Items tagged with Hacking

At the CS3sthlm security conference in Stockholm, Sweden later this month, security researcher Monta Elkins, the "Hacker-in-Chief" at FoxGuard Solutions, will demonstrate a proof-of-concept hardware hack involving spy chips implanted onto enterprise IT equipment, with a budget of less than $200. The idea of... Read more...
The 2020 United States presidential election is over a year away, but there have already been several cyberattack attempts against presidential campaigns. Microsoft recently reported that a hacker group attacked nearly 250 accounts related to campaign workers, government officials, and reporters. The affected users... Read more...
An Israeli company that managed to hack WhatsApp earlier this year is now claiming it has developed new software that can stealthily swipe cloud data from Amazon, Apple, Facebook, Google, and Microsoft. It can even bypass two-factor authentication and warning emails on target devices. Developed by NSO Group, the... Read more...
It appears that no one is safe from the hacking capabilities of Israeli security firm Cellebrite. Cellebrite is well-known in law enforcement circles for its lineup of hardware devices that are able to use brute force methods to hack smartphones and tablets. The company recently announced that it has the capability... Read more...
Biometric security measures are improving all the time, though they are not infallible. This is demonstrated on the recently launched OnePlus 7 Pro. It has a fingerprint sensor that is embedded in the full-front display, and with a little bit of glue and a few minutes of time, it can be easily thwarted. Well, sort... Read more...
Tesla builds one of the most tech-infused cars on the roads today. Not only are Tesla vehicles packed with features but they also offer over-the-air updates with new features, fixes and optimizations. Tesla was able to get the price of the Model 3 down to the long-anticipated $35,000 late last month, but a team of... Read more...
Citrix Systems said it is cooperating with the Federal Bureau of Investigation (FBI) to investigate a major data breach by international cyber criminals into the company's internal network. Based on what Citrix knows so far, the hackers may have accessed and downloaded business documents, though the full extent is not... Read more...
We have all heard of the dark web: a lawless digital world, uncharted and unstructured, full of data -- much of it illegally acquired and illegally for sale -- that cannot be viewed without special tools: proxy servers, TOR browsers, and the like. It's a murky and mysterious place, a place where much information... Read more...
Traditional passwords have started to yield ground to biometric security options, like fingerprint scanning and even retina scans. Going even deeper (literally), there's yet another method that involves authenticating a person's identity by scanning his or her veins. It sounds secure, except that researchers have... Read more...
In what could pass for a scene in a movie, a hacker managed to breach a school district's database and steal 10 years worth of personal data belonging to half a million students and staff. Only this wasn't a movie, it happened in real life. Had it been a movie, the hacker would likely have been revealed to be a... Read more...
In a groundbreaking move, the Library of Congress and US Copyright Office have proposed new rules that will give consumers the ability to legally hack the DRM of electronic devices to repair or maintain those devices. The devices these proposed rules would cover and legalize the hacking of include smartphones, voice... Read more...
Implanted ID devices certainly aren’t new; they have been used to help lost pets return home for many years now. These little chips are embedded under the skin of the dog or cat, and if picked up by animal control, the chip can be scanned, and the pets returned home. They are rather like tags that can’t be lost and... Read more...
Let's start with the good news. Cryptocurrency mining on GPUs has waned considerably, and the shortage of graphics cards that made it nearly impossible to score a mid-range or high-end GPU at or near MSRP is over (for the most part). Are you ready for the bad news? Be that as it may, cryptocurrency mining hacks are on... Read more...
There is a rash of complaints on Twitter over a recent Instagram hack that has left numerous users unable to access their accounts. Preliminary data suggests that the shenanigans originate from Russia, though nothing has been confirmed. Instagram is investigation the issue, and in the meantime, it has some advice for... Read more...
If your laptop contains sensitive data, it is best not to leave it unattended. That is sound advice even it does not have any work secrets or other potentially compromising data, and you want to avoid falling prey to malware. In case you need a reason why, a security firm recently posted a video showing how quickly a... Read more...
Every so often, WikiLeaks publishes top-secret documents outlining various hacking tools and malware used by the United States Central Intelligence Agency (CIA). Most of the documents we have seen are presumably outdated, but for obvious reasons, the CIA would still like to keep them under lock and key. The agency... Read more...
MyEtherWallet confirmed on Twitter that hackers hijacked its Domain Name System (DNS) servers and redirected users to a phishing site in Russia. By obtaining private keys from affected users, the hackers reportedly were able to swipe around 215 Ethereum coins (ETH) worth somewhere in the neighborhood of $150,000. The... Read more...
Uber suffered a data breach back in October 2016 that affected tens of millions of people, and it is just now letting the public know about it, as 2018 rolls into view. This latest incident is yet another black eye for a company that has been beat up in the media over questionable decision making in the past, such as... Read more...
Hacking happens all the time, and when it affects a large number of people, companies typically disclose the breach. Not always, of course, sometimes not even in a timely manner. As it pertains to Microsoft, something a little different occurred several years ago. Several former employees say a sophisticated hacking... Read more...
A security expert at Belgian university KU Leuven has discovered a major vulnerability in the Wi-Fi Protected Access II (WPA2) protocol that could a expose a user's wireless Internet traffic, including usernames and passwords that are entered into secure websites. The vulnerability affects most devices and several... Read more...
Late last year a hack was perpetrated on what is called a "partner organization" that worked with the Australian Signals Directorate (ASD). The unnamed organization notified the ASD that it was hacked in November of 2016, and that outside parties gained access to its network. The small organization has only 50... Read more...
Do you know what hackers were doing around this time five years ago? They were breaking into a database at Disqus, the popular blog comment hosting service supported by scores of websites, in many cases in place of traditional web forums (remember those?). Disqus only found out about it this past Thursday and began... Read more...
First ... Prev 2 3 4 5 6 Next