Skip to main content

Security

Apple: Macs and iPhones are safe from newly revealed CIA exploits

posted onMarch 27, 2017
by l33tdawg

The Mac and iPhone exploits described in new documents attributed to the U.S. Central Intelligence Agency were patched years ago, according to Apple.

WikiLeaks released a new set of files Thursday that supposedly came from the CIA. They contain details about the agency’s alleged malware and attack capabilities against iPhones and Mac computers.

How to Protect Your iCloud Account, Juuust in Case Those Hackers Aren’t Joking

posted onMarch 27, 2017
by l33tdawg

A hacker group called Turkish Crime Family says that it can access 250 million iCloud accounts, and will do so on April 7 to reset the password, locking people out of their accounts. They’ve even threatened to wipe people’s linked iPhones if Apple doesn’t pay up. And while it’s hard to tell how legitimate the threat is, their assertions make now as good a time to lock down your iCloud as ever.

WikiLeaks Reveals How the CIA Can Hack a Mac’s Hidden Code

posted onMarch 24, 2017
by l33tdawg

If the CIA wants inside your Mac, it may not be enough that you so carefully avoided those infected email attachments or maliciously crafted web sites designed to plant spyware on your machine. Based on new documents in WikiLeaks’ ongoing release of CIA hacking secrets, if Langley’s hackers got physical access, they still could have infected the deepest, most hidden recesses of your laptop.

McDonald's urges users in India to update app as 2.2 million allegedly affected by data leak

posted onMarch 20, 2017
by l33tdawg

McDonald's has urged users to the McDelivery app in India to update it after an independent security firm alleged that personal and sensitive data of around 2.2 million users was being leaked. The fast food giant tweeted a statement on Sunday (18 March) and said, "...our website and app does not store any sensitive financial data of the users like credit card details, wallets passwords or bank account information."

Ubiquiti called out for security flaw

posted onMarch 20, 2017
by l33tdawg

When it comes to evaluating networking devices (routers, Access Points, switches), almost everyone focuses on the hardware. Not me. My RouterSecurity.org site is devoted to software.

But, there is yet another crucial aspect to evaluating devices - the personality of the company behind it. Specifically, how it reacts to the inevitable software flaws.

Adobe Reader, Edge, Safari, and Ubuntu fall during first day at Pwn2Own

posted onMarch 17, 2017
by l33tdawg

 Bug hunters have gathered again to test their skills against some of the most popular and mature software programs during the Pwn2Own hacking contest. During the first day, they successfully demonstrated exploits against Microsoft Edge, Apple’s Safari, Adobe Reader, and Ubuntu Desktop.

The Pwn2Own contest runs every year during the CanSecWest security conference in Vancouver, Canada. It’s organized and sponsored by the Zero Day Initiative (ZDI), an exploit acquisition program operated by Trend Micro after its acquisition of TippingPoint.

Switch console flaw leaves Nintendo looking flat-footed

posted onMarch 17, 2017
by l33tdawg

Barely two weeks after going on sale, someone has hacked the Nintendo Switch console using an old Apple iOS flaw in a browser that’s not officially supposed to be on the machine.

Welcome to the odd universe of console hacking, by which we mean either jailbreaking or, failing that, making the machine do something interesting nobody knew was possible. For each new console these days, the story always starts as a race to be the first to find a way in.

Intel Security releases MacBook scanner for CIA Vault 7 rootkits

posted onMarch 13, 2017
by l33tdawg

We’re just a few days removed from the WikiLeaks publication, Vault 7, that outlined many of the supposed hacking tools at the disposal of the CIA. It has left tech firms scrambling for fixes and has raised questions over what products and services are most at risk, especially as the dust and sensationalism settles around just what kind of powers the CIA wielded with these so-called cyber weapons.

The Easiest Way To Protect Your Devices From Hacks? Keep Them Updated

posted onMarch 13, 2017
by l33tdawg

This week’s WikiLeaks revelations, which showed that the CIA can compromise a huge range of devices, shouldn’t send you into paroxysms of fear over your smartphone. It should, though, be a solid reminder that one of the best ways to keep yourself safe from hackers is also one of the simplest: Update your gear.

Chrome extension brings encryption to Gmail

posted onFebruary 27, 2017
by l33tdawg

The security and privacy community was abuzz over the weekend after Google said it was open-sourcing E2Email, a Chrome plugin designed to ease the implementation and use of encrypted email. While this is welcome news, the project won't go anywhere if someone doesn't step up and take ownership of it.