Skip to main content

Privacy

Trojan steals credit card data from hotel reception software

posted onApril 18, 2012
by l33tdawg

A remote access computer Trojan (RAT) designed to steal credit card details from hotel point-of-sale (PoS) applications is being sold on the underground forums, researchers from security firm Trusteer said in a blog post on Wednesday.

Trusteer security researchers found an advertisement on a black market forum for a custom RAT designed to infect hotel front desk computers and steal customer credit card and billing information.

EU cookie tracking directive deadline approaches

posted onApril 18, 2012
by l33tdawg

On the 26th May* the UK’s Information Commissioner’s Office (ICO)) will impose an EU directive designed to protect Internet users’ privacy.  As I said last year, European websites will have to police their own cookies but what about third-party cookies from advertisers? This will be more problematic to regulate under the European privacy law. The EU Internet Advertising Bureau (IAB) also wants an “icon” or “logo” on adverts that when clicked shows the data that is being transmitted. 

Drug ring exposed by 'infiltrator,' not failure of Tor system

posted onApril 18, 2012
by l33tdawg

The free proxy servers of The TOR Project protect the identities of more than just hacktivists, hackers, dissidents in authoritarian countries and office drones surfing porn. Ordinary criminals apparently use it as well.

Eight people have been arrested on three continents for what federal agents called one of the most sophisticated markets for illegal drugs on the Internet.

Android concept app siphons sensitive data

posted onApril 11, 2012
by l33tdawg

A security researcher has developed an application that demonstrates how sensitive data can be stolen from Android phones without user permission.

The application can access contents of a phone's SD card, tap into app data and upload sensitive data without requiring permissions.  Permissions were a security system on Android phones that require applications to ask users for access rights to phone contents like contacts, data and the ability to access communications.

750000 more victims in health dept data breach

posted onApril 10, 2012
by l33tdawg

An additional 750,000 people had their personal information stolen by hackers, state health officials said Monday after discovering that the thieves downloaded thousands more files of data than authorities initially believed.

Officials originally estimated that about 24,000 people had their records stolen after a computer tracked to Eastern Europe infiltrated a server beginning March 30, then changed that number to 182,000 victims. 

Facebook mobile app security hole does not require jailbreak access

posted onApril 6, 2012
by l33tdawg

Earlier today, security researcher Gareth Wright revealed the discovery of a security hole in the Facebook app running on Android and iOS mobile devices.  The simple 'hack' allows users to copy plain text configuration files off the device and thus effectively 'stealing' credentials / gaining unauthorized access to accounts on that iOS device. 

Girls Around Me App pulled for now but plans to return in the future

posted onApril 3, 2012
by l33tdawg

The company behind Girls Around Me, a controversial geo-location iPhone app, has voluntarily removed the application from the App Store but states that it plans to reintroduce the app at a future date. 

The company also says, as it has before, that it is "technically impossible to stalk, track or trace a particular person" using Girls Around Me.  The app was removed from iTunes after heavy criticism about the app's intent and Foursquare's decision to cut off access to the check-in service's data, rendering the app useless.