Items tagged with Hacking

Remember when getting hacked meant loss of control of your PC and/or stolen data? It could be embarrassing, sure, and you could even be fired if a weak password contributed to the theft of sensitive company information. However, more recent hacks of shown a frightening trend towards causing physical harm. Earlier this month, security researchers demonstrated the ability to remotely hijack virtually all controls in a Jeep Cherokee, including steering and braking. And now we're finding out that hackers can disable or change the target of a computer-aided sniper rifle. Scary times we live in, folks. Security researchers Runa Sandvik and Michael Auger developed techniques to hack TrackingPoint's... Read more...
We reported earlier this week that a Jeep Cherokee could be remotely accessed and controlled, and I wouldn't blame anyone for being a skeptic. After all, what are the chances of someone remote being able to disable the transmission? Well, with Fiat Chrysler's response, I think that question has been answered. In a press statement issued today, the company has announced that it's recalling 1.4 million cars that are equipped with certain UConnect radios. Dodges, Jeeps, Rams, and Chrysler's are affected. Ultimately, it seems like this recall isn't going to be that painful for owners of the affected vehicles, as FCA US said a software update would be made available via a USB drive that plugs... Read more...
Is there anything scarier than the thought of a hacker remotely taking control of your vehicle's steering and braking functions as you barrel down the highway? Well sure, being eaten alive by flesh eating zombies like an episode of The Walking Dead would cause most people to soil their undergarments, but losing control of your vehicle certainly ranks right up there. And unlike the zombie scenario, these remote vehicle hacks are really happening. The newest threat is an exploit that exists in car infotainment systems that could allow an attacker to take complete control of a vehicle's brakes and other functions. It was discovered by NCC Group, a U.K.-based firm that demonstrated part of its scary... Read more...
To quote Ron Burgundy in Anchorman, "Boy, that escalated quickly. I mean that really got out of hand fast." He was referring to a deadly and chaotic showdown between various news stations, but he could have just as easily been talking about a recent security breach at the U.S. Office of Personnel Management (OPM) that's much worse than originally thought. It was initially reported that over 4.2 million current and former federal employees had their personnel data stolen as a result of the massive cybersecurity breach, but the Obama administration has now revealed that an additional 21.5 million individuals had their personal info compromised in the breach as well. That includes... Read more...
A teenage member of the notorious hacking group Lizard Squad has received a two-year suspended sentence for numerous cyber crimes. All tallied, he was convicted of 50,700 charges related to computer crimes, and in addition to his two-year suspended sentence, he must also undergo monitoring of his online activities. He will not serve any time behind bars.His name is Julius Kivimaki, or "Zeekill" if going by his online handle. The 17-year-old played a role in the distributed-denial-of-service (DDoS) attacks on Microsoft's Xbox Live and Sony's PlayStation Network in December of last year. Ironically enough, it was Kim Dotcom who convinced Lizard Squad to call off the attacks, which he did by offering... Read more...
Maybe someday the Chinese government will take a page from O.J. Simpson and write a book titled, "If I Did It: Confessions of a Hacker." After all, China is clinging to the innocence card just as adamantly as Simpson, never mind any evidence to the contrary. In fact, not only is the Chinese government saying it's not responsible for a massive security breach that compromised the personal information of millions of U.S. federal employees, but it claims that the accusations are the result of "absurd logic."The security breach was discovered in April, but actually began back in December of last year. Having gone unnoticed for four months, the hackers responsible were able to sift through personal... Read more...
Major League Baseball has worked hard to improve its image and move on from the so-called steroids era, a period in baseball where many records were broken by players who were later found to have been doping up and using human growth hormones. But the latest scandal takes an unexpected and perhaps unprecedented twist into the field of cyber espionage. The Federal Bureau of Investigation (FBI) and Justice Department are currently investigating the St. Louis Cardinals for allegedly hacking internal networks belonging to the Houston Astros. Law enforcement officials are said to have uncovered evidence that certain Cardinals employees infiltrated a network of the Astros that contained special databases... Read more...
Leading antivirus firm Kaspersky Lab said that it recently suffered a security breach involving at least three techniques that it had never seen before. The AV company described the attack as "one of the most sophisticated campaigns ever seen," though it believes it was able to detect the intrusion at an early stage, thereby mitigating the damage."This highly sophisticated attack used up to three zero-day exploits, which is very impressive -- the costs must have been very high," Costin Raiu, director of Kaspersky's global research and analysis team, said in a statement.The sneaky malware used to spy on Kasperky's systems sits patiently in a computer's memory bank and never writes any... Read more...
It's now believed that a crime syndicate in Russia is responsible for a security breach resulting in the theft of IRS records containing personally identifiable information for over 100,000 taxpayers. The sole purpose of the theft was to engage in identity theft for the purposes of tax fraud, a scheme that was used to file some $50 million in fraudulent tax returns. Peter Roskam, an Illinois Republican and chairman of a House subcommittee with IRS oversight, told CNN that he heard from IRS Commissioner John Koskinen via telephone that the hack originated from Russia. It's concerning in part because it was recently disclosed that Russian hackers also breached the White House and State Department... Read more...
Consider it an unfortunate sign of the times we live in that companies have to set aside enormous funds to contend with the cost of cyber related crimes. We're not talking chump change here -- according to a study by security firm Ponemon Institute that was funded by International Business Machines, the average cost of a data breach is now $3.8 million. That's up from $3.5 million a year ago and includes fees for investigating the breach, hiring experts to fix whatever security issue the hackers exploited, offering credit monitoring services for affected customers, and so forth. It adds up fast and shows why cyber crimes aren't just annoying, but a financial burden in many cases. What's not included... Read more...
Show of hands, who actually likes paying taxes? Anyone? It's not one of our favorite tasks either, and to add insult to injury, a band of advanced hackers reportedly infiltrated the Internal Revenue Service's records to collect personally identifiable information from over 100,000 taxpayers. It's believed that the cyber crooks involved weren't looking to send a message, but wanted to steal identities and intercept tax refunds.IRS Commissioner John Koskinen said in a statement that "these are not amateurs" and instead described them as "organized crime syndicates" that have been attacking numerous players in the financial industry, not just the IRS.Image Source: www.seniorliving.orgIn this case,... Read more...
Is it possible to take control of an airplane using an infotainment system as a gateway? Chris Roberts, a well-known hacker and security researcher with One World Labs, claims that it is. The FBI, who is investigating Roberts' claims, is taking no chances that he's incorrect. On April 15, Roberts posted this tweet: Find myself on a 737/800, lets see Box-IFE-ICE-SATCOM, ? Shall we start playing with EICAS messages? "PASS OXYGEN ON" Anyone ? :)— Chris Roberts (@Sidragon1) April 15, 2015 It's as if Roberts was looking for trouble. And if that's the case, he certainly got it. Upon landing, he was greeted by two FBI agents and two police officers, and was then interrogated for a couple of hours. Before... Read more...
To nobody's real surprise, the jailbreak community upon learning that the Apple Watch was freewheelin' it on wrists everywhere without a browser onboard set out to fill that gap. And in somewhat short order the celebrated Comex — the developer behind JailBreakMe, and a former Apple intern — has weighed in first, posting a video to Twitter over the weekend that features an Apple Watch running a Google web page via a web browser.  Comex's video makes a good case for why Apple hasn't (yet) included a version of its Safari browser in Watch OS, illustrating the need to scroll over and across vast screen real estate — relatively speaking, of course... Read more...
Lenovo said it's currently investigating a cyberattack that took the company's website down for several hours earlier this week, though it may not have to look very far. The ornery hacking group known as Lizard Squad is claiming responsibility for the security breach, purportedly as punishment for the recent Superfish scandal. Let's backtrack a quick moment. Lenovo came under fire earlier this month when it was discovered that a piece of bundled software on consumer laptops and desktops was duping security certificates in order to display ads. Called Superfish, the software is a visual search program that would otherwise be a benign, if not annoying piece of adware, except that it's method of... Read more...
Earlier this month, it was discovered that China was using man-in-the-middle (MITM) attacks against Microsoft Outlook and Mozilla Thunderbird email clients, as well as smartphone apps that use IMAP and SMTP protocols. Or did it? A spokesman for the Cyberspace Administration of China (CAC) claims the allegations that Chinese authorities hacked into Outlook are just "groundless slander." "The Chinese government is a staunch defender of the Internet's security, and resolutely opposes any form of cyberattack," the CAC said. Image Source: Flickr (Robert Scoble) Online censorship watchdog GreatFire.org pegged China's government as most likely being responsible, noting that "If our... Read more...
Hackers have posted a list containing 1,800 usernames, passwords, and email addresses belonging to Minecraft players. While that represents a small fraction of the overall number of Minecraft players, those who appear on the list are at risk of having their accounts broke into by anyone who views the list, which has been made public on Pastebin.German-language publication Heise first discovered the breach, noting that the information posted online could be used to log into the game under any of the compromised accounts. In addition to wreaking havoc with people's virtual worlds, it also allows unauthorized users to download full copies of the game, which normally sell for $26.95.In addition,... Read more...
It doesn't matter what you invent, someone will figure out a way to use it for nefarious purposes. And so it goes with the Internet, a wonderful tool for connecting the world in ways that weren't possible prior to its inception, yet it's also provided a means for cybercriminals to steal large amounts of personal data at a time. Last year was particularly brutal, with several high profile attacks taking place, and this year it looks as though hackers are trying to rise from their underground hideouts and make themselves available for mainstream hire. Hackers List, which opened in November, is one such site. It's a place where any ordinary Joe can go and hire a hacker -- white hat or black hat... Read more...
U.S. officials have long blamed North Korea for the digital attack that embarrassed Sony and nearly derailed The Interview late last year. But the idea that a tiny dictatorship could effectively censor a major movie studio in the United States hasn’t been sitting well with many. As unlikely as a successful North Korean cyberattack sounds, U.S. officials are sticking to the story and a report by The New York Times explains why they’re so sure: the National Security Agency has infiltrated North Korea’s networks for years.  The NSA’s involvement might explain why President Obama was willing weigh in on the attack, which he was careful to characterize as “an act... Read more...
An 18-year-old man living in the U.K. was picked up and arrested in Southport as part of an investigation into distributed denial of service (DDoS) attacks that brought down Sony's PlayStation Network (PSN) and Microsoft's Xbox Live service on Christmas Day. The investigation is part of a joint effort between U.K. cybercrime authorities and the U.S. Federal Bureau of Investigation (FBI).The DDoS attacks carried out by members of the hacking group Lizard Squad caused both services to be overwhelmed with online traffic, which disrupted access. Both Sony and Microsoft were forced to shut down their respective online services as they investigated the matter. Earlier this month, another member of... Read more...
An accountability board overseen by the U.S. Central Intelligence Agency (CIA) cleared the spy agency of any wrongdoing after investigating the search of Senate computers that were used to review the agency's alleged use of torture tactics during Bush's presidency period. That might be fine and dandy under different circumstance, but in this case, the review panel looking into the CIA's actions was put together by… the CIA. Conflict of interest, anyone? The board released a 38-page report in which it found that a handful of agency officials made a "mistake" by searching for files used by the Senate Intelligence Committee investigating the CIA, but that it wasn't done in "bad faith" or with the... Read more...
The unfortunate reality that we had to come to grips with in 2014 is that hackers aren't going anywhere, and if anything, they're becoming a growing nuisance. That isn't likely to change in 2015, though U.S. President Barack Obama wants to see some changes in the way security breaches are handled. One of the things he's pushing for is a requirement for companies to notify their customers within 30 days when data has been compromised.It's one of the measures included in the Personal Data Notification and Protection Act, a national standard that would require companies to be more forthcoming when customers' personal information gets stolen as the result of a hacker attack.Image Source: Flickr (Patrick... Read more...
When North Korea's laughable Internet connection went down last month, many wondered if that was the result of U.S. forces responding "proportionately" to the massive cyberattack against Sony Pictures Entertainment, just as President Barack Obama promised just days prior to the outage. North Korea certainly thought so. However, the response Obama alluded to came on Friday in the form of sanctions against the Government of the Democratic People's Republic of Korea. The Executive Order points to North Korea's "numerous provocations," and in particular the shenanigans against Sony that Obama called "cyber-vandalism," along with threats against cinemas and moviegoers, as justification for the sanctions.Image... Read more...
First ... Prev 4 5 6 7 8 Next ... Last