Skip to main content

Security

NSA hacked? Top cyber weapons allegedly go up for auction

posted onAugust 15, 2016
by l33tdawg

An anonymous group claims to have stolen hacking tools that might belong to the National Security Agency and is auctioning them off to the highest bidder.

It’s a pretty bold claim, but the hackers have offered sample files, and some security researchers say they appear to contain legitimate exploits.

Watch Out for Malicious Mirrors of KickassTorrents

posted onAugust 15, 2016
by l33tdawg

Anxiously awaiting the return of Kickass Torrents? Beware malicious mirrors.

As Torrent Freak notes, popular clone KAT.am has resurfaced after being yanked by Hollywood studios. But you might want to avoid it; the site wants to steal your banking info, not serve you pirated content. It asks users trying to download content to sign up for a "free account" that requires credit card information.

CyanogenMod 13 gets security, feature updates

posted onAugust 15, 2016
by l33tdawg

The developers of CyanogenMod have released a new stable build of their operating system for dozens of phones and tablets. CyanogenMod is an open source operating system based on Google Android. It can be installed on a wide range of phones, tablets, and other devices as a replacement for the operating system that came with your device.

The next world war is going to be fueled by state-sponsored hacking

posted onAugust 15, 2016
by l33tdawg

Battles in the next world war will be fought in the air, on the ground, and online.

“We’ve grown used to the fight being in just one domain,” Dr. Peter Singer, a strategist at the think tank New America and coauthor of “Ghost Fleet,” told Business Insider. “[But] we have these new domains that we’ve never fought in before, and that’s outer space, and cyber space.”

Hackers Claim to Auction Data They Stole From NSA-Linked Spies

posted onAugust 15, 2016
by l33tdawg

The NSA’s elite teams of hackers have for years made it their mission to silently compromise computer systems around the globe. Now one group of anonymous hackers claims to have executed a counter-hack with none of the same discretion: They’ve brazenly announced the theft of a collection of files they say belonged to an NSA-linked spy group. And they’re auctioning those files off to the highest bidder.

Linux bug leaves 1.4 billion Android users vulnerable to hijacking attacks

posted onAugust 15, 2016
by l33tdawg

An estimated 80 percent of Android phones contain a recently discovered vulnerability that allows attackers to terminate connections and, if the connections aren't encrypted, inject malicious code or content into the parties' communications, researchers from mobile security firm Lookout said Monday.

The World Series of Hacking—without humans

posted onAugust 15, 2016
by l33tdawg

On a raised floor in a ballroom at the Paris Hotel, seven competitors stood silently. These combatants had fought since 9:00am, and nearly $4 million in prize money loomed over all the proceedings. Now some 10 hours later, their final rounds were being accompanied by all the play-by-play and color commentary you'd expect from an episode of American Ninja Warrior. Yet, no one in the competition showed signs of nerves.

Hackers can steal data via the sounds of a hard drive

posted onAugust 15, 2016
by l33tdawg

Just about anytime you think you and your computer are safe from hackers and security weaknesses, some bizarre, unexpected method or flaw gets discovered. Case in point: security researchers have come up with a way to steal data from a computer's hard drive just by listening to the sounds it makes. Not only can information be transmitted without a users' knowledge, but their computer doesn't even need to be connected to the internet.

Starwood, Marriott, Hyatt, IHG hit by malware

posted onAugust 15, 2016
by l33tdawg

A data breach at 20 U.S. hotels operated by HEI Hotels & Resorts for Starwood, Marriott, Hyatt and Intercontinental may have divulged payment card data from tens of thousands of food, drink and other transactions, HEI said on Sunday.

The breach follows similar attacks at Hyatt Hotels Corp and Starwood Hotels & Resorts Worldwide Inc in recent months.

How to protect yourself from mobile ID theft

posted onAugust 15, 2016
by l33tdawg

The deadly pairing of identity theft and identity fraud has been around since time immemorial. Personal details are stolen by a criminal (theft) and used in illicit activity (fraud).

While this kind of social engineering strategy isn't new, an emerging form of ID theft has recently surfaced over in the States - involving your mobile phones. First, we're going to look at a real-world "mobile ID theft" case study, before discussing what you can do to stay safe from this type of threat.