by Dave Johnson, How-To Geek
When Sandra Bullock starred in The Net in 1995, identity theft seemed new and unbelievable. But the world has changed. Starting in 2017, nearly 17 million Americans are victims of identity fraud every year. Continue reading How to Protect Your Identity Online
by Lorenzo Franceschi-Bicchierai, Vice
Citizen Lab details new hacking campaigns against high-profile Tibetans using iPhones and Android smartphones.
Hackers tried to break into the iPhones and Android devices of several Tibetans, some working for the office of the Dalai Lama, the Central Tibetan Administration, and the Tibetan parliament, according to a new report.
Continue reading Hackers Tried to Compromise Phones of Tibetans Working for Dalai Lama
by Simon Batt, MakeUseOf
With so many users making the jump to internet banking, it’s no wonder that hackers are on the hunt for login details. What may be surprising, however, are the lengths that hackers go to in order to access your finances.
Continue reading 5 Methods Hackers Use to Break Into Your Bank Account
by Robert Hackett, Fortune
Researchers have long bemoaned the insecurity of certain “security” cameras. Ostensibly installed to deter and thwart intruders, many actually can be transformed into an arsenal that hackers use for Web warfare.
Continue reading ‘Security’ Cameras Are Dry Powder for Hackers. Here’s Why
by Tom Warren, The Verge
Cortana on the lock screen has some security exploits.
Microsoft has issued a Windows 10 security update to prevent hackers from breaking into PCs using Cortana. Microsoft’s digital assistant is built into every version of Windows 10, McAfee security researchers discovered it could be summoned from a lock screen to execute malicious software. Any potential hacker would need physical access to a PC, and McAfee details methods to get the digital assistant to index files from a USB drive and execute them.
Continue reading Hackers can summon Cortana to break into Windows 10 PCs
by Andy Meek, BGR
In yet another sign of the mobile-first world we live in, even muggings and robberies are starting to take on a tech-savvy flair. As was the case during one 2017 incident in Washington DC, for example, when a woman was leaving a metro station and a teenager got the drop on her, grabbing her around the neck. He instructed her to keep quiet. And to delete her iCloud. Then he grabbed her iPhone 6S and took off.
Continue reading Thieves and hackers are getting better at bypassing iCloud to unlock iPhones
by Catalin Cimpanu, ZDNet
The two hacker groups suspected of stealing around $1 billion worth of cryptocurrency.
Two hacker groups are behind 60% of all publicly reported cryptocurrency exchange hacks and are believed to have stolen around $1 billion worth of cryptocurrency, according to a report published last week by blockchain analysis firm Chainalysis.
Continue reading Two hacker groups responsible for 60 percent of all publicly reported hacks
by Zack Whittaker, TechCrunch
There’s a lot you can make with a 3D printer: prosthetics, corneas, firearms — even an Olympic-standard luge.
You can even 3D-print a life-size replica of a human head — and not just for Hollywood. Forbes reporter Thomas Brewster commissioned a 3D-printed model of his own head to test the face unlocking systemson a range of phones — four Android models and an iPhone X.
Continue reading 3D-printed heads let hackers – and cops – unlock your phone
by Sead Fadilpasic, betanews
Carbanak, a powerful cyber-crime group, is using certain Google services as command and control for its malware and other malicious elements. The news was released by cybersecurity firm Forcepoint this week.
Forcepoint uncovered a trojanized RTF document, which, once ran, will “send and receive commands to and from Google Apps Script, Google Sheets, and Google Forms services.” Continue reading Hacking group uses Google services to control malware
by Peter Sayer, ComputerWorld
Armed with a card number, researchers tricked websites into helping them guess the expiry date and CVV
Add credit card fraud to the list of things that distributed processing can speed up.
An e-commerce site will typically block a credit card number after 10 or 20 failed attempts to enter the corresponding expiry date and CVV (card verification value), making life difficult for fraudsters who don’t have a full set of credentials. Continue reading ‘Distributed guessing’ attack lets hackers verify Visa card details