Items tagged with security breach

Rumor has it that the new Google Home Hub may have a few security vulnerabilities. A hacker recently demonstrated that a Google Home Hub could potentially be forced to reveal information about its owner, but Google has now refuted this claim and contends that user information is not at risk. Security researcher Jerry Gamblin noticed that his own Google Home Hub appeared to be using several open ports. He used the command prompt on his computer to reboot his device, disable notifications, erase various settings, and delete the Google Home Hub WiFi network. Gamblin was not able to access user... Read more...
A cryptocurrency exchange in Asia called Coincheck has announced that it was the victim of a massive hack that saw hundreds of millions of dollars worth of cryptocurrency stolen in what is the largest heist of its kind in history. Coincheck doesn't call the heist a hack, it says that the coins were sent illicitly outside of the service. The cryptocurrency stolen is called NEM, which is the tenth largest cryptocurrency in market value. In total there were 500 million NEM tokens taken in the heist worth about $400 million, according to Bloomberg. However, Cointelegrpah reports a much higher number,... Read more...
It seems as though hackers are having a field day when it comes to infiltrating both private and government computer networks. The latest victim is Carphone Warehouse, which just so happens to be the United Kingdom’s largest independent phone retailer. According to various reports, Carphone Warehouse has revealed that as many as 2.4 million customer accounts have been compromised by sophisticated hackers. In addition, another 90,000 customers have possibly had their encrypted credit card details stolen.Image Source: Martin Pettitt/Flickr Dixon Carphone, the parent company of Carphone Warehouse,... Read more...
Data security research player CrowdStrike is reporting a security flaw that could allow hackers to exploit and take over data centers from within. Given the nasty moniker "VENOM" (for "Virtualized Environment Neglected Operations Manipulation"), the vulnerability CrowdStrike uncovered is present in a common component — a legacy floppy drive controller — that is widely used in virtualization platforms and appliances. The seriousness of the VENOM vulnerability rests on how it circumvents an essential barrier used by cloud service providers to segregate customer data. Thus, infiltrators who are able... Read more...
Uber announced that it suffered a database breach at the hands of hackers last year. The company admitted that about 50,000 drivers may have been affected by the breach and announced that a lawsuit has already been filed by Uber against the as-yet unidentified hackers. “A small percentage of current and former Uber driver partner names and driver’s license numbers were contained in the database,” Uber’s managing counsel of data privacy, Katherine Tassi said in a statement. “Immediately upon discovery we changed the access protocols for the database, removing the possibility of unauthorized access.... Read more...
Conventional wisdom in years past was that hackers didn’t bother to exploit Apple’s OS X operating system because its relatively insignificant market share didn’t warrant wasting resources to exploit it. The reasoning was, why bother with OS X when Windows was pushing over 90 percent of the worldwide OS market? However, in recent years, Apple has seen an uptick in Mac sales and pretty much dominates the field when it comes to notebooks priced over $1,000. The higher sales profile for Macs running OS X also means more attention from nefarious parties that are ready to strike. The latest report from... Read more...
Since the massive security breach at Sony Pictures has occurred, speculation has been that North Korea was behind it. Sony, with the help of cybersecurity firm Mandiant and the FBI, has been investigating the perpetrators behind the breach. However, a senior FBI official stated has stated that government agency has not confirmed that North Korea is behind the attack, “There is no attribution to North Korea at this point,” said Federal Bureau of Investigation assistant director of its cyber division Joe Demarest on Tuesday at a cybersecurity conference sponsored by Bloomberg... Read more...
Sony Pictures Entertainment is not getting a break from the security break it experienced last month that resulted in Sony shutting down its computers. In the aftermath of the attack, the hackers, called Guardians of Peace, released a set of documents that included around 47,000 Social Security numbers for actors as well as current and former employees. The Wall Street Journal reviewed the leaked documents and discovered social security numbers for thousands of freelancers as well as current and former employees. SSNs were also found for Hollywood actors who have appeared in movies and TV shows,... Read more...
Government agencies are prime targets for many hackers (particularly those funded by other governments), so it’s not surprising that the State Department was recently attacked. What makes the attack unusual is that it appears to have been successful, with unclassified systems being compromised, including possibly the State Department’s email system. What’s more, the State Department is the fourth government agency to suffer such a breach in recent weeks. The National Oceanic and Atmospheric Administration (NOAA) and United States Postal Service and White House have all been disrupted... Read more...
After a 10-month cyber espionage investigation, researchers have found 1,295 computers in 103 countries with software that is capable of stealing information from high-profile targets such as the Dalai Lama and government agencies around the world. In the report published today by Information Warfare Monitor, a Toronto-based organization, we learn the affected computers include embassies belonging to Germany, India, Romania, and Thailand as well as the ministries of foreign affairs for Barbados, Iran, and Latvia. The infected computers acted as an illicit information-gathering network. Researchers... Read more...