Skip to main content

Security

Alleged ISIS leak compromises hundreds of U.S. military & intelligence emails — Dept of Defense is ‘looking into it’

posted onAugust 12, 2015
by l33tdawg
Credit:

A Twitter account claiming to be the “IS Hacking Division” has published what appears to be an extensive directory of government emails, passwords, credit cards, phone numbers, and addresses spanning U.S. military departments and divisions, the FBI, U.S. embassies, the Library of Congress, U.S. city officials, the British Embassy, the FTC, and NASA, as well as possible personnel at Wells Fargo.

Tech Firm Ubiquiti Suffers $46M Cyberheist

posted onAugust 11, 2015
by l33tdawg
Credit:

Networking firm Ubiquiti Networks Inc. disclosed this week that cyber thieves recently stole $46.7 million using an increasingly common scam in which crooks spoof communications from executives at the victim firm in a bid to initiate unauthorized international wire transfers.

Cyber attack on Carphone Warehouse results in breach of customer data

posted onAugust 10, 2015
by l33tdawg
Credit:

Carphone Warehouse has revealed that a recent cyber attack on its servers might have led to the breach of customer details including credit card information.

Dixons Carphone is heading to the US soon, but its business in the UK has just been rocked by a cyber attack affecting millions. The company has apologized for the security lapse and has started notifying customers who might have been affected by the attack, which is said to have took place on the 5th of August.

Tesla hackers explain how they did it

posted onAugust 10, 2015
by l33tdawg
Credit:

 It is very difficult and to hack a Tesla Model S, but it's not impossible. Last week, researchers Kevin Mahaffey and Marc Rogers demonstrated that they were able to remotely unlock the Model S' doors, start the vehicle and drive away. They were also able to issue a "kill" command to a Model S to shut down the vehicle's systems, bringing it to a stop. Then, at this weekend's the DEF CON 23 digital security conference, they showed all in attendance how they did it.

Biometric Security: From Selfies To Walking Gaits

posted onAugust 10, 2015
by l33tdawg
Credit:

The payments industry, facing the risk of increasingly sophisticated cyber-attacks and various types of credit card fraud, has begun incorporating various types of biometric technology to enhance security and prevent breaches.

As recently reported, MasterCard is launching a facial recognition payment service based on “selfies” taken on a smartphone. This new technology features a photo scanner that creates a map of the shopper’s face, which is then translated into a code for confirmation of future payments.

Old Intel chips are vulnerable to a fresh security exploit

posted onAugust 10, 2015
by l33tdawg
Credit:

A design flaw in the x86 processor architecture dating back almost two decades could allow attackers to install a rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products.

The vulnerability stems from a feature first added to the x86 architecture in 1997. It was disclosed Thursday at the Black Hat security conference by Christopher Domas, a security researcher with the Battelle Memorial Institute.
ADVERTISING

Microsoft Boosts Bug Bounty to $100K

posted onAugust 7, 2015
by l33tdawg
Credit:

If you're a fan of hacking Microsoft's systems, then the company is going to reward you even more for your efforts.

No, Microsoft isn't masochistic. In actuality, its bug bounty program is designed to help the company address critical vulnerabilities and reward those who tinker with Microsoft's systems and services to find them. The goal, as with so many other bug bounty programs, is to give creative exploiters something for their efforts and to discourage them from releasing the results of their hacking to the larger underground communities and/or general public.

Russian hackers accessed Pentagon's unclassified email system

posted onAugust 7, 2015
by l33tdawg
Credit:

Russian hackers allegedly accessed the Pentagon's Joint Staff unclassified email system, which led the agency to take the service offline for nearly two weeks.

NBC News reported, through anonymous sources, that the “sophisticated cyber intrusion” occurred around July 25 and affected nearly 4,000 military and civilian personnel who work for the Joint Chiefs of Staff. The cyber attack apparently relied on an automated system that could quickly gather large amounts of data and distribute it to thousands of online accounts. The entire process could last only a minute.

Google, Samsung to issue monthly Android security fixes

posted onAugust 7, 2015
by l33tdawg
Credit:

Google Inc and Samsung Electronics Co will release monthly security fixes for Android phones, a growing target for hackers, after the disclosure of a bug designed to attack the world's most popular mobile operating system.

The change came after security researcher Joshua Drake unveiled what he called Stagefright, hacking software that allows attackers to send a special multimedia message to an Android phone and access sensitive content even if the message is unopened.

Design flaw in Intel chips opens door to rootkits

posted onAugust 7, 2015
by l33tdawg
Credit:

A design flaw in the x86 processor architecture dating back almost two decades could allow attackers to install a rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products.

The vulnerability stems from a feature first added to the x86 architecture in 1997. It was disclosed Thursday at the Black Hat security conference by Christopher Domas, a security researcher with the Battelle Memorial Institute.