hackers

Wed
08
May
Dennis Faas's picture

Windows 8 Vulnerable to Attack, Kaspersky Says

Kaspersky Lab product specialist Wayne Kirby says that the complex design of Microsoft's newest operating system (OS), Windows 8, increases its vulnerability to hackers. Not helping the situation, according to Kirby: the availability of multiple ... versions of Windows 8, including Windows RT. Kirby says that, by offering consumers several different editions of its new OS, Microsoft has increased the number of flaws in the platform. Multiple Operating Systems, Multiple Vulnerabilities Kirby says that the multiple OS approach gives hackers more vulnerabilities to exploit. "Because it contains ... (view more)

Fri
03
May
Dennis Faas's picture

U.S. Department of Labor Site Infected with Malware

According to reports, hackers recently infected the United States Department of Labor website with malware. Security experts have indicated that the attack may have originated in China, since the strategy employed by hackers is very similar to ... tactics used by Chinese hackers in the past. The hackers targeted the Site Exposure Matrices (SEM) page within the U.S. Department of Labor website. According to two security firms (AlienVault and Invincea), that page features data related to the storage of toxic substances at United States Department of Energy sites. Attack May Have Originated in China ... (view more)

Tue
16
Apr
Dennis Faas's picture

Huge Botnet Attack Targets WordPress Sites

Hackers have reportedly initiated a widespread attack on sites that use the WordPress publishing platform. Hosts using particularly weak passwords are being told to change those passwords or risk having their sites taken over. The hacking campaign ... reportedly uses a "brute force" strategy, meaning hackers use the login name "admin" and then try thousands of typical passwords to bypass security. Hackers Hoping to Create a "Beefy" Botnet The goal, according to security experts, is to build a huge and powerful botnet. "One of the concerns of an attack like this is that the attacker is ... (view more)

Tue
02
Apr
Dennis Faas's picture

Evernote Used to Deliver Malware: Report

Security firm Trend Micro says it has discovered a malicious software program that employs online notepad service Evernote as a communications tool. Evernote is a cloud-based note-taking software utility that allows users to place "notes, web clips, ... files and images ... on every device and computer." (Source: evernote.com ) That means you can make a note about a recently-discovered favorite wine on your smartphone and have that note instantly show up on your home computer. Unfortunately, it seems this handy little program has been exploited by cyber-crooks. Evernote Used to Communicate with ... (view more)

Mon
01
Apr
Dennis Faas's picture

Malware Targets Credit Card Data on Checkout PCs

Security firm McAfee says it has discovered a new type of malware designed to steal credit card data from point-of-sale (POS) computer systems. The malware is of the Trojan horse variety and is being called 'vSkimmer'. Point-of-sale systems, or ... checkout systems, are the computers used in retail environments. Malware Communicates Credit Card Data to Hackers McAfee security researcher Chintan Shah reported on the vSkimmer threat in a recent blog post. According to Shah, the malware was discovered in mid-February 2013 and is currently being discussed on cybercriminal forums. (Source: pcworld.com ... (view more)

Mon
25
Mar
Dennis Faas's picture

Apple (Finally) Introduces Two-Step Authentication

After a simple yet devastating hack of its security went public last August, Apple has -- just eight months later -- introduced a two-step authentication system. Back in early August 2012, Wired.com's Mat Honan was devastated to find that hackers ... were able to gain access to his MacBook, iPhone, and Gmail account after easily bypassing both Apple and Amazon security systems. Hackers Exploit Simple Security Systems Hackers used a simple trick: they called Amazon to request a password change. When prompted by an Amazon representative, they presented Honan's name, billing address, and email ... (view more)

Tue
19
Mar
Dennis Faas's picture

Bill Gates' Personal Data Exposed by Hackers

Microsoft co-founder Bill Gates has had his credit information exposed by hackers. It's only the latest in a string of similar attacks launched against celebrities in recent weeks. According to reports, Gates' personal financial information was ... acquired by hackers and then shared online. The Federal Bureau of Investigation is currently trying to figure out how the data was accessed and who was responsible for the attack. Somewhat ironically, the attack occurred on the same day that Bill Gates discussed pressing cyber security threats with the Washington Post newspaper. Security Answers Found ... (view more)

Mon
25
Feb
Dennis Faas's picture

NBC.com Visitors Exposed to Malicious Software

According to reports, NBC.com was hacked late last week. The hackers bypassed security and then spread malicious software designed to steal bank account information from site visitors. It wasn't just the main NBC.com site that was affected, either. ... Reports indicate that sub-sites, including sites dedicated to the Jimmy Fallon and Jay Leno late night shows, were also affected by the hack. Security experts say that hackers modified the NBC.com site so that it would serve up an 'iframe,' which is a method of adding content to a site from a distant domain. In this case, the iframe effectively ... (view more)

Fri
22
Feb
Dennis Faas's picture

Adobe Flaw Could Allow Hackers to Infiltrate a PC

Adobe has issued a fix for what it is calling a top-priority security flaw. The bug could allow hackers to seize control of affected machines. The update fixes problems with Adobe Reader, the software used to open and view PDF documents. It also ... affects Adobe Acrobat, the software used to create PDF files. Although Acrobat is not as popular as Reader, many people will be running at least one of the two programs. The flaws involve memory corruption and buffer flow vulnerabilities which could allow a hacker to force a computer to crash. It's a tactic that's more likely to be targeted at ... (view more)

Wed
20
Feb
Dennis Faas's picture

Hackers Bypass Twitter Security; Attack Burger King

Fast food restaurant Burger King has had its Twitter account hacked and defaced by hacktivist group LulzSec. The organization, which has claimed responsibility for a number of high-profile hacks in the past few years, posted false information to the ... Burger King Twitter page. According to reports, around noon Eastern Time on Monday, February 18, 2013, the @BurgerKing account name was changed to "McDonalds," while the familiar McDonald's logo was splashed across the screen. In addition, LulzSec added false information indicating that Burger King had been purchased by its primary fast food rival ... (view more)

Pages

Subscribe to RSS - hackers