Data Security: Hot Stories

Search Result for Hackers in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field

 Search Result for Hackers in All Fields - Top 20 Stories
Inside North Korea Hacker Army
South Korea is hosting winter Olympic Game, but the key player is North and its leader. Few people can understand why things go in such a way: North Korea get everything without paying a coin. Too many secrets hidden in the country, hacker army is one of them. A recent report uncovered that Pyongyang has sent hundreds of hackers to other countries to make money by any means necessary. South Korea is an ideal place of the mission. At Seoul's Gangnam district, Jong Hyok looks like...
By Sam Kim  View Source  
Hackers Abuse Google Ad To Spread Malware That Mines Cryptocurrency
Everyone is possible to become a victim of malware, even IT giants like Google. Trend Micro have spotted Google's ad network was abused to spread malware by hackers to mine cryptocurrency like Bitcoin. The network reaches about a quarter billion unique viewers in the U.S. alone, but cyber criminals just infected 5 countries up to now: France, Italy, Japan, Spain and Taiwan. The malware's goal is to mine cryptocurrency on your computers. It steals power of your computer power instead of privacy in it...
By Lee Mathews  View Source  
Confessions of Former Hacker: 5 Techniques to Make More Secure Online
We spend money and time on privacy secret in this or that way, but do we know how the hackers think about? The guy, who was on the US government’s “Most Wanted” list and finally served 5 years in prison for hacking mobile phones, recently gave some suggestions to to safeguard personal information online: The first one is to use a password manager. Is is a good idea, especially which is from a hacker? At least, I dislike password manager because it hints hackers what is the gateway of my privacy...
By Jeanie Ahn  View Source  
Hackers Spying on Sonos and Bose Smart Systems
Anything attached to internet, it will be potential object of hackers. The warnings about toys isn't passed completely, the home speakers are reported to have a number of security gaps that could give anyone access to the device from a remote location. Some famous brands, like Sonos and Bose, are in the warning list. As a matter of fact, the internet connected devices give the physical accessing of hackers, it opens a crack, small or big, to cause home security issues...
Is your toy spying on you? Find out how to hack the hackers
In holiday season, toys are the commonest presents of boys and girls. More and more smart toys run in bedroom, living room, or bathroom, which are bringing new privacy issues or threats. FBI once raised warnings on toys, e.g. Grinch-like, which said toys connected to the Internet could be a target of hackers to listen in on conversations or to steal information related household. Read the paper and an eye on kid's toys...
By AP New York  View Source  
Chinese Hacker Groups To Shift Focus To India In 2018
Hackers aren't identical to criminals, although common people usually feel the risks from them and even leak data or lose money. Some hacker groups are actually backed by nation-states, called as APTs (Advanced Persistent Threat). It's one reason why cyber security situation is worse and malware is more. The recent reports disclosed Chinese APT groups are shifting focus in 2018 to India and other south Asia counties as a part of Beijing's global market goal. It's time to check if your data center is safe...
By Indo-Asian News  View Source  
Hacking the House: MPs Have to Care about Cyber Security
Is it common to share login passwords with your colleagues? At least this happens in the House of Commons. If an assistant can login to a MP's computer and somehow uses it to view pornography, the story isn't just limited in broken office code. The true risk is these sort of websites are the main distributers of malware, either spyware or ransomware. Considering the MP's computers have lots of classified data and files, hackers may get inspiration from recent porn website scandal there...
By Rory Cellan-Jones  View Source  
Uber Pays $100,000 to Hacker for 57M Accounts Leak
Uber is facing a moment of truth. It needs to clean up its act. This company have our address and credit card information, and even details of travel history. It admitted a serious data leak was hidden: hackers breached and gained access to 57 million user accounts. What the Uber did is to pay $100,000 to hackers to delete the data. None argue it's deal with criminals. Does Uber really think customers' privacy is a small trade with hackers? They trusts hackers, but we have different opinion...
By Jake Novak  View Source  
Texas Gunman Locked iPhone Renews Encryption Debate
When you heard FBI failed to unlock the cellphone of the Texas gunman, what do you think? Yahoo once leaked almost everyone's data to hackers, but Apple is fighting to protect privacy of murders like this shooter. Are they really so different? This sad story is reigniting the debate over encryption and government access to secured communications. It's just a blooding commerce chance for some companies and far away the nature: we must punish criminals either online or by gun...
Guess Who Is Dating With You: A Game of Hackers
Researchers in Kaspersky are evaluating some popular dating apps. It's said that dating apps are new targets of some hacker organizations. Why? People in love are easy to cheat and are open to spend money. The recent reports are as estimation: multiple vulnerabilities are discovered and some of them leak important private data. Because data apps lack basic data protection investment, you may date with hackers who know you everything, such a terrible scenario! ...
By Kaspersky Lab  View Source  
Kaspersky Confirms It Downloaded Secret NSA Tools
Kaspersky is anti-virus and cyber security company. If someday you hear it steal hacker tools from NSA, aren't surprised. Hackers and anti-virus software are actually in same industry and share same technology base. The U.S. government ordered Kaspersky's software to be removed from government owned computers last month because of meddling in the 2016 presidential election. Now the questions is: The security software is safe itself?
By Shane Savitsky  View Source  
ESET Report Hackers Hijack Computers to Make Money
ESET reported a new type of crime of hackers: hijacking victim computers to mine cryptocurrency. Its researchers uncovered the profitable hacking. One guy aimed Windows servers and infected hundreds of them to run a mining malware, which steals cpu and memory resources to generate $63,000 in 3 months. This is just one case. Because the hackers want to hijack the victims to make money, the malware is hidden considerably and not easy to view...
By Joon Ian Wong  View Source  
Hackers Could Program Sex Robots to Kill Owners
Robots will go to common family in near future. They are becoming the targets of dark hackers. The most risk possibly is the sex robot. One reason is its market seems better than others and will enter home earlier. Another reason, it should be the root cause, its job usually is behind the backdrop. Danger tricks or actions are convenient to hide. A cybersecurity scientist has issued a bizarre warning that sex robots could one day kill their owners if hackers can get inside their heads...
By George Harrison  View Source  
U.S. employee data breach tied to China Hackers
Even if your data and your family members' data are collected and kept by US government, they aren't safe as the government promised. A Chinese hacking group is suspected of stealing sensitive information about millions of current and former U.S. government employees. FBI arrested some of the group by noticed "Deep Panda's", a hacker tool also used in Hong Kong to monitor democracy force, may hacked sensitive information of about 22.1 million federal employees, including their families and friends...
By Joseph Menn  View Source  
Credit Card vs Medical Record in Hacker Eyes
We heard news about hacking hospitals from time to time, the latest victim is a 550-bed facility in Buffalo, NY. Hackers' first target seems medical industry, at least as often as financial industry. The reason behind this is information black market: on average, hackers can sell credit card numbers for 10 to 15 cents each, but a medical record could be worth between $30 and $500...
By CBS News  View Source  
Reveals Easy Way to Hack Facebook Account
When you play with big guys, never give up protecting own privacy. Yahoo once offered some infamous examples. So did other information giants. Facebook is a target of hackers for a long time. It lets you add phone numbers or other contact ways - WhatsApp or Messenger or Snapchat or Hangouts or whatever - for social networks, but can it keep them safe? Unfortunately hackers indeed get them someway...
By James Martindale  View Source  
Android Malware Leak Private Photos To Friends
Do you mind private photos to be sent to friends? An new Android ransomware possibly asks you similar questions. If you do mind that happens, read this paper carefully. Some clues indicates the threat is distributed by Google Play. Thousands of Android users may be at risk to a malware which attempts to extort victims by threatening to leak personal information, including photos, unless a 'ransom' is paid to the hackers...
By Jason Murdock  View Source  
Russian Hackers Linked To Instagram of Britney Spears
Russian Hackers hided a malware operation in Britney Spears' Instagram account, according to Slovakian cyber-security firm ESET. The research found the hackers are connected to Turla, which once attack internet systems of the embassies and governments of a number of Eastern European nations in 2014...
By Mary Papenfuss  View Source  
FBI Suspects Russian Hackers Behind Qatar Crisis
Qatar is a hot word in last week. It actually leads a new round of Middle East crisis. When the story is developing unpredictably, its trigger has been disappeared. At very beginning the crisis starts from a news of Qatar government's website. However, Qatar deleted the news quickly and said it's fake and posted by hackers. Hacker is becoming a part of politics...
By From Spiegel  View Source  
Evidence of North Korea in Ransomware Attack
More evidence shows that North Korean hackers are behind the global ransomware attack. Ransomware's nature is crime not technology or definitely not high technology. If you want money and don't fear police, ransom is a quick way to create fortunate. None doubts North Korean needs money, and as for police ...