Tech content trusted by users in North America and around the world
7,298 Reviews & Articles | 53,272 News Posts

Hacking & Security Posts - Page 1

Qualcomm announces vulnerability bounty program

By: Lana Jelic | More News: Hacking & Security | Posted: Nov 17, 2016 12:30 pm

Qualcomm announced they are launching a vulnerability rewards program (also known as a bounty) designed to expand their collaboration with invited white hat hackers. The company firmly believes that these type of hackers will help to improve the security of their Snapdragon family and LTE modems by finding the vulnerabilities and then reporting them to Qualcomm to fix.

 

qualcomm-announces-vulnerability-bounty-program_01

 

The program is the first of its kind to be announced by a major silicon vendor. The program will be administered in collaboration with vulnerability coordination platform HackerOne. This also takes Qualcomm another step towards becoming one of the most secure silicon vendors in the industry.

 

Qualcomm says that they will offer up to $15,000 per vulnerability. By comparison, Google has numerous vulnerability bounties that range from $500 to $20,000. Apple, on the other hand offers up to $200,000 per vulnerability discovered on its devices.

Continue reading 'Qualcomm announces vulnerability bounty program' (full post)

Huge cyber attack involved 10s of millions IP addresses

By: Lana Jelic | More News: Hacking & Security | Posted: Oct 23, 2016 3:33 pm

Tens of millions of IP addresses were used to take down popular websites like Twitter, Spotify and Netflix on Friday by so far unknown sources. The DDoS attack on the DynDNS started on Friday morning, but the service was restored around 9:30 AM ET. However, around Friday noon, another attack began. Service was restored at approximately 1:00 PM ET same day, but many users had reported they had issues with certain websites.

 

huge-cyber-attack-involved-10s-millions-ip-addresses_01

 

Dyn reported there was an attempt of a third attack wave, but the were able to successfully mitigate it without customer impact.

 

Dyn issued a statement saying they are continuing their investigation.

 

At this point, we know this was a sophisticated, highly distributed attack involving 10s of millions of IP addresses. We are conducting a thorough cause and forensic analysis and will report what we know in a responsible fashion. The nature and source of the attack is under investigation, but it was a sophisticated attack across multiple attack vectors and internet locations. We can confirm, with the help of analysis from Flashpoint and Akamai, that one source of the traffic for the attacks were devices infected by the Mirai botnet. We observed 10s of millions of discrete IP addresses associated with the Mirai botnet that were part of the attack.

Continue reading 'Huge cyber attack involved 10s of millions IP addresses' (full post)

Major cyber attack knocks out popular websites

By: Lana Jelic | More News: Hacking & Security | Posted: Oct 21, 2016 7:29 pm

Twitter, Spotify, Amazon, Netflix, Reddit, Etsy and many other popular websites went offline earlier today due to a massive cyber attack on the DynDNS, a world renowned Domain Name Servers (DNS) service provider.

 

major-cyber-attack-knocks-popular-websites_01

 

Dyn issued a statement acknowledging the attack.

 

Starting at 11:10 UTC on October 21th-Friday 2016 we began monitoring and mitigating a DDoS attack against our Dyn Managed DNS infrastructure. Some customers may experience increased DNS query latency and delayed zone propagation during this time. Updates will be posted as information becomes available. This attack is mainly impacting US East and is impacting Managed DNS customer in this region. Our Engineers are continuing to work on mitigating this issue.

 

The DDoS attack began this morning, but the service was restored around 9:30 AM ET. However, around noon, another attack began. According to DownDetector's outage map, the DDoS attack is primarily targeting US users.

Continue reading 'Major cyber attack knocks out popular websites' (full post)

This map shows cyber attacks in real-time

By: Lana Jelic | More News: Hacking & Security | Posted: Oct 4, 2016 1:45 pm

Tens of thousands of cyber attacks occur every second, but it's hard to imagine and visualize the number of attacks. Norse, a company from California that provides intelligence to many different companies, has created an interactive map where users can watch the cyber attacks in real-time.

 

cyber-attacks_01

 

The attacks are shown with colored lines that connect the source and the target of the attack. Norse tracks these attacks with the help of more than 8 million sensors located in 47 different countries.

Continue reading 'This map shows cyber attacks in real-time' (full post)

France's new bank cards feature ever-changing digits

By: Sean Ridgeley | More News: Hacking & Security | Posted: Oct 3, 2016 6:02 pm

French digital security company Oberthur Technologies has developed a revolutionary new bank card that should make it very difficult for fraudsters to do any damage to your account. Called Motion Code, the technology sees that three digit PIN on the back of your card change every hour for three years, meaning anyone who steals your card or acquires the digits will have minimal time to spend your money.

 

frances-new-bank-cards-feature-changing-digits_1

 

Most fraud occurs hours or days after cards are stolen, but no doubt the criminals will catch on and spend the money quicker upon recognizing a Motion Code card.

 

The downside is added difficulty in using your card remotely: no longer will you be able to memorize the PIN and use it regardless of whether you have your card on you or not. But for most, it's likely well worth it.

Continue reading 'France's new bank cards feature ever-changing digits' (full post)

Hacker uncovers Vine source code, Twitter pays him $10,080

By: Sean Ridgeley | More News: Hacking & Security | Posted: Jul 26, 2016 5:42 pm

A hacker by the name of Avinash discovered Vine's source code is publicly available, and for his efforts, parent company Twitter has paid him $10,080.

 

hacker-uncovers-vine-source-code-twitter-pays-10-080_1

 

The news is only coming out now, but Avinash presented his findings to Twitter about two months ago, at which point they fixed the issue within five minutes.

 

Tech giants paying hackers for bug bounties is a standard practice; bug bounty hunter Anand Prakash has earned roughly $1 million to date.

Mark Zuckerberg's Twitter, Pinterest accounts hacked

By: Sean Ridgeley | More News: Hacking & Security | Posted: Jun 6, 2016 5:42 pm

Even social media CEOs are susceptible to being hacked, it seems. Over the weekend, a couple of Facebook founder Mark Zuckerberg's social media accounts were compromised by Saudi Arabian hacking group OurMine Team.

 

mark-zuckerbergs-twitter-pinterest-accounts-hacked_1

 

OurMine is said to have found Zuckerberg's information in a recent LinkedIn dump, which they then used to gain control of his Twitter and Pinterest accounts. The group claims his password for both accounts was the surprisingly simple 'dadada', but there's reason to be skeptical of this as it also claimed it had overtaken his Instagram account, which Facebook has denied.

 

Both the Twitter and Pinterest account haven't been terribly active, at least not recently; Zuckerberg's Instagram account hasn't been too active either, although it has been used on a regular basis and multiple times in the last week.

Congress is finally investigating SS7 mobile network security flaw

By: Jeff Williams | More News: Hacking & Security | Posted: Apr 19, 2016 6:05 pm

Cellular networks are already pretty insecure as they are. Voice is sent unencrypted and in the clear despite having the necessary hardware to support even light encryption methods. Spoofing cellular towers, too, isn't exactly the most difficult thing to do either, but that's small potatoes compared to a vulnerability in the Signalling System No. 7 telephony protocol that can allow a potential malefactor to track you across the globe, with relative ease. Congress is now taking an interest and investigating these vulnerabilities.

 

congress-finally-investigating-ss7-mobile-network-security-flaw_1

 

The interest in the issue began with the airing of a 60 Minutes piece where Sharyn Alfonsi and a German computing enthusiast who specializes in nefarious programming techniques, showed off just how easy it is to exploit the SS7 protocol to track cellphone users. To demonstrate their point, the pair recruited US Representative Ted Lieu and asked him to use a new, not modified, iPhone when conducting staff phone calls. With just the phone number, they were able to pinpoint the location of the US Representative wherever he had the phone, and they were even able to record conversations he was having as well. It apparently didn't take much effort on the part of the researchers, either.

 

Mr. Lieu, following the demonstration he took part in, called for an official full investigation into the matter so that the vulnerabilities can be addressed. The flaw is something that potentially affects quite a few different markets, within the US and abroad, which could pose serious privacy issues. Not to mention if someone should use the flaw to target individuals as part of pre-meditated actions.

Continue reading 'Congress is finally investigating SS7 mobile network security flaw' (full post)

Microsoft, Google, Yahoo, Comcast working on better email encryption

By: Jeff Williams | More News: Hacking & Security | Posted: Mar 21, 2016 10:03 pm

Encryption is a very pertinent issue in the modern age. We're at an impasse where certain individuals and groups would rather encryption be the stuff of history, perhaps even segregating encryption strengths like was common during the 80's and 90's. Email encryption isn't exactly the easiest thing to setup and requires a bit of preparation to do right. It can be cumbersome even to those that know what they're doing. A group of tech companies and independent researchers have gotten together to help make encryption of your emails easier, and much more seamless.

 

microsoft-google-yahoo-comcast-working-better-email-encryption_1

 

The new protocol that has been proposed is called SMTP STS, or Simple Mail Transfer Protocol Strict Transport Security, and is designed to ensure a secure, encrypted connection with email servers. It's not a method of encrypting your emails themselves, which would be best served by any free, or paid, PGP solution, but it adds a measure of security to email that helps to make sure that you're messages are at leat going through real, authentic mail servers to get to their destination.

 

What it does is talk those email servers that it's traveling through to determine whether or not the connection is secure and that it's who they say they are. If the server can be authenticated (through the use of certificates and a TLS encryption-based connection), then your message will pass along, knowing that at least that server is legit. If no encryption can be used, then there's the option that the message won't be sent.

Continue reading 'Microsoft, Google, Yahoo, Comcast working on better email encryption' (full post)

State of the Internet says DDoS attacks are up 149% compared to Q3

By: Jeff Williams | More News: Hacking & Security | Posted: Mar 6, 2016 6:16 pm

The State of the Internet report has been released for the fourth quarter of 2015 and it highlights some of the more malicious trends coming from across the Internet. The short of it is, the volume of attacks against websites has increased through nearly every avenue than compared to the third quarter.

 

state-internet-ddos-attacks-up-148-compared-q3_1

 

DDoS's in particular have seen quite the massive increase since last quarter, with a 148.85% increase in overall occurrences. The bright side is that duration seems to have been shortened, probably due to the pay-per-play nature of the services that seem to be the most used. But that didn't stop those sites from being targeted multiple times, up to 24 times in some cases. The good news is that the actual number of packets sent was lower. How very nice of these attackers.

 

Size of attacks seemed to be below 30Mbps, with only four that exceeded that amount and two that peaked even higher. The biggest were at around 309Gpps with 202Mpps (packets per second).That's actually a small decline in the number of big attacks, but 44.44%. But the interesting part is that the majority of attacks, some 54.45% of all the DDoS activity was focused on the gaming sector. People are getting more and more mad during and after online matches, preventing people, servers and games themselves from working right. Not to mention the massive attack on Xbox Live and the PlayStation Network.

loading