Last week in the Zhejiang province of China, 10 men were sentenced to prison terms of up to two years for accessing over 11,500 World of Warcraft accounts. The men didn’t hack into the accounts, but instead bought the login details for the accounts on the black market, then sold each player’s gear and accumulated
Two-Step Security is the latest weapon in the battle against cybercrime. More and more major websites are adopting the Double Verification technique to deter hackers from stealing personal data and information. But there is bad news – this method will be rendered ineffective or even useless in 2014.
Christmas week did not exactly bring out the best in some this year – especially when it came to breaches and vulnerabilities. Between Target’s mess of 40M customer records breached, Snapchat’s security fail, Samsung’s vulnerability and Dogecoin’s first hack on Christmas Day, the last full week of 2013 was not Application Security’s best. Let’s take
Three Israeli banks recently received an anonymous message, claiming that more than 3 million of their customer’s account details have been stolen. But gone are the days of unmarked bills. The hacker is expecting a huge Bitcoin payoff by next week. The clock is now ticking. The involved banks are Israel Discount Bank, First International Bank
Hundreds of owners of the cryptocurrency Dogecoin awoke on Christmas to a not-so-cheery discovery: their digital wallets had been cleared out. Someone has stolen at least 30 million Dogecoin from Dogewallet.com, one of the largest sites being used to hold Dogecoins. The discovery came after Dogecoin forum users began posting complaints that their funds were
There was a time when hacking involved only stolen data and information. But intruders are always looking for new ways to invade your privacy. The latest trend in the hacking circles involves the enabling of Apple’s MacBook iSight camera while the indicator light is still off, capturing stills without the victim’s knowledge.
“Can machines think?” Or “can machines do what we (as thinking entities) can do?” Eerie questions to ponder, especially in these tech-forward days with drones that hack other drones mid-air, robots that move like animals, and whatever new thing Apple comes out with. But it’s a question that was first posed to the world 77
The Galaxy S4, Samsung’s flagship device of 2013, is selling like hotcakes. The Korean giant has shipped over 40 million units in less than seven months. But not all has been rosy in recent weeks. The S4 has a serious security glitch, exposing all Samsung Account details and giving sniffers full access to private information.
If we’re measuring it in cyber-drama, it’s certainly a holiday season to remember! The past week saw what is potentially the most damaging data breach of 2013 with over 40 million Target customers at risk of credit fraud. On top of that, a major media site got hit for the third time in the same
The Technion has been Israel’s leading engineering institute for decades, providing the nation’s booming IT industry with great talent. This week the university’s Department of Computer Science hosted a unique “Start-Up Day”, sponsored by Checkmarx and six other software companies. The Checkmarx delegation was led by the company’s CTO, Mati Siman. Besides engaging in chats