Pwned: 65 million Tumblr accounts, 40 million from Fling, 360 million from MySpace

Pwned: 65 million Tumblr accounts, 40 million from Fling, 360 million from MySpace

That "set" of accounts compromised in the Tumblr hack was actually 65 million. Have I Been Pwned added another 40 million from the 'dating' hookup site Fling. The MySpace hack had more than 360 million email addresses in it. All of...

05/30/16

Faception can allegedly tell if you're a terrorist just by analyzing your face

Faception can allegedly tell if you're a terrorist just by analyzing your face

Faception claims it can spot if you are a terrorist, pedophile, genius or some other personality – judging a book by its cover with an 80% accuracy, by just analyzing your face. An unnamed homeland security inked a contract with the...

05/25/16

100 thieves stole $12.7 million from ATMs in 2.5 hours

100 thieves stole $12.7 million from ATMs in 2.5 hours

A gang suspected to be part of organized crime pulled off a $12.7 million heist at Japanese ATMs in less than 3 hours by using cloned credit cards from a South African bank.

05/23/16

Face recognition app FindFace may make you want to take down all your online photos

Face recognition app FindFace may make you want to take down all your online photos

FindFace has a 70% accuracy for identifying strangers and could be a game-changer for law enforcement.

05/18/16

Hacker GhostShell is back, leaking data from 32 companies with open FTP directories

Hacker GhostShell is back, leaking data from 32 companies with open FTP directories

Beware admins with lax security hygiene. The hacker GhostShell is back, leaking data from 32 targets with open FTP and promising more 'light hacktivism' dumps to come.

05/16/16

Ransomware attacks on House of Representatives gets Yahoo Mail blocked

Ransomware attacks on House of Representatives gets Yahoo Mail blocked

A surge in ransomware attacks through third-party email providers such as Gmail and Yahoo resulted in the House of Representatives' IT department blocking Yahoo Mail and apps hosted on Google’s appspot.com.

05/11/16

Spy glasses and smartwatches used for high-tech cheating to get into medical school

Spy glasses and smartwatches used for high-tech cheating to get into medical school

Wannabe Thailand medical school applicants were caught in a high-tech exam cheating system which used spy glasses to capture the test questions, so tutors could look up the answers and then send coded correct answers via smartwatches...

05/09/16

Researchers nab millions of stolen credentials for Gmail, Hotmail, Yahoo, banking

Researchers nab millions of stolen credentials for Gmail, Hotmail, Yahoo, banking

A hacker handed over millions of stolen credentials for Google, Microsoft and Yahoo email accounts, as well as thousands for banking, manufacturing and retail, in exchange for researchers liking and voting up his social media page.

05/04/16

Hack a car in Michigan, go to prison for life if new bill becomes law

Hack a car in Michigan, go to prison for life if new bill becomes law

Hack a car in Michigan, go to prison for life...at least if newly proposed cybersecurity bills become law.

05/02/16

Most breaches are still caused by PEBKAC and ID10T errors like falling for phishing

Most breaches are still caused by PEBKAC and ID10T errors like falling for phishing

Open. Clickety click. Pwned. Humans are still the weak security link, falling for phishing even more often than before, which leads to breaches.

04/27/16

Dogspectus: Android ransomware silently installs, demands $200 iTunes gift card ransom

Dogspectus: Android ransomware silently installs, demands $200 iTunes gift card ransom

Dogspectus is a ransomware that silently installs on Android devices, via malvertising and a Hacking Team exploit, then demands a ransom of $200 in iTunes gift cards.

04/25/16

Algorithm predicted who will bite the dust next in Game of Thrones

Algorithm predicted who will bite the dust next in Game of Thrones

Students at the Technical University of Munich have created an algorithm which predicts the likelihood of death percentage for Game of Thrones characters. If you think computer-generated guesses will be accurate, then this article...

04/20/16

Hackers only need your phone number to eavesdrop on calls, read texts, track you

Hackers only need your phone number to eavesdrop on calls, read texts, track you

Thanks to a flaw in the cellular network SS7 protocol, an attacker just needs your phone number to listen to your calls, read your texts and track you. 60 Minutes showed how hackers only needed a congressman's phone number to record...

04/18/16

Cryptoworms: The future of ransomware hell

Cryptoworms: The future of ransomware hell

If you think ransomware is growing problem now, then the cryptoworms that are 'right around the corner' and described as the future of ransomware by researchers sound like a living hell.

04/13/16

Petya ransomware cracked: Get password to decrypt hard drive for free

Petya ransomware cracked: Get password to decrypt hard drive for free

The Petya ransomware lock screen warned that your hard drive was encrypted with a military grade encryption algorithm and the only way to unlock it was to cough up the bitcoins to purchase a decryption key. But that’s no longer true;...

04/11/16

FBI, DEA and ICE are top Cellebrite customers so far in 2016

FBI, DEA and ICE are top Cellebrite customers so far in 2016

Here's a list of the government customers of Cellebrite so far in 2016.

04/06/16

Copyright cops want ISPs to hijack pirate's browser until ransom fine is paid

Copyright cops want ISPs to hijack pirate's browser until ransom fine is paid

Rightscorp's Scalable Copyright scheme involves ISPs hijacking the browser of alleged pirates until the copyright infringement fine is paid.

04/04/16

1,418 remotely exploitable flaws found in automated medical supply system

1,418 remotely exploitable flaws found in automated medical supply system

There are over 1,400 remotely exploitable flaws in Pyxis SupplyStation systems; many of those vulnerabilities, ICS-CERT warned, "an attacker with low skill would be able to exploit." The vulnerabilities are in seven third-party...

03/30/16

VNC Roulette: Prepare to be hacked if you don't use a password for VNC

VNC Roulette: Prepare to be hacked if you don't use a password for VNC

If you don't use a password for VNC, don't be surprised if your desktop and IP show up on VNC Roulette. By choosing to use no authentication to secure your VNC connection, some people might take that as a 'please hack me' invitation.

03/28/16

FBI reportedly to use Cellebrite to crack encrypted San Bernardino iPhone

FBI reportedly to use Cellebrite to crack encrypted San Bernardino iPhone

Cellebrite, a company which could suck the data off cellphones in under two minutes several years back, is reportedly the firm helping the FBI crack the San Bernardino shooter's iPhone.

03/23/16

Load More