Team GhostShell hacktivists dump data from US universities and hundreds of sites

Team GhostShell hacktivists dump data from US universities and hundreds of sites

The hacker group GhostShell is back, claiming to have access to billions of accounts, trillions of records, hacking sites and dumping data to show that governments, educational institutions and other sites still have shoddy...

07/01/15

Malwarebytes offers pirates amnesty, free license keys for premium MBAM product

Malwarebytes offers pirates amnesty, free license keys for premium MBAM product

If you used a keygen or crack to activate a license for Malwarebytes Anti-Malware premium product protection, then hurry up and jump on Malwarebytes Amnesty program to get a legit key for MBAM premium as it's only being offered for a...

06/29/15

Google's first vertical Street View lets you ascend 3,000 feet up Yosemite's El Capitan

Google's first vertical Street View lets you ascend 3,000 feet up Yosemite's El Capitan

Forget Apple's El Capitan for moment as Google's first vertical Street View takes you 3,000 feet up Yosemite National Park's El Capitan granite monolith.

06/24/15

Hackers allegedly attack Polish LOT airline, 10 flights and over 1,400 people grounded

Hackers allegedly attack Polish LOT airline, 10 flights and over 1,400 people grounded

After Polish airline LOT suffered an IT attack on ground operation systems, 10 flights were canceled, another dozen were delayed and over 1,400 passengers were grounded at Warsaw Chopin Airport. LOT said the attack on its...

06/22/15

Vulnerability in Samsung Galaxy phones put over 600 million Samsung phone users at risk

Vulnerability in Samsung Galaxy phones put over 600 million Samsung phone users at risk

Samsung pre-installed the Swift keyboard which has a vulnerability that could allow an attacker to remotely tap into GPS, camera and microphone, eavesdrop on text messages and calls and more. NowSecure listed Galaxy S6, S5, S4 and S4...

06/16/15

Will banks allow four emojis to replace PIN numbers?

Will banks allow four emojis to replace PIN numbers?

Will banks let customers use emojis instead of numeric PINs? A UK firm says yes, because emojis would be harder to hack yet easier to remember.

06/15/15

Vital engine software files accidentally wiped, linked to fatal A400M plane crash

Vital engine software files accidentally wiped, linked to fatal A400M plane crash

'Accidental data wipe' of vital files that controlled military A400M aircraft engines has been connected to the fatal plane crash.

06/10/15

MEDJACK: Hackers hijacking medical devices to create backdoors in hospital networks

MEDJACK: Hackers hijacking medical devices to create backdoors in hospital networks

Attackers are infecting medical devices with malware and then moving laterally through hospital networks to steal confidential data, according to TrapX’s MEDJACK report.

06/08/15

Surveillance by FBI's fleet of spy planes raises privacy questions

Surveillance by FBI's fleet of spy planes raises privacy questions

Surveillance by the FBI's fleet of spy planes, which are registered to shell companies and fitted with tech capable of sucking up cellphone data from innocent Americans, raises serious privacy questions.

06/03/15

Russia Photoshopped satellite images to blame Ukraine for shooting down MH17: report

Russia Photoshopped satellite images to blame Ukraine for shooting down MH17: report

After a team of investigators conducted forensic analysis of satellite images provided by the Russian government as "proof" that Ukraine shot down Malaysia Airlines Flight MH17, the group found the images to be digitally altered and...

06/01/15

Use Facebook Messenger? Marauders Map app can pinpoint your location to within 3 feet

Use Facebook Messenger? Marauders Map app can pinpoint your location to within 3 feet

Stalkers will likely rejoice as a new app can help them do more than creep on Facebook friends as it can pinpoint the precise location of non-friends if they use Messenger to post to the same group and the sender hasn't disabled...

05/27/15

Google's Internet-connected toys patent sparks privacy concerns, visions of IoT Chucky

Google's Internet-connected toys patent sparks privacy concerns, visions of IoT Chucky

Google's recently published patent for Internet-connected toys, which have microphones, cameras, speakers and motors, have sparked privacy concerns; the 'creepy' anthropomorphic devices might look like a doll or teddy bear; but some...

05/25/15

Researchers create app to stop RIG attacks on Android and Android-based IoT devices

Researchers create app to stop RIG attacks on Android and Android-based IoT devices

Researchers, who said there is an urgent need to mitigate runtime-information-gathering (RIG) attacks on Android mobile and Android-controlled Internet of Things devices, presented 'Leave Me Alone: App-level Protection Against Runtime...

05/20/15

Building code blueprint released to help build secure medical device software

Building code blueprint released to help build secure medical device software

Today the IEEE Cybersecurity Initiative released “Building Code for Medical Device Software Security” to help establish secure code development for software that runs in a wide range of medical devices.

05/18/15

Can you hear us now? Verizon and Sprint ordered to issue refunds for cramming charges

Can you hear us now? Verizon and Sprint ordered to issue refunds for cramming charges

Here's how current and former Verizon Wireless and Sprint customers who were billed for bogus or unauthorized third-party text messaging services can apply for mobile 'cramming' refunds. The wireless carriers are to pay $158 million...

05/13/15

More Lenovo woes: 3 security flaws, website clerical errors, maybe layoffs

More Lenovo woes: 3 security flaws, website clerical errors, maybe layoffs

Lenovo is again in the news thanks to the security snafus of three security holes in Lenovo System Update service. The company claims there is no defect in its new LaVie Z 360 devices, but blamed confusion about its capabilities on...

05/11/15

Android cellular voice channel used as new covert channel to leak info, spread malware

Android cellular voice channel used as new covert channel to leak info, spread malware

Researchers bypass Android security mechanisms and exploit smartphone cellular voice channel to act as a new covert channel which can potentially be used to leak information and to spread malware.

05/06/15

Will the next big thing come from startups competing at Disrupt NY?

Will the next big thing come from startups competing at Disrupt NY?

TechCrunch's Startup Battlefield lists startups competing for $50,000 and the Disrupt Cup. Some companies listed on Startup Alley for day one include one that says it can 'download power from the air' to power your phone, several...

05/04/15

What third-party app crashed American Airlines pilots' iPads and caused flight delays?

What third-party app crashed American Airlines pilots' iPads and caused flight delays?

About two dozen American Airlines flights were delayed after a faulty third-party app glitched out and crashed pilots' iPads. But what app caused it and why? Could a compatibility issue with iOS 8.3 and a navigation app crash an iPad?...

04/29/15

Researchers hijack teleoperated surgical robot: Remote surgery hacking threats

Researchers hijack teleoperated surgical robot: Remote surgery hacking threats

Security researchers launched cyberattacks against a teleoperated surgical robot; they easily hijacked the Raven II robot during surgery and launched a denial-of-service attack that stopped the robot and made it impossible for a...

04/27/15

Load More