Use Dropbox as a backdoor into corporate networks. Check. Suck information out of pacemakers. Check. The Black Hat conference convening in Las Vegas next week offers hacker tools for all of those plus more.
Browsing: Hacking
Local newspapers one day ago joyfully reported that the server which commanded and controlled the hacking to online newspapers was found and neutralized. However, the disaster has not ended yet.
The phrase “threat landscape” is a cliche of information security discussions but like many cliches it still means something. In our case it usefully describes the actual type and level of threats that businesses face on a daily basis.
85 percent of U.S. adults with banking accounts are at least somewhat concerned about online banking fraud, according to Entersekt. Such fraud can include phishing, malware, man-in-the-browser and brute force attacks.
Google Glass was silently patched by the internet giant last month after a flaw was discovered that could have allowed hackers to capture user data sent from the device, mobile security firm Lookout has revealed.
An email address that’s used for online banking and business purposes can be highly valuable for cybercriminals.
Remotely taking control of someone’s computer is not an unheard of hacker exploit, but this claim about remotely controlling a Chinese hacker’s webcam is just crazy.
On the tiny Mediterranean island of Malta, two Italian hackers have been searching for bugs—not the island’s many beetle varieties, but secret flaws in computer code that governments pay hundreds of thousands of dollars to learn about and exploit.
Sony has finally agreed to pay the £250,000 (nearly $400,000) that UK authorities handed in January following the conclusion of an investigation into the hacking of its PlayStation Network in 2011. The incident compromised millions of users’ account details.
The Washington Post has recently reported on the exploits of Luigi Auriemma, 32, and Donato Ferrante, 28, two Italian hackers that work from the island of Malta, searching for flaws in computer codes that they can sell to countries that want to break into the computer systems of foreign adversaries.