Items tagged with Hackers

Hackers need physical access to a computer or need to trick a user into installing malware to steal data from an air-gapped PC (one that is not physically connected to a network). Air-gapped computers can have malware installed to steal data, but getting the data out is harder. That may not be the case with new... Read more...
Security researchers at Kaspersky have identified a new strain of malware affecting Chrome and Firefox browsers. The researchers say the malware's authors "put a lot of effort" into how it manipulates digital certificates and mucks with outbound TLS traffic, which ultimate compromises encrypted... Read more...
iDefense engineers recently discovered an updated version of MegaCortex Ransomware that targets corporations in Europe and North America. Hackers have demanded anywhere from 2 to 600 Bitcoins or $20,000 to $5.8 million USD from victims. MegaCortex ransomware could traditionally only be installed by the hacker... Read more...
This mobile app is definitely something to scream about in more ways than one. The Android game “Scary Granny ZOMBYE Mod: The Horror Game 2019” s stealing users’ Google and Facebook data. The malicious app attempts to siphon both data and money from its users to attackers.  “Scary Granny ZOMBYE Mod: The Horror Game... Read more...
Authorities in the U.S. have announced that they have been successful in breaking a ring of hackers who had been running a scam to hijack SIM cards and steal cryptocurrency from the victims of the crime. Court documents in the case allege that the group, known as "The Community," had stolen about $2.4 million in... Read more...
Another day, another device vulnerability. It was recently discovered that hackers are able to remotely execute code with admin privileges through a Dell SupportAssist utility vulnerability. It is believed that a “high number” of users could be impacted. American security researcher Bill Demirkapi discovered the... Read more...
No information is safe in the Internet age. Citycomp, an Germany-based IT services company, reported that they had been hacked and blackmailed. Some of their clients include Oracle, Airbus, Toshiba, Volkswagen, Leica, and Porsche. Citycomp is an IT services company that provides items such as servers, storage, and... Read more...
CT scans are essential tools that help medical practitioners detect various medical conditions. Healthcare providers rely on the accuracy of these technologies, because a misdiagnosis could prove fatal. Unfortunately, this vital technology is vulnerable to hackers. Researchers recently designed malware that can add or... Read more...
For organizations that are reliant on Cisco RV320 and RV325 WAN VPN routers, we implore you to -- if you haven't already -- apply two patches that were issued late last week. The patches address the following vulnerabilities: CVE-2019-1652: A vulnerability in the web-based management interface that could allow an... Read more...
As Epic Games’ Fortnite has increased in popularity, so have the number of related scams and criminal activity. It was recently discovered that criminals are laundering Fortnite V-Bucks. Some believe that Epic Games has not taken enough precautionary measures to prevent such a crime. Fortnite is a free-to-play... Read more...
Hackers do not need to bust open a Drama Llama Piñata to get the best loot in Fortnite. Epic Games recently patched a vulnerability that would have granted hackers access to users’ accounts. Nefarious parties would have been able to acquire users’ in-game currency and the last four digits of their credit card. The... Read more...
The USB Implementers Forum (USB-IF) has announced a new authentication standard that can be implemented for USB-C devices and complimenting chargers. USB-C Authentication, as it’s called, uses 128-bit “cryptographic-based authentication” to help mitigate potential security intrusions from USB thumb drives and chargers... Read more...
We have all seen it on Facebook -- one of your friends “shares” a link to a new shake that will help you lose ten pounds in two days or a code to get suspiciously discounted Ray-Bans. Thankfully, most of these posts are obviously spam. Unfortunately, hackers are finding more ways to post annoying and potentially... Read more...
Two-factor authentication (2FA) is usually touted as an effective layer of security for online account. Many people have recently learned the hard way that this method may not be as helpful as it seems. Hackers have targeted nearly 1,000 Google and Yahoo accounts by bypassing two-factor authentication. Amnesty... Read more...
A group of hackers claims to have a service that will allow anyone willing to spend $250 to send out a "marketing" campaign that can reach "every single printer in the world." The people are offering to sell advertisers a spot in "the most viral ad campaign in history" according to the advertisement for the... Read more...
Hackers employed by the Chinese government have purportedly stolen 614GB of sensitive data from a United States Navy contractor. The data potentially includes plans for a supersonic anti-ship missile and other information related to naval warfare. According to a report by The Washington Post, the breaches occurred... Read more...
ATMs can be a blessing and a curse to financial institutions. On the one hand, they can process financial transactions quickly, allowing the machines to serve more people over a span of time than a human teller. However, ATMs are often the target of hackers, many using skimmers to obtain debit card numbers for later... Read more...
With the booming value of cryptocurrency, many hackers and nefarious actors are rolling out schemes to unwittingly trick regular web users into mining for them. The latest scheme to dupe people into mining cryptocurrency is taking advantage of Facebook Messenger via some slick malware.  The malware being... Read more...
Until recently, a bug on a T-Mobile website gave hackers access to personal details relating to wireless subscriber accounts. What's really surprising about this particular attack vector is that hackers only needed a T-Mobile customer's phone number to gain access to private account details. Karan Saini, a... Read more...
There are certainly lots of retro gamers out there who are interested in the SNES Classic Edition that launched this week. We've already outlined everywhere you can get an SNES Classic Edition, but they are almost certainly not in stock any where right about now. One of the greatest features of the little retro... Read more...
Equifax may be now getting its public lashings for a cybersecurity breach that resulted in personal information of 143 million Americans being exposed to hackers, but it appears that the Securities and Exchange Commission (SEC) has a few skeletons in its closet as well. The regulatory agencies announced late last... Read more...
Gaming is meant to be fun, but it just can't be all of the time. That's because players of online games have to be constantly aware of looming threats. Yet another new case of an attack, involving a game called ROBLOX, highlights the fact that it's not just the game itself that is at risk sometimes, but the tools... Read more...
First ... Prev 2 3 4 5 6 Next