Can hackers get into the driver’s seat in autonomous vehicles? The short answer here is a resounding “Yes!” Just last year, researchers/hackers Charlie Miller and Chris Valasek exploited a security issue with the mobile Wi-Fi system available in some Fiat-Chrysler products: They demonstrated they could use a laptop to take control of key vehicle systems in a Jeep Cherokee. Not only were they able to change the audio volume, adjust the air conditioning, and turn on the windshield wipers, they gained control over the transmission — bringing the car to a stop on the highway.
A hacker has released a database containing around 33 million Twitter user credentials on the dark web. The nature of the data suggests Twitter itself has not been hacked. Instead, it has been assembled using malware to steal passwords.
CiCi’s Pizza may have suffered a point-of-sale (POS) breach through a third-party vendor.
The breach appears to be the result of a cybergang posing as technical support specialists for the company’s POS provider, Datapoint, to gain access to the system, according to a Krebs on Security report. Other retailers have been targeted by the same gang.
If you are a torrent lover and have registered on BitTorrent community forum website, then you may have had your personal details compromised, along with your hashed passwords.
The BitTorrent team has announced that its community forums have been hacked, which exposed private information of hundreds of thousands of its users.
The recent theft of an unencrypted laptop that may contain information on up to 400,000 inmates who served time in California prisons has been added to the federal tally of health
The incident is the third largest breach added so far this year to the Department of Health and Human Services Office for Civil Rights’ “wall of shame” tally of major health data breaches.
A group of hackers going by the handle of TeamGhostShell has leaked more than 36 million accounts/records of internal data from several vulnerable networks in order to raise awareness about the poor security infrastructure implemented on MongoDB databases by their owners.
If you have anything to hide from the internet at large — including your naked body — you might want to cover up your laptop camera.
As hacking scandals and schemes show up more and more often in the news, it can feel like there’s no real way to keep yourself safe. Luckily, when it comes to someone trying to hack your laptop camera, there’s one thing you can use that’s simple, inexpensive, FBI-approved and will do the trick completely: a piece of tape.
User accounts for dating site Badoo are being traded in the digital underground, including email address, cracked passwords, names, and dates of birth.
Paid subscription-based breach monitoring site ‘Leaked Source’ uploaded the data set on Thursday. Other sources known to Motherboard have also obtained the data.
Facebook users are copy and pasting a status about a new hack on the US social network. If you’ve spotted a security warning across your social media warning about a scammer tactic called Facebook Cloning, this is what is really going on.
Users are reporting unauthorized connections, but TeamViewer blames them for the troubles. Several TeamViewer users have reported unauthorized access over the last few days, leading some to suspect that the remote connection company has been hacked.