Identity theft occurs when a cyber criminal compromises private data such as your social security number, credit card, or even your name without your permission and uses it to commit fraud. It always begins with a data security breach of some kind but can end in ruin for your credit score, bank account, healthcare, and… Read More »
What’s The Best Way To Steal Credit Info? Hack A Credit Processing Company Like Experian
On October 1st T-Mobile released a statement revealing approximately 15 million existing and potential customers had their personal identification data stolen. The hack was not against T-Mobile itself but against Experian, the company that runs credit verification for postpaid accounts for T-Mobile. What Was Stolen? According to T-Mobile, anyone who submitted a credit application between… Read More »
Why Non-Cheaters Should Be Just As Worried As Ashley Madison Members
Millions of accounts stolen from the adultery facilitation service Ashley Madison hit the dark web this week, causing angst for spouses, anxiety for the site’s users and social reflection from a variety of media sources. The information includes names, passwords, email addresses, credit card information for paid accounts, physical descriptions and profile information about users’… Read More »
Black Hat Conference Highlights
Last week cyber security experts gathered at the Mandalay Bay hotel in Las Vegas for the 9th annual Black Hat conference. While the major media focus was on the connected car vulnerabilities I discussed in a previous post, there were many other important subjects covered. Let’s look at some of the highlights. Android Fingerprint Sensor… Read More »
Stagefright Bug Takes Center Stage On 950 Million Android Devices
A series of bugs and security loopholes in the Android operating system could allow hackers to take control of up to 95% of Android smartphones simply by sending an MMS message with malware attached. What is the Stagefright bug? Stagefright is the name of the Android operating system’s media library, which the bug is named… Read More »
Chrysler Recalls 1.4 Million Hackable Cars But Is It Enough?
Car companies have a history of large scale recalls for their products. After all, the safety of their customers fall directly on the shoulders of automakers so why take a chance? But what about computer glitches or even hacks? When is proactive too proactive and when is it not even enough? Some of today’s cars come equipped… Read More »
Global Governments Attempt to Peel The Onion Router
Tor has been embraced by lawful and unlawful users alike. It helps those who value their online privacy and dissidents who live in countries with oppressive governments, but it also provides ways for cyber criminals, terrorists and other bad guys to avoid identification. This has made breaking Tor’s anonymity a top priority for government agencies… Read More »
Why Healthcare Hacking Has Become Big Business
As banks and large retailers have taken steps to harden their networks, hackers have turned their attention to healthcare providers. Just recently, Premera announced a breach that took place last year may have exposed the personal and financial data of approximately 11 million customers. Last month, the nation’s second largest health insurance company reported the information… Read More »
- « Previous Page
- 1
- 2
- 3
- 4
- …
- 7
- Next Page »