Steps to Protect Yourself Post Equifax Breach

Equifax has suffered one of the largest data breaches in history that has left highly sensitive data of as many as 143 million people—that’s nearly half of the US population—in the hands of hackers. Find some helpful tips and steps on what you should take to protect yourself below.

Based on the company’s investigation, some unknown hackers managed to exploit a security flaw on the Equifax website and gained unauthorized access to certain files between mid-May and July 2017.

The information accessed primarily include full names, birth dates, Social Security numbers, addresses and, in some cases, driver’s license numbers—most of the information that’s banks, insurance companies, and other businesses use to confirm a consumer identity.
Continue Reading…

Huge Equifax Hack Exposes Half the Country

It’s ironic—the company that offers credit monitoring and ID theft protection solutions has itself been compromised, exposing personal information of as many as 143 million Americans—that’s almost half the country.

Equifax, one of the three largest credit reporting firm in the United States, admitted today that it had suffered a massive data breach somewhere between mid-May and July this year, which it actually discovered on July 29—that means the data of 143 million people were exposed for over 3 months.

Continue Reading…

Instagram Suffers High-Profile User Data Breach

Instagram has recently suffered a possibly serious data breach with hackers gaining access to the phone numbers and email addresses for many “high-profile” users.

The 700 million-user-strong, Facebook-owned photo sharing service has currently notified all of its verified users that an unknown hacker has accessed some of their profile data, including email addresses and phone numbers, using a bug in Instagram.
Continue Reading…

SpamBot Server Easily Accessible Online

A massive database of 630 million email addresses used by a spambot to send large amounts of spam has been published online in what appears to be one of the biggest data dumps of its kind.

A French security researcher, who uses online handle Benkow, has spotted the database on an“open and accessible” server containing a vast amount of email addresses, along with millions of SMTP credentials from around the world.
Continue Reading…

Android Apps Found Spying on Users

Over 500 different Android apps that have been downloaded more than 100 million times from the official Google Play Store found to be infected with a malicious ad library that secretly distributes spyware to users and can perform dangerous operations.

Since 90% of Android apps are free to download from Google Play Store, advertising is a key revenue source for app developers. For this, they integrate Android SDK Ads library in their apps, which usually does not affect an app’s core functionality.
Continue Reading…

Modern Cars Allow Hackers to Disable Safety Features

Today, many automobiles companies are offering vehicles that run on the mostly drive-by-wire system, which means a majority of modern car’s functions—from instrument cluster to steering, brakes, and accelerator—are electronically controlled.

No doubt these auto-control systems make your driving experience much better, but at the same time, they also increase the risk of getting hacked.

Car Hacking is a hot topic, though it is not new for security researchers who hack cars. A few of them have already demonstrated how to hijack a car remotely, how to disable car’s crucial functions like airbags, and even how to remotely steal cars.
Continue Reading…

Leaked: CIA can Secretly Spy on Video Streams

After disclosing CIA’s strategies to hijack and manipulate webcams and microphones to corrupt or delete recordings, WikiLeaks has now published another Vault 7 leak, revealing CIA’s ability to spy on video streams remotely in real-time, dubbed ‘CouchPotato.’

The document leaked from the CIA details how the CIA agents use a remote tool to stealthy collect RTSP/H.264 video streams.
Continue Reading…

New Bill Seeks Basic IoT Security Standards

Lawmakers in the U.S. Senate today introduced a bill that would set baseline security standards for the government’s purchase and use of a broad range of Internet-connected devices, including computers, routers and security cameras. The legislation, which also seeks to remedy some widely-perceived shortcomings in existing cybercrime law, was developed in direct response to a series of massive cyber attacks in 2016 that were fueled for the most part by poorly-secured “Internet of Things” (IoT) devices.Continue Reading…

Attacks by CopyKittens Hackers Unvailed

Security researchers have discovered a new, massive cyber espionage campaign that mainly targets people working in government, defense and academic organizations in various countries.

The campaign is being conducted by an Iran-linked threat group, whose activities, attack methods, and targets have been released in a joint, detailed report published by researchers at Trend Micro and Israeli firm ClearSky.
Continue Reading…

Page 19 of 70« First...10...1718192021...304050...Last »