hackers

Thu
24
Nov
John Lister's picture

Report: Earphones Could Be Hijacked By Hackers

Security researchers say hackers could turn people's headphones into a microphone for surreptitious remote listening. However, the method has enough limitations that it shouldn't be a major concern for most users. The method, shown off by ... researchers at Ben Guiron University in Israel, takes advantage of a very simple element of engineering. That is that the process by which a microphone turns speech into an electronic signal is effectively the same as that by which earphones turn a speaker into sound, just with the process reversed. According to the researchers, that's a security ... (view more)

Wed
12
Oct
John Lister's picture

Yahoo Accused of Holding Email Users Hostage

Yahoo has blocked users from automatically forwarding incoming emails to an account with a rival provider. Many are interpreting it as an attempt to stop users jumping ship after revelations of a major security breach. The forwarding feature is ... pretty much a standard feature across the webmail industry, and means users can change from one account to another without having to worry about missing out on an important message during the switchover. Officially Yahoo says the feature is only temporarily disabled. It says the move was planned in advance and is to allow it to work on a range of ... (view more)

Wed
08
Jun
John Lister's picture

TeamViewer Remote Access Customers Hacked

Management at TeamViewer, a remote access computer tool, have confirmed that a "significant number" of users have fallen prey to hackers. However, the company insists that all evidence suggests that there is no flaw in the system, but is instead ... pointing fingers at its users. TeamViewer allows users to login to a remote computer (even their own) from anywhere with an Internet connection. Once connected, users can operate the computer just as if they had physical access to the machine. The security for the system works in two ways: first, users get a reference number that identifies ... (view more)

Wed
17
Feb
John Lister's picture

Hackers Demand $3.6M To Restore Hospital Computers

A California hospital has been unable to use its computer system for more than a week thanks to a ransomware attack. The hackers are said to be demanding more than $3 million in return for returning access. The Hollywood Presbytarian Medical Center ... has confirmed the attack but is keeping many of the details quiet. Local news outlets say it doesn't appear any personal data has been compromised and no patients have been put at medical risk. However, the attack has been highly disruptive. Staff are having to register new patients and update medical records on paper. Some patients and family ... (view more)

Wed
25
Nov
John Lister's picture

Dell Ships PCs With Massive Security Risk

Dell has confirmed it shipped computers with a major built-in security flaw. The unintentional move could expose users to a significant risk of hackers accessing their personal data. The issue at hand deals with an exploit in the secure sockets ... layer (SSL). Specifically, Dell has inadvertently shipped PCs and laptops with both a trusted root certificate and key, when only the trusted certificate should have been allowed. The idea behind the mishap was to help identify Dell computers when they were connected to Dell's online support service. In this case, the computer's model number could be ... (view more)

Wed
28
Jan
John Lister's picture

FTC: Smart Gadgets a Huge Security Risk

The Federal Trade Commission (FTC) has warned that the boom in Internet-connected home gadgets could increase security risks significantly. It's put together consumer advice and says it will work on applying the law to this new area of tech. The FTC ... has published a report on the " Internet of Things ". That's something of a vague term, but the commission defines it as any physical object that can connect to the Internet. Today, the Internet of Things doesn't simply apply to computer and smart phones -- it also applies to billions of other objects, including cameras, home ... (view more)

Tue
27
Jan
John Lister's picture

Financial Regulators May Oversee Bitcoin

Two Facebook millionaires want US officials to regulate an exchange for buying and selling the controversial "cryptocurrency" Bitcoin. The move follows a scandal when the largest such exchange in Japan went out of business . The Bitcoin currency ... isn't issued by any government or backed by any assets. Instead, each new unit of the currency is created when a computer successfully solves what's effectively a puzzle designed to slowly increase the amount of Bitcoins in circulation. Every time one user pays a Bitcoin to another, a publicly available ledger of transactions is ... (view more)

Thu
11
Dec
Brandon Dimmel's picture

Cyber Attacks on Businesses Doubled in 2014: Report

A new report suggests that hackers took aim at twice as many businesses in 2014 when compared to the previous year. The report comes from Russian security company Kaspersky Lab; its Global Research and Analysis Team says it detected seven major ... advanced persistent threats (or APTs) over the past twelve months, resulting in approximately 4,400 attacks targeting private sector organizations in an estimated 55 countries. Kaspersky researchers say that's more than double the roughly 1,800 corporations targeted by cybercriminals in 2013 . Sophisticated Attacks May Be Supported by National ... (view more)

Fri
05
Dec
John Lister's picture

Experts: Avoid Windows XP Update 'Trick'

Earlier this year, a hack was discovered that would allow Windows XP users to continue receiving security updates , despite Microsoft no longer officially supporting the system . However, experts are now warning users that the hack guarantees ... neither security, nor stable computing. Windows XP: No More Security Updates Microsoft finally pulled the plug on Windows XP in April this year , including all future security updates. The problem is that many people still continue to use the operating system, despite significant security risks . The Windows Embedded hack essentially tricks Windows XP ... (view more)

Tue
02
Dec
Brandon Dimmel's picture

Could the 'Internet of Things' Kill Someone?

Is there anything scarier than having your computer hacked? Absolutely there is, say security experts who predict that the growing "Internet of Things" could eventually allow hackers to remotely commit violent crimes. For decades we've associated ... the Internet with computers, from desktops and laptops to tablet devices and smartphones. But as time goes on, more and more devices are being connected to the web in an effort to give consumers more control. Want to lower your refrigerator's freezer temperature or start your car without getting off the couch? Chances are, there ... (view more)

Pages

Subscribe to RSS - hackers