Web Security »
Researchers at Trustwave’s Spider Labs have uncovered a server with more than two million stolen login credentials. The stolen logins were for Facebook, Yahoo, Google, and Twitter accounts as well as for a handful of other sites.
According to Spider Labs blog, over 1.5 million of the stolen logins were credentials to website accounts.…Read More »
According to the Dutch media outlet NRC, courtesy of National Security Agency (NSA) whistleblower Edward Snowden, it was revealed that the NSA didn’t stop at reading your mail or listening to phone calls. The latest information says that the NSA also planted Malware on approximately 50,000 servers in order to gain access to sensitive information.…Read More »
The Internet giant Google has made yet another major change in wake of NSA spying. Originally, their goal was to enact new security certificates with a 2,048 bit encryption by the end of the year. They beat their deadline by over a month.…Read More »
Apparently Microsoft, one of the most popular computer companies, does not have any data encryption when it comes to “server-to-server communications”. This means when your data is passing from one Microsoft server to another Microsoft server, it isn’t being encrypted. The news comes from Dorothee Belz, who is the Microsoft Corporation European Vice President Legal and Corporate Affairs.…Read More »
The activist group known as Anonymous, sometimes referred to as hacktivists given that their members are known to hack to into various institutions when trying to get a specific point across, are gaining the FBI’s attention for hacking into American government networks and systems and stealing information.…Read More »
In a move to make the internet more secure, the Internet Engineering Task Force, or IETF, have started the discussion on how to encrypt… everything.
It is more imperative than ever since the knowledge of government spying and the ease of which they can do so especially with much of the internet using “plaintext” format to publish their pages in.…Read More »
In early October, Adobe’s security was penetrated and millions of online credentials were stolen. A recently analysis of the passwords that were taken show that the most popular password among Adobe’s 38 million users was “123456″, used by roughly 1.9 million accounts.…Read More »
As of January 2014, the only extensions that Google will allow to work with the Chrome browser are those downloaded from it’s web store. In other words, Google is banning add-ons that they have not sanctioned.
According to Erik Kay (engineering director at Google), Google believes this move will help keep away add-ons that are dangerous to your computer.…Read More »
No one wants malware on their computer. It’s dangerous and can allow the person who created the malware access to information you’d rather keep private. Keeping your antivirus software up to date is a good start but it often catches the problem after the fact — after you’ve downloaded something.…Read More »
The homepage of Fox News’ website appeared to be temporarily vandalized today. The featured headline was changed to “WEEEEEEEEEEEEEEEEEEEEEEEEEEEE,” followed with the blurb, “STUFF YO.” Other articles that appeared during the time were ones about Apple releasing a Maverick Sea Lion and World Zombie Day.…Read More »
Think your personal email is private? Think again. Let’s face it, you have better privacy by mailing a letter through the postal service than you actually do with email. The problem is your email can be hacked, scanned, and pretty much intercepted without you or the intended recipient knowing it.…Read More »
A boy who lives in the Notre-Dame-de-Grace suburb of Montreal has just pled guilty to hacking websites and costing about $60,000 worth of “damage”.
In a story that sounds somewhat similar to the beginning of the old 90s movie Hackers, in early 2012, during student protests in Montreal, the boy, who remains anonymous (somewhat ironically) hacked into sites that belonged to the Montreal police, the Quebec Institute of Public Health and also the Chilean government’s website, to name a few.…Read More »
In the light of Edward Snowden’s recently disclosed scandalous revelations about NSA’s surveillance prowess, tech giants, individuals, and governments are agitated to keep their data private, and are in search of a solution that could rescue them from the surveillance dilemma.…Read More »
It seems like with the increasing level of access to technology on a global scale, there are increasing numbers of scam artists, hackers, pricks, punks, assholes, scumbags, etc. that try to find ways to make everyone’s digital life a bigger pain than it needs to be.…Read More »
There have been a string of government site hackings lately, the most recent is President Obama’s own Twitter account. The account is used by the president’s Organized for Action (OFA) campaign and was recently the victim of foul play. Not that the hackers actually hacked Obama’s Twitter, nor did they send out messages as the President himself or even as his OFA campaign via Twitter.…Read More »
If you’re an Adobe customer, you might want to change your password today. Following up an initial report earlier this month where Adobe said hackers acquired data from 3 million customer accounts, the company is now saying that the number is more like 38 million.…Read More »
Autofill in Google Chrome, the feature that lets you save your information inside Chrome and automatically fill in online forms, is very convenient, but what if this convenience could send credit card information to web servers? It’s very possible, and this is something users should be aware of if they store such information within their Google Chrome web browser.…Read More »
The websites of web and PC security software manufacturers AVG and Avira were hacked by Palestinian hactivists earlier this day, courtesy of a major DNS breach into Avira and AVG.
When users visited the websites of both of these security software manufacturers, they were not welcomed by the websites’ homepage as usual.…Read More »
Apparently, that is the website of a “a major bank, one of the biggest in Canada, and well known for their security”. Yet they force people to use a password of 8 characters or less. WTF?Read More »
“Microsoft South Africa” has “approved a claim of $2,000,000″ for me. Woohoo!Read More »
The New York Times website was down today due to a “malicious external attack,” with the group responsible alleged to be the Syrian Electronic Army (SEA). The attack involved redirecting requests from nytimes.com to a domain operated by the SEA. The Verge notes that the attack’s timing “coincides with US declarations that Syria should be held accountable for its chemical strikes,” with multiple users reportedly seeing this image when trying to visit the site:
The attack targeted DNS host, so users were technically still able to access the website by going directly to the NYT IP address, which is 188.8.131.52.…Read More »
Washington Post, which was recently purchased by Amazon CEO Jeff Bezos, was briefly disrupted by the Syrian Electronic Army (SEA) this past Thursday. The SEA successfully redirected readers from the Washington Post’s website to its own website.
According to Emilio Garcia-Ruiz, Managing Editor of Washington Post:
Read More »
A few days ago, The Syrian Electronic Army, allegedly, subjected Post newsroom employees to a sophisticated phishing attack to gain password information.
This infographic provides very good tips regarding how people are hacked and how to protect yourself.Read More »
Tor is a tool that protects your identity while browsing the internet. While it is known as the ‘Darknet’ by some due to how it can be used to distribute pornographic and child abuse images, the main purpose of this project is to give people freedom of speech without having to identify themselves – particularly those in politically unstable countries.…Read More »
Hackers have gone on a rampage recently; these dirty little old men have hacked their way into multiple web servers where they proceeded to upload child abuse images for safekeeping. Hackers borrowing space on a company’s web server is nothing new, heck, they have even used these servers to host multiplayer games, but this is the first time we heard of someone hiding child abuse images on the servers of legitimate websites.…Read More »
Pete likes to watch a lot of porn. Unfortunately, he doesn’t know how to watch porn safely.Read More »
This infographic provides some simple tips as to how/why viruses spread.Read More »
The database of popular video game developer, Ubisoft, was recently accessed illegally by some hackers. Said database contains email addresses and passwords of Ubisoft users.
According to Ubisoft, some hackers were able to use “stolen credentials” to get through the Ubisoft network.…Read More »