Yesterday was Change Your Password day. While the original idea behind it is good, this day also presents a big opportunity for hackers. Hackers can use this day to get their hands on a lot of passwords. I’ll explain how.
A topic i touch on almost daily, i have no idea why i haven’t written about this sooner. Thanks to Troy Hunt for inspiring me to write it now. When you buy your new Mac, iPhone, iPod Touch or iPad, chances are big one of the helpful employees in an Apple Store helps you set ...
This is an add-on to my previous post about the LivingSocial hack. As i explained in that post, user’s Names, e-mail addresses, birth dates and encrypted passwords were stolen. I also explained how this data can be used to generate some very convincing spear-phishing emails. Something i want to further focus on in this post ...
LivingSocial announced today they were the victim of a cyber attack that compromised their computer systems. 50 million customers had their information accessed. This includes: – Names – E-mail addresses – Birth dates – Encrypted passwords Credit card and merchant financial data was not compromised according to LivingSocial. If you have not done so already, ...
Out of all the ways to share files AirDrop is possibly the most underrated and least known way. AirDrop is one of the great new features of OS X Lion and later, which provides a really easy way to share files between supported Wi-Fi-enabled Macs without having to connect through the local Wi-Fi network. (excerpt ...
Security researchers have flagged a simple but potentially dangerous flaw in the Apple Safari browser, which could be used to hijack users’ web sessions. The problem lies in the Apple Safari webarchive format, which saves all resources on a web page into one document. To exploit the flaw, an attacker would have to trick a victim into ...
The other day i was doing some routine maintenance on my brother’s iMac. Updates, permissions repair, etc. when i opened safari to download the latest Flash player update (i always get it straight from the source) i noticed a weird banner in the bottom of the display and after a few seconds a second banner ...
Today F-Secure has made note of a Word document that is designed to infect Macs with malware. The Word document claims to be about the “6th International Uyghur Women’s Seminar & 1st World Uyghur Women’s Congress”, run by the International Uyghur Human Rights & Democracy Foundation. The document installs the malware by exploiting a vulnerability in ...
I know, creepy title. It is true though and already being done every day all over the world. Sergey Shekyan and Artem Harutyunyan, researchers from the security firm Qualys, said the search engine Shodan shows about 100,000 wireless IP cameras that have “little or no emphasis on security.” They held a presentation at the recent Hack in ...
CISPA is about to become a reality. If you do not know what it is and how it can be used to destroy (your) privacy and rights, keep reading. I will not explain CISPA because that has been done a lot already. Instead i will provide you with links to websites that have done a ...