Each year, hundreds of hackers gather in computer labs around the world. Their goal? Like any other hackers, their goal is to manually exploit application and network level flaws in servers across the globe. If it sounds malicious, it’s just because it mimics real world vulnerability exploitations that happen every day. In fact, this specific
With big name brands like Target and Neiman Marcus getting hit left and right these days, it would be easy to make the assumption that hackers are mostly interested in hacking the big guys, especially with further breached retailers soon to be named. It simply is not the case. Small and medium sized businesses still
Virtual Reality, Meet Hard Reality: The World of Warcraft Crackdown & What It Could Mean For Cybercrime in China
Last week in the Zhejiang province of China, 10 men were sentenced to prison terms of up to two years for accessing over 11,500 World of Warcraft accounts. The men didn’t hack into the accounts, but instead bought the login details for the accounts on the black market, then sold each player’s gear and accumulated
Hundreds of owners of the cryptocurrency Dogecoin awoke on Christmas to a not-so-cheery discovery: their digital wallets had been cleared out. Someone has stolen at least 30 million Dogecoin from Dogewallet.com, one of the largest sites being used to hold Dogecoins. The discovery came after Dogecoin forum users began posting complaints that their funds were
Target’s famous bullseye logo attracted some malicious arrows over the holiday shopping season as the national retail chain was the target of a major data breach that may be much more serious than first thought as details emerge. The data breach will potentially affect hundreds of thousands, perhaps millions, of Target customers that shopped in-store
Mobile malware has come a long way in recent years. The latest exploit was exposed this week when the popular “Balloon Pop 2”, played and enjoyed by thousands of Android users, was found to contain a malicious code that enabled eavesdropping on WhatsApp conversations. Google has taken the game off its Play Store app market.
The UCSB hosted yet another mega-contest featuring the best hacking minds in the world. Pizza, coffee and laptops were found in abundance on the premises last weekend, as young minds from over 40 countries did battle for the bragging rights and a $1,024 bounty.
Air-Gap Jumping Communication. Networkless hacking. Sci-fi movie themes are now turning into reality. German researchers Michael Hanspach and Michael Goetz have created what can potentially become the driving force behind the next-gen malware. Security experts be warned – offline computing is not going to be safe for long.
Some two million accounts on several of the most widely visited social media networks, email providers and websites were just discovered on a server with a bogus IP in the Netherlands. Hackers stole login usernames and passwords for Facebook, LinkedIn, Google, Twitter and various other popular sites.
The list of hacked websites just keeps getting longer. The Istana website, official cyber-domain of Singapore’s Presidential Office, is the latest high-profile casualty. The Singaporean police have arrested two suspects, who have been charged under the Computer Misuse and Cybersecurity Act, punishable by up to five years in prison.