Articles about Hacking

Millions of mobile users at risk after Three customer database breach

Three

Hackers have gained access to a database containing the personal details of up to six million customers of mobile carrier Three. A report in the Telegraph cites 'sources familiar with the incident', but while Three has confirmed a security breach took place, the company is yet to provide precise details.

What we do know is that the incident took place when hackers used employee login credentials to access the customer upgrade database. It is thought that the hackers gained accessed to customer names, addresses, phone numbers and dates of birth, but financial details were not exposed.

Continue reading

Car hacking: Imminent threat or farfetched fear?

Hacked car

According to a recent report from cyber-security experts at RSA, in today’s increasingly computerized world, cyber-crime issues "comprise a threat horizon that continues to accelerate and expand with no end in sight".

Since much the same can be said about the growth of computing power in today’s vehicles -- which rely on technology for everything from 3D navigation graphics to semi-autonomous driving capabilities -- the risks for having your car or truck hacked would seem to be on the rise as well. But should current drivers be worried about the issue right now, or is it time to pump the brakes on the car-hacking panic?

Continue reading

Tesco Bank suspends online banking following fraudulent activity

tesco-letterhead

Tesco Bank has taken the extraordinary measure of temporarily halting online transactions after thousands of customers experienced criminal activity in their accounts over the weekend. The move also means that customers are unable to use contactless payments.

Customers were alerted over the weekend via text message after suspicious activity was noticed in numerous accounts. Some have found that hundreds of pounds have gone missing from their accounts, but it is not clear whether the problem stems from a direct hack of Tesco Bank, or if a retailer suffered a security breach.

Continue reading

Hacker discovers Gmail vulnerability that leaves any account open to compromise

Gmail app logo on Google Nexus 5

A student and security researcher from Pakistan has found a serious issue with Gmail that makes it possible for a hacker to take over any email address.

The vulnerability relates to the way Google handles the linking of a primary Gmail account to another email address for the purposes of message forwarding. In just a few steps it was -- before Google fixed the problem -- possible to take over ownership of an email address by tricking the system into sending out the necessary verification code.

Continue reading

Microsoft: Russian hackers are exploiting Windows flaw exposed by Google

Microsoft

Microsoft says that a vulnerability in Windows made public by Google has been exploited by a hacking group with links to Russia. The group -- known variously as Strontium, Fancy Bear, and APT 28 -- has executed several spear phishing attacks, the company says.

Google was criticized for publicizing the vulnerability before Microsoft has released a patch. A fix for the security hole is not due to be released until Tuesday, 8 November -- voting day in the US election.

Continue reading

Dyn DDoS attack used Chinese firm's unsecured IoT devices

DDoS attack

Following the large scale cyberattack that took down a number of high-profile sites last Friday, a Chinese electronics component manufacturer has admitted that its products were used by the attackers behind the disruption.

Hangzhou Xiongmai Technology, which produces DVRs and internet-connect cameras, has come forward to acknowledge that its products were exploited and that the attackers had taken advantage of security vulnerabilities resulting from weak default passwords.

Continue reading

Rowhammer memory attack can root Android phones in seconds

hammer-anvil

Smartphones from LG, Samsung and Motorola are all vulnerable to an attack that makes it possible to gain root access in a matter of seconds. Known as Rowhammer, the attack works using a bit flipping technique that exploits a vulnerability in the design of RAM chips.

Because the attack takes advantage of a physical aspect of design, it is going to be difficult to quickly devise a fix. In the meantime, millions of smartphones are at risk of compromise in what could be as large an issue as the recently-discovered Dirty COW bug -- and there's an app you can use to check if you are at risk.

Continue reading

Serious Dirty COW bug leaves millions of Linux users vulnerable to attack

dirty-cow

A vulnerability discovered in the Linux kernel has been present for nine years, and users are being advised to seek out and install a patch as soon as they possibly can. Dubbed Dirty COW, the bug is a privilege escalation vulnerability which can be found in just about every Linux distro out there.

Discovered by security expert Phil Oester, Dirty COW is described as one of the most serious bugs of its type ever found in Linux. Assigned the code CVE-2016-5195, there is evidence that the vulnerability has been exploited and a website set up to alert people to the problem advises that the "security community should deploy honeypots that entrap attackers and to alert about exploitation attempts".

Continue reading

The legal challenges for autonomous vehicles

Self Driving Car

Gartner described 2015 as the peak of the driverless car "hype cycle", as the battle between established car manufacturers and technology companies intensified to produce driverless or autonomous vehicles. However the driverless car phenomenon has escalated very quickly in recent months with Uber, Google and now traditional car manufacturer Ford having announced their plans to create and test self-driving vehicles, and rumors surfacing of Apple acquiring McLaren.

The US has also recently issued Federal proposed guidelines setting out 15 benchmarks car manufacturers will need to meet before their autonomous vehicles can hit the road. Ford is currently developing in-car connectivity, ride-sharing and autonomous technologies through its subsidiary; Ford Smart Mobility (FSM) and will launch its self-driving car by 2021. This vehicle will come without a steering wheel, an accelerator or pedals -- an image of a car that was probably unimaginable a decade ago and the battle for the dashboard becomes easier to imagine.

Continue reading

Hackers selling NSA hacking tools for 10,000 bitcoins

Hacker laptop

It seems as no one wants to buy NSA’s exploit tools. Or maybe ShadowBrokers, the group selling the tools, overpriced the deal.

The group, allegedly formed by Russian, state-sponsored hackers, decided to pull the auction on the tools. Instead, it turned it into a crowdfunded sale, aiming for 10,000 bitcoin, or slightly over $6 million.

Continue reading

New hacker collective targets SWIFT system

Hackers laptops

Following the $81 million cyberattack in February, a second hacking group has emerged with the intention of exploiting the SWIFT money transfer system to rob banks.

A report from the security firm Symantec has revealed that these cyberattacks have occurred since January and have targeted companies located in the US, Hong Kong, Australian and other countries. The firm has detected 74 different computer infections that suggest that around 100 organizations have been affected by these attacks so far.

Continue reading

Vera Bradley is the latest retailer to fall victim to hackers, extent unknown

hackers-ahead

2016 has been a long year for retailers, with a number of them being relieved of customer data by hackers looking mostly for credit card information. Wendys, Eddie Bauer, Hard Rock Hotel and Casino Las Vegas and others have all been forced to step forward in an effort to protect customers, though largely done after the fact.

Now the latest victim has been announced as retailer Vera Bradley reveals it too has suffered a serious breach of its payment processing system.

Continue reading

Identifying hackers is harder than you think

hacker

One of the main reasons why hackers and other malicious actors are so hard to locate is not the fact they're really good at hiding their location -- it is because they're exceptional when it comes to faking things. They fake their locations, their working hours, language, infrastructure, toolkits -- even their own groups.

Hackers are going extreme lengths to make sure people looking for them are actually in for a wild goose chase. These conclusions were released by security researchers at Kaspersky Lab who tried to tackle the issue of misleading both victims and security researchers.

Continue reading

Russia accused of hacking US voting system and interfering with the 2016 election

st-basil-cathedral-russia

There is only a month to go until the election showdown between Trump and Clinton finally comes to an end. There is a great deal riding on the result of this particular election and we have already seen DNC servers hacked.

There has been speculation about who may have been responsible for this security breach, but now the US has pointed the finger firmly at Putin's Russia. Russian hackers are accused of hacking into the Democratic National Committee's servers and trying "to interfere with the US election process".

Continue reading

New study by Kaspersky shows computer risks to those over 55

Cybercrime scene

It's probably no great secret that today's older generation has a flock of followers online that they largely do not want, who are trying to con them out of their money. Trying to take advantage of this generation is nothing new. In the past it was done door to door with scams such as "roofers" and "driveway repairmen".

Security company Kaspersky has done a study of internet users aged 55 and older and the results, while unsurprising, aren't particularly good.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.