by Catalin Cimpanu, ZDNet
The two hacker groups suspected of stealing around $1 billion worth of cryptocurrency.
Two hacker groups are behind 60% of all publicly reported cryptocurrency exchange hacks and are believed to have stolen around $1 billion worth of cryptocurrency, according to a report published last week by blockchain analysis firm Chainalysis.
Continue reading Two hacker groups responsible for 60 percent of all publicly reported hacks
As far as you are always online, you are vulnerable to being hacked. So, oftentimes than not, it is never simple to decide if your computer has been hacked. This is because hackers have developed subtle ways to quietly access your network without you suspecting anything. Continue reading 5 signs your computer network has been hacked
by Lorenzo Franceschi-Bicchierai, Motherboard
One of the hackers who amassed a new massive army of zombie internet-connected devices that can launch disruptive cyber-attacks—even by mistake—now claims to have taken control of 3.2 million home routers, taking advantage of a flaw that allowed anyone to connect to them. Continue reading Hacker Claims To Push Malicious Firmware Update to 3.2 Million Home Routers
by Darlene Storm, ComputerWorld
Samy Kamkar’s PoisonTap can leave a remotely accessible backdoor on your computer and router.
If you lock your computer and walk away, it takes only 30 seconds for a hacker armed with a small $5 Raspberry Pi Zero, which is loaded with devious code, to completely pwn your password-protected computer and install remotely accessible backdoors.
PoisonTap, the latest creation of hacker and developer Samy Kamkar, has a long list of wicked slick capabilities, including the fact that after an attacker removes the device from a USB port, a backdoor and remote access will persist on both your computer and your router. Continue reading Hacker can backdoor your computer and router in 30 seconds with $5 PoisonTap device
by Mark Wilson, betanews
A student and security researcher from Pakistan has found a serious issue with Gmail that makes it possible for a hacker to take over any email address.
The vulnerability relates to the way Google handles the linking of a primary Gmail account to another email address for the purposes of message forwarding. In just a few steps it was — before Google fixed the problem — possible to take over ownership of an email address by tricking the system into sending out the necessary verification code. Continue reading Hacker discovers Gmail vulnerability that leaves any account open to compromise