The massive leak attributed to the hackers who rooted to the Ashley Madison dating website for cheaters has been confirmed to be genuine. As if that wasn't bad enough, the 10 gigabytes of data—compressed, no less—is far more wide-ranging than almost anyone could have imagined.
Mobile phone users are at risk from a signalling flaw that allows hackers to intercept all voice calls and track locations.
Australian TV programme 60 minutes is claiming the scoop, showing in a special report how hackers were able to record the mobile phone conversations of a prominent politician and track his movements from a base thousands of miles away in Germany.
Hackers who stole millions of customer records from affair-inciting site Ashley Madison have posted the data online.
It comes almost exactly a month after hackers, dubbed Impact Team, claimed to have breached the company's systems, pilfering as many as 37 million customer records. They then threatened to release the files online.
Just days after patching the DYLD_PRINT_TO_FILE vulnerability with a new OS X point release, Apple's desktop operating system has been hit with yet another zero-day exploit that would allow an attacker to gain root access without using a password.
The exploit was discovered by Italian developer Luca Todesco, who relies on a combination of attacks — including a null pointer dereference in OS X's IOKit — to drop a proof-of-concept payload into a root shell. It affects every version of OS X Yosemite, but seems to have been mitigated in OS X El Capitan, which is nearing release.
Many people rely on security questions like "What's your mother's maiden name?" to protect their personal information online, but hackers are getting better at finding the answers.
Case in point: the hackers who raided US Government's Internal Revenue Service data systems. Those attackers were much more successful at answering security questions than previously known, the government agency announced Monday, underscoring the dangers of using simple security to protect valuable data.