Items tagged with Hack

WhatsApp is a communications tool that is used by people all around the world to stay connected for personal and business use. The big draw to the app for many is that it has an encrypted group chat feature, so you don’t need to worry that someone is listening in on what you are saying. However, security researchers have recently found a flaw Read more...
PlayStation 4 fans looking to set their console free from the clutches of Sony will soon have a new jailbreak to try out. The PS4 4.05 Kernel Exploit from Developer Specter has been published on GitHub for download. The jailbreak devs are specific in noting that the exploit doesn't contain any code that will defeat... Read more...
Updated November 29th at 11:52am Apple has issued a patch for the macOS High Sierra security exploit, less than 24 hours after it was made public. It is addressed in Security Update 2017-001, which Apple encourages all macOS High Sierra users to download immediately. Apple describes the security incident... Read more...
Imgur has discovered what it calls a "potential security breach" that happened three years ago. The breach allowed the attackers to make off with the emails and passwords of 1.7 million user accounts. Imgur says that it is still investigating the breach, but that it wanted to warn its users of the intrusion and tell... Read more...
Google has been paying out some significant money to get security researchers and hackers to tear apart its Chrome browser and Chrome OS. In March of 2015, Google offered up $100,000 for anyone who could find an exploit chain that would allow for a persistent compromise of a Chromebox or Chromebook using guest mode... Read more...
You might think that the massive number of security breaches that have happened in recent years would push corporate giants and medical facilities out there to take a look at their own security and ensure that their networks are protected. We are only a few months removed from the massive attack that breached Equifax... Read more...
This morning we talked about a researcher from KU Leuven University in Belgium who had discovered a major security vulnerability in the WiFi Protected Access II (WPA2) protocol that is used to secure wireless internet traffic. That vulnerability could be used to allow a nefarious attacker to glean confidential details... Read more...
The SNES Classic Edition game console launched to much fanfare and so far the system has proved so popular that many people still can't find one. Reviews for the SNES Classic have been very positive with lots of praise for its retro gaming prowess. The console came from Nintendo with 21 games preinstalled, but some... Read more...
Back in 2013, Yahoo's database was breached by hackers and it wasn't discovered or reported until 2016. When that reporting happened last year, Yahoo thought that detials on 1 billion of its user accounts had been stolen. As it turns out, things are much worse than Yahoo (now owned by Verizon and part of Oath)... Read more...
It looks like another major hack has been perpetrated against a major company, this time the hack was of pay TV network Showtime's streaming platform, ShowtimeAnytime.com. The platform allows users with a subscription via a cable network to stream shows via a browser from anywhere. People with no TV subscription can... Read more...
Researchers have still been working their way through the hack that resulted in the very popular CCleaner security app being used as a host for malware. The initial attack was thought by many to have caused minimal harm to computer systems that were infected, but it looks like there was a secondary attack that may be... Read more...
Companies the world over give IT admins access to some of their most sensitive information. This is the kind of information that if lost, damaged, or stolen would lead to lost money and business for the company. An Arizona man name Tavis Tso has entered into a plea deal resulting from his actions where he took the... Read more...
A security company called Armis is spilling the beans on a collection of eight different exploits that it is collectively calling BlueBorne. These exploits can allow a hacker access to your phone in seconds without having physical access to the device. Perhaps the scariest part of the exploit is that BlueBorne isn't... Read more...
Unless you’ve been living under a rock, you know that Equifax was hacked surfaced and 143 million Americans have potentially had their personal information stolen. What many have been wondering is what exactly do the hackers plan to do with all that stolen data. A report making the rounds claims that the hackers want... Read more...
Instagram users have something to worry about after hackers breached the database of the social network and photo sharing websites. The hackers were able to gain access to the phone numbers and email addresses of six million Instagram account using a bug that Instagram CTO Mike Krieger has now confirmed... Read more...
Hacker group OurMine claims to have hacked the official PlayStation Twitter and Facebook pages Sunday night. The group took credit for the hack and posted several messages to the social media accounts, which have now all now been deleted. Before the messages were deleted, they were copied for posterity... Read more...
MWR Labs has been able to demonstrate a hack on older Amazon Echo speakers that turns the device into an always-on spy sitting right in your home. Detractors of the way Amazon crafted it's speakers to always listen for your voice will use this as an "I told you so" moment. According to the researchers, the Echo is... Read more...
Researchers from Exodus Intelligence discovered a zero-day attack that threatens most of the popular smartphones on the market today. The hack is called Broadpwn and it affects devices running iOS and Android. Specifically all Samsung Galaxy S3 through Galaxy S8 devices are susceptible as are the Note 3, 6, 6X, and... Read more...
We took part in an interesting demo this week that was both eye-opening and somewhat alarming. We met with representatives from Synaptics to discuss what we thought would be its latest sensor technology or HCI device, but were treated to a real-world hacking display that would leave most people slack-jawed. Why, you... Read more...
Just yesterday, we posted a story concerning printer security and how we should take it more seriously given IoT botnets that are swooping across the globe (namely Mirai), along with the sensitive data and documents these machines are custodians of. Today’s printers have relatively potent processors, complex operating... Read more...
The FBI is currently investigating a series of cyberattacks on the Federal Deposit Insurance Corporation (FDIC), that they believe the Chinese military to be responsible for. The attacks on high-level employees' computers started in 2010 and resurfaced again in 2011 and 2013. Victims included former FDIC Chairwoman... Read more...
Maybe he’s the hero the United States “deserves, but not the one it needs right now”. It looks like the United States has its own hacking Dark Knight. American vigilante hacker “The Jester” gained unauthorized access to the Russian Ministry of Foreign Affairs website and left a very interesting message for the Russian... Read more...
First ... Prev 2 3 4 5 6 Next ... Last