Magecart strikes again! These hackers injected credit card skimmers on about 17,000 websites since April, due to misconfigured Amazon S3 buckets.Continue Reading…
Emergency Text Alerts Can Be Hijacked and Weaponized
Can you trust emergency text alerts you receive? Security experts revealed how simple it is to hijack the Broadcast Emergency Response and send out fraud messages.Continue Reading…
Ticketfly Has Been Offline For Days – 26 Million Customers Data Possibly Breached and Exposed
Event-ticketing company Ticketfly was still working to get back online Sunday, four days after a hacker reportedly hijacked the site and stole data from more than 26 million customers.Continue Reading…
A Hacker’s Next Target Is Just A Web Search Away
“Google dorking.” It sounds goofy, but it could be just the ticket for a hacker looking to stir mayhem. The search technique is one of several methods that bad guys can use to find vulnerable computer systems and trace them to a specific place on the Internet. All they have to do is type in the right search terms, and they’re well on their way.
John McAfee on His FBI iPhone Hack Offer
Here’s one that will be of interest to anyone that cares about computer security. Maximum PC recently spoke to John McAfee, the antivirus creator who became infamous a few years ago for his adventures in Belize, about his recent offer to help the FBI break into the iPhone owned by the San Bernadino shooter. McAfee hopes that by hacking the phone himself, Apple will no longer be compelled to create a backdoor.