Remember all that hubbub over China hacking US companies a few months ago? It looks like they’re back at it. Surprisingly, the attacks have not only resumed but are originating from the same source – Unit 61398 in Shanghai. Why they chose to resume operations from a location that’s already [...]Read More »
13-year-old Alaskan middle school students hack classroom computers by using phishing on their teachers
In Ketchikan, Alaska a group of 18 students (aged 12 to 13 years) attending Schoenbar Middle School were able to hack into various computers after exploiting teachers to gain admin access. After taking control of various computers remotely, the hackers played pranks on other students.
Teachers were alerted about the [...]Read More »
Apple may have fixed their password security hole, but you should probably enable two-step verification
Just in case you missed it, Apple made a pretty serious boo-boo on the security front yesterday. The security issue was that Apple’s iForgot password reset tool was made vulnerable to hackers — if they managed to manipulate the URL in the date of birth page, they could reset your [...]Read More »
Internet-wide scan reveals millions of devices are exploitable due to use of default passwords like “admin” or “root”
A researcher, who has chosen to remain anonymous, has performed an internet-wide scan to determine the security level of gadgets like printers, webcams, and set-top boxes all across the world.
The scan was done by using the researcher’s custom-written code to send out more than 4 trillion messages. To put [...]Read More »
EA’s online video game service Origin is exploitable by bug that lets attackers remotely run malicious code
Video game publisher Electronic Arts recently put out one of the bigger releases of the year in SimCity. The game was plagued with launch woes and continuous server issues as it required an online connection to EA’s Origin service to function. It turns out that’s not the end of the [...]Read More »
In the U.S. intelligence community’s annual review of worldwide threats, normally terrorism would be at the top of the list. But now, the nation’s top officials believe that cyber-attacks are now a greater threat to national security than terrorism, organized crime and the propagation of weapons of mass destruction.
While [...]Read More »
Backdoor.Makadoc — a trojan that has been floating in the wild for a while now, attacking Windows, and has recently been updated to target Windows 8 and Windows Server 2012 — is a clever piece of malware. What makes this malware clever, you ask? Simply the way it goes about [...]Read More »
Hackers calling themselves AntiSec (aka LulzSec, Anonymous, etc.) have published online one million iPhone and iPad unique device identifiers (UDIDs). They claim to have another eleven million stashed away and say they stole the information from the FBI.
According to their online declaration, the hackers stole a file named “NCFTA_iOS_devices_intel.csv” [...]Read More »
Dropbox is an extremely popular cloud storage service used by many people, including me and likely you. However, popularity or size doesn’t mean you are immune from hackers. Since a few weeks Dropbox users have been complaining of a sudden increase in spam to e-mails that they only use for [...]Read More »