Items tagged with Hacking

The data breach at Target that resulted in millions of customer credit and debit card data being compromised is much worse than initially thought. Target had revealed last month that as many as 40 million payment card accounts may have been impacted between November 27 and December 15, 2013, but the retail giant has... Read more...
It'd be a little crazy to imagine ending 2013 without another breach-of-security story, so fortunate for us, BBC has come to the last-minute rescue. On December 25th, a Russian hacker is said to have listed a sale on a black market website that offered information about accessing a BBC server, something that US firm Hold Security picked up... Read more...
Target on Thursday confirmed reports that hackers gained access to credit and debit card data during the holiday shopping season. According to Target, around 40 million payment card accounts may have been impacted between November 27 and December 15, 2013. That time frame falls right in the midst of the some of the... Read more...
Breaching the security of a website or Web service should be one of the most difficult tasks on earth, but given the fact that not a week can go by where we don't learn of some security issue at a major firm, it's clear that most of the Web is seriously lacking in setting up proper barriers. In recent months, Adobe... Read more...
In enterprise environments, it's long been accepted that keeping a particular machine "100%" safe requires little more than keeping it off of an external or internal network, making sure to disable its network devices - wired or otherwise - and of course, disabling its optical drives and USB ports. A machine can't get... Read more...
Looking for a career change? Consider becoming a professional bug hunter. Don't worry, it's not as gross as it sounds. We're talking about software bugs, such as pieces of code with unintended consequences or underlying security vulnerabilities. Turns out you can make a lot of money doing this kind of thing. For... Read more...
Adobe is trying to downplay a recent security breach by saying that "cyber attacks are one of the unfortunate realities of doing business today," and even though that might be true, it's unlikely to provide comfort to the 2.9 million customers whose data was compromised. Hackers made off with Adobe customer IDs... Read more...
The train carrying a vast amount of NSA confidential information continues to trek along today, with a revelation that the government agency conducted man-in-the-middle (MITM) attacks involving a couple of the Web's largest companies. Falling under the guise of "FLYING PIG", one of the main traffic sources to... Read more...
The game's acronym may inspire laughter, but a recent hacking targeting it is as serious as a heart-attack (alright, maybe not that serious). Riot Games, LoL's developer, posted on its website this week that 120,000 transaction records from 2011 have been exposed (to someone, or some group), although thanks to the... Read more...
Getting hacked is a bummer and can leave you feeling violated, but we can only imagine what it's like to get hacked in the most sacred room of the house: the bathroom. For those who own a luxury Satis toilet controlled by an accompanying smartphone application, it's entirely possible to fall prey to a hacker attack while you're doing your... Read more...
It’s not just criminals (and their direct antagonists in the security industry); the FBI likes to hack, too. According to the Wall Street Journal, the FBI has been using hacking techniques and products to break into Android phones in order to perform surveillance on criminal suspects. Allegedly, the FBI can hack a... Read more...
Well now, this is awkward. You may recall a study conducted by McAfee a few years back in which it was revealed that businesses were at risk of losing over $1 trillion from "loss or theft of data and other cybercrime." That figure has been cited on more than one occasion by top government officials, including... Read more...
A mere day after Apple confirmed that its developer portal had been broken into, a Turkish man named Ibrahim Balic has (bravely?) fessed-up, claiming all responsibility. Apple has yet to comment on the situation, and we're not even sure it will, at least publicly. If Balic is in fact the source of the attack, Apple... Read more...
Last Thursday, members of Apple's developer portal had begun receiving password reset emails en masse, leading us to believe that the service had been breached. In an email sent to members on Sunday, our suspicions have been confirmed. In the email, Apple states that an intruder managed to get into the system, and... Read more...
Tired of changing passwords yet? Well, if you're a member of the NASDAQ OMX Group forums, your wish is still pending. The forum, where users can discuss stock happenings throughout the day, has been revealed to have been exploited, with an unknown number of usernames and passwords at risk. NASDAQ's OMX Group has said that it's reset all user... Read more...
Things are getting a little hairy on the wild, wild Internet. With privacy fears at an all-time high and the whole Snowden episode stirring up worries that governments can easily convince companies to hand out just about any digital information in the world, the mere notion of whimsically cruising the Internet is... Read more...
It's not all too often that an MMO developer is forced to issue a warning about hacked accounts - much less take certain services offline as a result - so if you play World of Warcraft, take note. Blizzard yesterday posted a statement to its Battle.net site stating that there's been an increase in unauthorized account login attempts via the... Read more...
The swashbucklers who founded and ran The Pirate Bay (TPB), an online torrent site notorious for turning a blind eye to illegal file downloads, are no strangers to the legal system in Sweden. More recently, TPB co-founder Gottfrid Svartholm Warg received a two-year prison sentence by a District Court in Sweden for... Read more...
The Internet is an amazing place. But, increasingly, it's a place filled with peril and pitfalls, particularly if you're hosting something of value. International cybercrime has found itself in the spotlight of late, and now Microsoft is making a concerted effort to help curb it. Microsoft has just announced that it is working lockstep with... Read more...
A compromised password for your social network account can quickly jump from an inconvenience to a nightmare, so services like Google have long offered two-step verification features to help you prove you’re, well, you. LinkedIn is finally getting in on the game with its own verification program, which sends you... Read more...
It's another day, so that means only one thing: another Twitter account hijack. This latest incident comes courtesy of the "Syrian Electronic Army", a group that actively hijacks websites and accounts of entities that produce Syrian-related news that it deems hostile or inaccurate. Not one, but two accounts have been... Read more...
I'm sure it comes as a surprise to no one that Google is a great place to find some questionable items online, whether it's malware, exploits, someone belly-flopping a pool of ice - whatever. However, even with as much as what Google offers, there are many things that the company doesn't track and publish online. For... Read more...
First ... Prev 7 8 9 10 11 Next