more games in the form of ROM files. The NES Classic Edition comes with 30 games already included, among them classics such as Super Mario Bros. (1-3), The Legend of Zelda, Donkey Kong, Metroid, Castlevania,... Read more...
The Supreme Court approved a series of changes to Rule 41 of the Federal Rules of Criminal Procedure by the United States Department of Justice that go into effect today. Those changes, which the DoJ proposed earlier this year and that were never discussed by Congress, gives the FBI permission to hack into multiple computer systems here and abroad with a just a single warrant in cases where they're part of a botnet or otherwise can't be traced to a precise location.Any U.S. judge can authorize such a warrant, including magistrate judges who typically only issue warrants within their own jurisdiction.... Read more...
It's been proven that some tech companies have been willing to cater to the government's every need, but others -- namely Google -- remain adamant about transparency regarding shady practices. Earlier this year, we reported on Google's new feature that informs users if they've become the target of state-sponsored attackers, so as to help you better protect yourself via whatever means you have available. We can't imagine what it's like to receive a notification like this, but it can't be a great feeling. Now, we're reminded that this functionality exists, as a slew of journalists and professors... Read more...
2016 is going to be remembered for a number of fortunate and unfortunate things, with one topic that falls into the latter category being the debacle of U.S. law enforcement vs. Apple. The FBI and other US federal agencies have made it no secret that they would like to be able to gain access to any smartphone if the need arises - something that anyone who cares even remotely about their privacy shouldn't be okay with. In the months that followed, the FBI somehow managed to break into an iPhone 5C without any help from Apple. And while it's not clear if the agency is able to pull that off on more... Read more...
Yahoo is again catching fire over a security breach dating back to 2014 that compromised the accounts of 500 million users, though this time the criticism is aimed at Yahoo's lack of timely disclosure. The company fessed up earlier this week that at least some of its employees had knowledge that a cyberattacker backed by a foreign government had hacked into its systems. The disclosure is contained in a filing Yahoo made this week with the United States Securities and Exchange Commission (SEC). In it, Yahoo says it "had identified that a state-sponsored actor had access to the company’s network... Read more...
So here we go again, another "massive and sustained Internet attack" made possible by a large collection of hacked Internet of Things (IoT) devices, things such as CCTV video cameras, digital video records, all sorts of smart home gadgets with a connection to the Internet, KrebsOnSecurity has determined. This is not the first time it has happened and it won't be the last. The recent attack, an apparent retaliation by WikiLeak supporters after the Obama administration allegedly used its influence to push the Ecuadorian government to cut off Internet access to whistleblower Julian Assange, focused... Read more...
Police in the Czech Republic have arrested a Russian hacker for his suspected involvement in a massive 2012 cyber attack against LinkedIn. LinkedIn had been working with the FBI to track down the individuals responsible for the data breach, which exposed hashed passwords from over 100 million user accounts that were later offered for sale on the "dark web." LinkedIn initially acknowledged the security breach four years ago, though at the time it didn't say how many people were affected by it. Then this past May, a hacker was found attempting to sell LinkedIn account credentials belonging to 117... Read more...
1 2 3 4 5 Next ... Last