When it comes to identity theft, the most successful attack is on the person least likely to be aware of activity being carried out in his or her name. That being the case, it is hard to imagine anyone who better fits the bill than a child.
A new, terrifying weapon is in the hands of hackers – the ability to stop a toilet flush working. We look at 2014’s silliest hacking predictions of gadget doom.
A 19-year-old teenager in London, Ontario, Canada has become the first criminal to be arrested for exploiting the ‘Heartbleed’ bug to steal information – in this case, private information on Canadian taxpayers.
Hard drive specialist LaCie has admitted a data breach that exposed customer emails and passwords – and the attack went undetected for an entire YEAR. Potential victims have been notified, but the scale and damage of the attack are yet to be assessed.
A crude fake fingerprint molded using wood glue, and based on a photo taken by a smartphone was enough to fool the much-hyped fingerprint sensor in Samsung’s new flagship S5. Worryingly, the sensor can be used to authenticate financial transactions.
The critical security vulnerability in OpenSSL known commonly as “Heartbleed” continues to raise alarms, with websites now warning that hackers have breached their systems by exploiting the bug, and stolen personal information about users.
The full scope of the Heartbleed bug came to light in a series of reports by researchers and white-hat hackers, with some claiming a billion smartphones may be at risk, as well as a statement allegedly from the US government over its use of the bug.
Scans of a huge botnet have revealed that it has harvested at least 16 million usernames and passwords for email sites and other online services, according to a report released by German security agency, the Bundesamt für Sicherheit in der Informationstechnik (BSI).
The Heartbleed bug – a flaw in an encryption technology used to protect major websites including Yahoo – has left a huge amount of private data at risk – and internet giants are scrambling to find fixes for a problem which could leave customer data exposed to criminals.
A new technique for spotting cyber attacks has been designed by a young American student – and could prevent attacks against planes and power plants, by looking for abnormal communications within computers, rather than sifting for malicious software.
A competitor in an Australian triathlon was hospitalized with injuries and “pieces of propeller in her head” after a drone plunged from the sky, causing head injuries. The competitor, Raija Ogden was treated by paramedics at the scene after the UAV (Unmanned Aerial Vehicle) suddenly plunged from the sky, hitting her on the head. The
Armed with an impressive-looking shield logo, security app Virus Shield shot to the top of the sales charts on Android last week. There was one, tiny, problem: the app was a fake.
You may know it by one of many names: EMV, Integrated Chip Cards, or more simply Chip & Pin or Smart Cards… but whatever you call it: it is a hot topic for debate on the subject of credit card fraud. In this post we will explain the difference between these and traditional credit cards, and why it is being discussed so heatedly in the wake of the Target breach.
Apps designed to ‘report’ on handset users’ communications while remaining undetected have increasingly become a factor in cases of domestic violence and even murder.
Malware written specifically for DVR recorders used for the output of surveillance cameras has forced some machines to mine Bitcoin – although the low-powered machines are ‘very bad’ miners, Wired points out.
An attack on the forums for the Boxee internet-TV service has yielded 158,000 customer passwords – and what appears to be email addresses and full messaging histories for the victims.
Will the future be a murderous game of ‘smart device’ Cluedo, where Colonel Mustard meets his death at the hands of a Wi-Fi pacemaker, and Miss Scarlett is consumed in a Smart Home-ignited blaze. Not likely, says David Harley – where’s the profit motive?
Hackers could take control of Philips ‘smart TVs’ and broadcast their own ‘shows’ to watching famlies, thanks to a ‘fixed’ password which allows nearby attackers easy access to the set’s Wi-Fi adapter.
Bitcoin’s developers have released a new version of the software, which includes a long-awaited fix for the “transaction malleability” bug which is said to have brought down the Mt Gox exchange – and Mt Gox staff have ‘found’ 200,000 BTC in an abandoned wallet in the exchange.
The Target breach, and in particular the role of respected security blogger Brian Krebs in breaking the story, has been optioned as a feature film by Sony. The studio bought the rights to the New York Times article, “Reporting From the Web’s Underbelly,” with a view to creating a “cyber thriller.”