Tech content trusted by users in North America and around the world
7,391 Reviews & Articles | 54,157 News Posts

Hacking & Security Posts - Page 4

AVG Chrome extension had a huge security hole, patched just in time

By: Jeff Williams | More News: Hacking & Security | Posted: Dec 30, 2015 12:32 am

One of AVG's Chrome addons, Web TuneUP had a security hole that your could drive a tank into, something that could potentially let websites with malicious code in their CSS take control of your PC, though only in a trivial manner.




The exploit was originally found by Google, who reported it to AVG to have fixed. The initial fix wasn't quite good enough, so they just pushed out a new fix that seems to solve the issue. That being said, it still seems to be vulnerable to XSS attacks, though that should be fixed soon as well.


One generally thinks that antivirus companies are a bit more scrupulous and careful when designing their applications, but this mistake, and a mostly glaring one, calls to question the type of quality control and examination goes on before things go live. But it's best to fly without any addons, because all addons can potentially be security risks. Browse safe!

Pre-installed malware on Raspberry Pi? They were asked to at least

By: Jeff Williams | More News: Hacking & Security | Posted: Dec 29, 2015 3:14 pm

It looks like some enterprising business people approached the Raspberry Pi Foundation with an odd business proposal, to pre-install their malware on the Raspberry Pi mini-computer.



In an email to the Foundation, a company, whose name was obviously redacted, was asking them to make available an exe file for installation (which wouldn't run on Linux anyway) in exchange for a sum of money for the amount of installations they detect.


This kind of tactic is surprising given the sheer audacity of asking a well-known organization, that prides itself on the many security applications of its minuscule box, outright to cheat its customers. It goes without saying that the Raspberry Pi Foundation didn't go along with their idea. It's even more hilarious that these peddlers of malware didn't seem to understand the platform being run on those devices. Maybe they'll ask Microsoft or Apple next?

Continue reading 'Pre-installed malware on Raspberry Pi? They were asked to at least' (full post)

The Hyatt hotels find malware hiding on their systems

By: Jeff Williams | More News: Hacking & Security | Posted: Dec 25, 2015 2:10 am

The Hyatt chain of hotels just yesterday found malware running on their systems that operate the payment processing for their hotels.




In their statement they said that they've launched a full-scale investigation and are cooperating with some of the leading cyber-security experts in order to get the issues resolved. In the meantime, if you happen to have stayed at a Hyatt owned hotel within the past six months, be sure to keep an eye out on your bank accounts just in case something suspicious happens to show up.


How does one get malware onto a payment processing system? It's not terribly hard but there are best practices in place to make sure that it's difficult to do. Segmenting the network used and keeping it separate from other networks used for browsing the web, making sure that a proper IDS is in place to detect weird activity and limiting any IP addresses that actually access those systems processing card data to those on a whitelist. But those don't make it impossible, just harder and more likely to scare away all but the most seasoned and prepared of individuals.

Continue reading 'The Hyatt hotels find malware hiding on their systems' (full post)

Google is testing a new passwordless login system

By: Derek Strickland | More News: Hacking & Security | Posted: Dec 22, 2015 11:10 pm

In an effort to bolster account security, tech giant Google has confirmed that it's testing a new login system that doesn't require passwords.




Google is currently testing a new authentication method that could pave the way to password-free accounts in the near future. Google's method is very much like Yahoo's Account Key logins, which uses smartphone push notifications instead of manual passwords to log into Google accounts. The company's new sans password login method with a small batch of users, and one Reddit user has shared a few details on the new system.


According to an early access tester, the new method is pretty simple and is very much like linking a smartphone to a Roku to use a remote, or tethering a phone to an Xbox One to use Smartglass. Once your phone is linked and authorized to login to your Google account, the app sends a code that's shown on both screens, and users must type the same code to link the devices. Once that's done, users are logged in and can freely use their accounts. Basically Google's new method hinges on syncing, meaning you'll be matching digital pairs rather than typing in a per-session password.

Continue reading 'Google is testing a new passwordless login system' (full post)

Infrastructure hacking isn't a new thing, New York dam lost in 2013

By: Chris Smith | More News: Hacking & Security | Posted: Dec 22, 2015 4:34 pm

While we wrote that relatively small 'Western Nations' such as Australia are under possible infrastructure hacker threat due to low-security measures, news has come to light that a New York dam was infiltrated by Iranian hackers back in 2013.




With the dam being located no more than 20 miles from New York City, this Iranian hack likely came around thanks to Leon Panetta, ex-Defense Secretary, calling out Iran's hacking prowess in October 2012, putting Governments on high alert for possible hacker threats. With this hack taking place and being kept under the covers until recently, it's just one example of how infrastructure infiltration is a very real threat.


This classified dam is one of the very few public accounts of infrastructure control loss, with all major suppliers of electricity, sewage, water and more all linked to the internet.

Not even Hello Kitty is safe, 3.3 million accounts exposed in hack

By: Chris Smith | More News: Hacking & Security | Posted: Dec 21, 2015 6:35 pm is as a massive Hello Kitty community database and contains around 3.3 million accounts, with Gizmodo reporting that this website has been breached, leaking sensitive member information online.




The data stolen from 'sanriotown' includes first and last names, encoded birthdays, member country of origin, email addresses, passwords, password hints and answers, plus various "other data points," says Chris Vickery , researcher from CSO online.


In addition to this hacked database, information from official Hello Kitty websites has also been spotted, including the original .com website, plus .sg, .my, .th and finally If you beleive you have been involved in this hack it is advised that you change your password immediately.

Juniper Networks VPN Firewall security breach probed by the FBI

By: Jeff Williams | More News: Hacking & Security | Posted: Dec 20, 2015 4:02 am

Juniper Networks has had quite the week. On Thursday it seems that some unauthorized code was found to have been inserted into their ScreenOS, which forms the basis for their hardware filewalls. This malicious code would allow a backdoor into the firewall, letting potential attackers decrypt VPN traffic with the keys found inside.




The fun doesn't stop there, however. Now the FBI has now gotten involved and will be investigating the possibility of whether foreign governments had been involved with inserting the malicious code for the purposes of intercepting encrypted communications from government employees.

Continue reading 'Juniper Networks VPN Firewall security breach probed by the FBI' (full post)

Some Linux distros can be hacked by pressing backspace 28 times

By: Anthony Garreffa | More News: Hacking & Security | Posted: Dec 19, 2015 3:51 am

It looks like some Linux distributions have a considerable security hole, with security researchers from the Cybersecurity Group at Polytechnic University of Valencia (UPV) in Spain finding an incredibly easy way to hack into numerous Linux distributions.




The researchers found that by using the Grub2 bootloader, immediately bypasses the lock screen, initiates the "Grub rescue shell" and then grants users the ability to access the system for whatever they need. The team found that pressing the backspace key 28 times triggers a memory error, which then displays the rescue shell. This isn't a massive threat as it means someone has to have physical access to your Linux-based machine, but still - this is quite serious, and considering the security hole wasn't found until now, is shocking to say the least.


Ubuntu, Red Hat, and Debian have all released security patches - so these Linux distributions should now be safe.

VTech hacker arrested by UK police, tied to stolen children's accounts

By: Chris Smith | More News: Hacking & Security | Posted: Dec 17, 2015 3:32 pm

After we reported that the children's toy company, VTech, was hacked recently, exposing the information on over 4.8 million accounts belonging to parents and children, the man believed to be behind this illegal endeavour has now been arrested.




Arrested due to gaining "unauthorized access" to the VTech servers, a 21-year-old man has been arrested in the UK recently, caught by police in Berkshire thanks to the South East Regional Organized Crime Unit. Craig Jones from this unit told the BBC that the investigation is currently sitting in "the early stages," with further inquiries to be made.


The stolen account information included names, email addresses, IP addresses and encrypted passwords, all taken from the VTech Learning Lodge database.

Security software removes spam bots on company Instagram promotions

By: Chris Smith | More News: Hacking & Security | Posted: Dec 16, 2015 2:32 pm

We've all seen bots spamming phishing links on company social media promotions, trying to make use of the companies social networking promotion budget in order to lure in clicks from unsuspecting victims. Taclking the Instagram side of things is a company called Proofpoint, offering a cybersecurity service that aims to limit the exposure these phishing bots receive - named SocialPatrol.




With there being five million monthly active Instagram users in Australia alone and 400,000,000 'Instagrammers' across the globe, Proofpoint's aim is to ensure company promotions stay safe of hackers and retain legitimacy. Quite often when looking at promoted post on social media, customers will switch off when something is covered in "work from home!" or "buy cheap sunglasses here!" statements, sometimes cheapening the brand and possibly resulting in customers turning away.


In a recently issued press release, Global Customer Relations for General Mills Director, Jeff Hagen, spoke positively of this new technology, stating that it has "Helped us control high levels of spam and inappropriate comments on our Instagram accounts," adding "Without the Proofpoint SocialPatrol technology, our only recourse would have been costly expansion of our manual moderation or risk losing followers." While this will likely have little affect on the tech savvy audience TweakTown normally gathers, this technology should be a great invention for the elderly and youngster population alike, further helping protect them from threats online.

Continue reading 'Security software removes spam bots on company Instagram promotions' (full post)