Data Security: Hot Stories

Search Result for Hacker in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field

 

 Search Result for Hacker in All Fields - Top 20 Stories
Parler accuses Amazon of giving a green light to hackers to attack its data centers
This story tells a different sort of cyber security. Does Amazon have links with hackers or hackers who work for FBI? Amazon did not immediately respond to a request for comment. Whatever the answer is? If the common users' data and privacy have to be traded off for some unknown thing, they at least should get an explanation or excuse. Parler or Amazon, a very ugly cyber security case...
By Ryan Lovelace  View Source  
Ransomware Maze Has Started Leaking Pensacola Data
The government of the city of Pensacola, Florida has become a new victim of the Maze ransomware over one month. The hackers who are asking 1 million USD start releasing files. Now a 2 GB archive was uploaded to a public website, which is believed just 6% of the total hijacked data. Pensacola knows the increasing the pressure, but it has to face a data leaking threat just after a ransom disaster...
By Lee Mathews  View Source  
Disqus & Kickstarter Hacker Tells How to Against Password Reuse
After any data breached, they will be traded quickly in dark web or even public domain, and are available to cybercriminals all over the world. These privacy data are organized records to sell, showing passwords, email, name, address, and etc. It any victim reuses the same password, he or she will become a potential target. The past hacker is telling how the attacks take place...
By Catalin Cimpanu  View Source  
100 Million Capital One Credit Card Data Are Leaked
How much personal data can stop a hacker's digging? A hacker stole more than 100 million Capital One customers' data. Paige Thompson is accused of breaking into a Capital One server and getting 1 million Canadian Social Insurance numbers, one-third of the total Canada people, and 80,000 bank account numbers, in addition to people's names, addresses, credit scores, credit limits. It is just disclosed by related banks and the US Department of Justice, is the latest and one of the largest data leakage cases.
By Rob McLean  View Source  
Think before Bite: Phishing Targets Amazon Customers Ahead of Prime Day
This is a fault of Amazon or Prime Day, but its customers are becoming the targets for phishing. Recent years the more and more strong consumer group gives a larger space for cyber criminals to abuse. For example, a phishing kit makes it easy for beginning hacker to construct an email that looks uncomfortably similar to an email alert you would get from Amazon. Prime Day is becoming one of hottest shopping periods and also the hottest opportunities for cybercriminals...
By Austin Williams  View Source  
Taipei Government Shocked Hacker Invasion: Mayor Ko Wen-je's Visit Leaked
The Taipei Government computers have been hacked, lots of data, including Taipei Mayor Ke Wen-je (Ke Wenzhe) and his visit to the US, are believed to leak, the police have begun investigations. Months ago, 3 million health data are stolen, and the attacking IP has been confirmed from China. This time, because 11 computers of the Taipei international affairs team had been hacked just before Mayor Ke's Washington trip, politic factors, either from China or US, may be the root of it...
By Lee I-chia  View Source  
1 million StreetEasy accounts have been hacked
You are hunting for new home, but your data are for sale on dark web. Say less online may become a trend when more and more hacker stories are reported. A million StreetEasy accounts have been hacked and for sale on the dark web. The company confirmed Tuesday evening. It's difficult for StreetEasy, its spokesperson said the stolen data included email addresses, user names and encrypted passwords. The actual leakage are even more, like phone numbers, the last four digits, card type, expiration dates, and billing addresses...
By JIM DALRYMPLE  View Source  
Formjacking Is the New Favorite Hack of Cyber Crooks
In some cases, your personal data is leaked not from your side. Every month, 4,800 websites around retail websites are targeted by cyber criminals, who snatch credit/debit card information with a hacking technique called formjacking, one of the newest favorite ways for hackers to steal personal data. Now small and medium-sized businesses are still the biggest targets of formjacking, but British Airways and Ticketmaster have also fallen victim to attacks. It possibly hurts confidences of online business...
By ALYSSA NEWCOMB  View Source  
Hackers Start Exploiting Serious WinRAR Flaw to Spread Malware
If you are WinRAR user, you shouldn't ignore this warning: hackers are starting to exploit its newly disclosed bug to secretly install malware on Windows. A Chinese security firm has uncovered several samples that exploit the WinRAR vulnerability to deliver malware. The first sample was detected only two days after the WinRAR bug was disclosed. Over 500 million users'privacy are in risk because of WinRAR, hacker, or even the vulnerability reporter?
By Michael Kan  View Source  
North Korean Hackers Allegedly Pick on Russian Targets
North Korean hackers, known as Lazarus Group and run by government, typically focuses objects of South Korea, Japan and the U.S., but since January one of its suspected campaigns appears to have targeted Russian businesses. Some reports from international cyber security companies shew the attacks are with its signature Lazarus backdoor malware. Is it a positive signal for Feb summit?...
By Bradley Barth  View Source  
Singapore HIV Data Leak Shakes Vulnerable Community
Details of more than 14,000 HIV infected people in Singapore had been made public in a massive data breach. The government has blamed the leak on the American partner of a local doctor, who had access to the records kept on all known HIV-positive people in Singapore. This leak isn't due to a traditional hacker, but an internal player, whose job granted him rare access to the confidential registry...
By Sharanjit Leyl  View Source  
Russian Hackers Leave Chinese in Their Cyberdust
Who is the champion on the hacker world? In the country sponsored race, Russian get the first place. Kremlin-backed groups, such as "Fancy Bear", take only 18 minutes and 49 seconds on average to "break out", or move from a single computer they have compromised into other machines in an organisation's network. The same task will costs two hours 20 minutes for North Korean hackers, and 4-5 hours for hackers of China and Iran...
By Mark Bridge  View Source  
Hackers spread ISIS propaganda by hijacking Twitter accounts
An investigation from TechCrunch found that the impacted accounts appear to have been overtaken in recent days and weeks after years of inactivity; Twitter is implying that it's email providers like Yahoo and Hotmail, which deactivate accounts and recycle email addresses, that are part of the problem...
By Christopher Carbone  View Source  
Facebook Confirms Hackers Steal Data of Millions of Users
Facebook said that 50 million users were affected in recent hacking at first time, but now shrink to 30 million as the final number. Is it a good news? I don't think so. The positive point is Facebook has now confirmed that actually over 29 million users were in hackers' hands. What we can is to expect Facebook, the great company can do right things to protect our privacy, if our data aren't in that 30 millions in luck. There is a list showing what your information may be stolen...
By Anmol  View Source  
US State Department Reveals Data Breach Employee Information Exposed
Trump once said he wrote important things on papers. He seems distrust modern information technology to protect privacy. The new accident in the US State Department, which has confirmed a data breach through its email system, lets the president win again. The latest new revealed that a compromised email system leaked, and 1% employees' personally identifiable information(PII) have been exposed. Because, these are sort of personal data, the security notice was marked "Sensitive but Unclassified." The hacker may want to get more ...
By Charlie Osborne  View Source  
Guessing Who is Stealing Your Data
Alaskan Governor Bill Walker and come companies are confused by their cybersecurity vendor Recorded Future, which reported that computers of Tsinghua University were targeting some systems of Alaskan. Can you imagine a top university wet its feet in such a dirt business? Tsinghua University possibly is victim too, or say hackers use its computers or IPs to attack third parties. However, up to now this university didn't give a positive answer, pretended nothing happened. How is stealing data? Hopefully not professors...
By Reuters  View Source  
Two Hackers Have Found How to Break into Hotel-Room Locks
When you read a story talking about security vulnerability that may risk millions of hotel rooms, never think it's just a story. Your and your family's privacy may leak from these rooms if only you have chance to stop hotels. A ridiculous case was as early as 2003, 15 years ago, an guy in a a hacking conference in Berlin found his laptop was stolen and there was no evidence of force entry. Yes, his room's keycard-operated lock got hacked. As a matter of fact, hacker are much stronger than that age, no hotel room is safe now...
By Gulliver  View Source  
Inside North Korea Hacker Army
South Korea is hosting winter Olympic Game, but the key player is North and its leader. Few people can understand why things go in such a way: North Korea get everything without paying a coin. Too many secrets hidden in the country, hacker army is one of them. A recent report uncovered that Pyongyang has sent hundreds of hackers to other countries to make money by any means necessary. South Korea is an ideal place of the mission. At Seoul's Gangnam district, Jong Hyok looks like...
By Sam Kim  View Source  
Hackers Abuse Google Ad To Spread Malware That Mines Cryptocurrency
Everyone is possible to become a victim of malware, even IT giants like Google. Trend Micro have spotted Google's ad network was abused to spread malware by hackers to mine cryptocurrency like Bitcoin. The network reaches about a quarter billion unique viewers in the U.S. alone, but cyber criminals just infected 5 countries up to now: France, Italy, Japan, Spain and Taiwan. The malware's goal is to mine cryptocurrency on your computers. It steals power of your computer power instead of privacy in it...
By Lee Mathews  View Source  
Confessions of Former Hacker: 5 Techniques to Make More Secure Online
We spend money and time on privacy secret in this or that way, but do we know how the hackers think about? The guy, who was on the US government’s “Most Wanted” list and finally served 5 years in prison for hacking mobile phones, recently gave some suggestions to to safeguard personal information online: The first one is to use a password manager. Is is a good idea, especially which is from a hacker? At least, I dislike password manager because it hints hackers what is the gateway of my privacy...
By Jeanie Ahn  View Source