The key to beating hackers might not just lie in stronger security measures and ‘unbreakable’ passwords. Now, it seems like an element of trickery is required – almost beating hackers at their own game. Two independent security researchers have developed a system which they call ‘Honey Encryption’, which promises to make it harder for hackers
The FBI has announced the arrest and charge of Alexsandr Panin, 24, a Russian hacker who developed the SpyEye trojan and used it to steal financial information and money from around the world.
Facebook has given out a record fee for bug discovery, after a Brazilian security researcher exposed a vulnerability that could have been used to deliver malware to millions of Facebook users.
Baby monitors which shipped with security flaws that allowed hackers to watch and listen to babies from remote locations have led to an FTC complaint against the company responsible, Trendnet.
Internet users are becoming more savvy about keeping their private data safe – but many have already fallen victim to crime and scams, a study by the Pew Research Institute’s Internet Project has found. One in five (21%) of internet users have had an email or social networking account compromised or taken over without their permission.
A hacker has used Facebook’s Graph Search to find and list telephone numbers for thousands of Facebook users without their knowledge.
Malicious spam may still be spreading across Yahoo! Mail accounts. We show you how to turn on the added verification process that Yahoo! offers.
The Associated Press reports that celebrities, including ashton Kutcher and Kim Kardashian, along with top government officials have had private financial information stolen and posted to a rogue website.
Several email accounts belonging to family members of former President George W. Bush were hacked and the contents made public, exposing private data, correspondence and personal photos, according to The Smoking Gun. The apparent hack affected email threads between several members of the Bush family, including both former U.S. Presidents. According to the report, the
According to the Deloitte Technology Trends 2013 report more than 90 per cent of user-generated passwords are weak and vulnerable to hacking, including those considered strong by IT departments.
An attack on the Australian Defence Force Academy servers held at the University of New South Wales (UNSW) resulted in the loss of 20,000 user records. According to a report in the Sydney Morning Herald the hacker, known as Darwinare, managed to break in and steal the records, including passwords and email addresses in a
Want to be safer online using your laptop or tablet when using public Wi-Fi? You can. Here are our five essential tips. 1 First, if you are not going to use the Internet it’s a good idea to turn off Wi-Fi connectivity completely on your laptop, smartphone or tablet. You are then guaranteed that your
Sharing details of the hack that “wiped his life” has earned Mat Honan a place in the annals of information system security; the specific inter-dependence of flawed authentication systems that cost him so dearly–encompassing Apple, iCloud, Amazon.com, Gmail and more–would probably still exist if Mat had not gone public. Wired has the full story here
For years scammers and hackers focused largely on Windows x86-based platforms, in many ways because that’s where the bulk of the users were. But times change, and new targets emerge. At Blackhat and Defcon last week we saw a flurry of talks on Mac OSX/iOS security, trying to illuminate possible chinks in the armor. From
Gamigo learned a few months ago about a breach and alerted its users that they had been attacked. But now, we see an estimated 8+ million records just went public, no small amount for the attackers. What is interesting is that by one account, hash cracking was able to decrypt over 90% of the passwords,