Michael Kan

Author Archives: Michael Kan

Cybersecurity firm offers users reimbursement for ransomware infections

Security firm SentinelOne is confident it can beat any of today’s ransomware -- and is willing to put money behind that claim. The company is offering a new service that will cover up to US$1 million in damages for any customers infected by ransomware. SentinelOne is calling it the “Cyber Threat Guarantee” and treating it like an extended warranty that customers can buy starting Tuesday. However, the company is convinced it won’t have to make any pay outs, said Jeremiah Grossman, its chief of security strategy. SentinelOne’s failure rate in stopping ransomware attacks is “way less than 1 percent,” he said in an interview.To read this article in full or to leave a comment, please click here

FBI probes DNC hack as suspicions of Russian involvement widen

The FBI has launched an investigation into the hacking of the Democratic National Committee’s computers, even as more evidence surfaced of possible Russian involvement in the attack.The data breach was first disclosed last month, when hackers published confidential DNC files, including opposition research on Republican presidential candidate Donald Trump.Then on Friday, Wikileaks published over 19,000 emails that were stolen from the DNC, some of which now threaten to damage the campaign of Democratic presidential candidate Hillary Clinton.To read this article in full or to leave a comment, please click here

FBI probes DNC hack as suspicions of Russian involvement widen

The FBI has launched an investigation into the hacking of the Democratic National Committee’s computers, even as more evidence surfaced of possible Russian involvement in the attack.The data breach was first disclosed last month, when hackers published confidential DNC files, including opposition research on Republican presidential candidate Donald Trump.Then on Friday, Wikileaks published over 19,000 emails that were stolen from the DNC, some of which now threaten to damage the campaign of Democratic presidential candidate Hillary Clinton.To read this article in full or to leave a comment, please click here

This Tinder scam promises to verify your account, but actually sells porn

Tinder users beware. The popular dating app generally doesn’t verify most user accounts, but that hasn’t stopped spammers from pretending to offer the service.In recent weeks, automated bots masquerading as Tinder profiles have been telling real users to get “verified,” as part of a clever scam to sell them porn, security firm Symantec said on Thursday.The spam bots first send off flirty messages, like “Wanna eat cookie dough together some time?” only to then ask whether Tinder has verified the user.It’s a free service, the spam bot will claim, and done “to verify the person you wanna meet isn’t a serial killer lol.”To read this article in full or to leave a comment, please click here

This Tinder scam promises to verify your account, but actually sells porn

Tinder users beware. The popular dating app generally doesn’t verify most user accounts, but that hasn’t stopped spammers from pretending to offer the service.In recent weeks, automated bots masquerading as Tinder profiles have been telling real users to get “verified,” as part of a clever scam to sell them porn, security firm Symantec said on Thursday.The spam bots first send off flirty messages, like “Wanna eat cookie dough together some time?” only to then ask whether Tinder has verified the user.It’s a free service, the spam bot will claim, and done “to verify the person you wanna meet isn’t a serial killer lol.”To read this article in full or to leave a comment, please click here

How Apple and Facebook helped to take down KickassTorrents

It turns out that a couple of purchases on iTunes helped to bring down the mastermind behind KickassTorrents, one of the most popular websites for illegal file sharing. Apple and Facebook were among the companies that handed over data to the U.S. in its investigation of 30-year-old Artem Vaulin, the alleged owner of the torrent directory service. Vaulin was arrested in Poland on Wednesday, and U.S. authorities seized seven of the site’s domains, all of which are now offline. KickassTorrents was accused of enabling digital piracy for years, and investigators said it was the 69th most visited website on the entire Internet. It offered a list of torrent files for downloading bootleg movies, music, computer games and more, even as governments across the world tried to shut it down.To read this article in full or to leave a comment, please click here

How Apple and Facebook helped to take down KickassTorrents

It turns out that a couple of purchases on iTunes helped to bring down the mastermind behind KickassTorrents, one of the most popular websites for illegal file sharing. Apple and Facebook were among the companies that handed over data to the U.S. in its investigation of 30-year-old Artem Vaulin, the alleged owner of the torrent directory service. Vaulin was arrested in Poland on Wednesday, and U.S. authorities seized seven of the site’s domains, all of which are now offline. KickassTorrents was accused of enabling digital piracy for years, and investigators said it was the 69th most visited website on the entire Internet. It offered a list of torrent files for downloading bootleg movies, music, computer games and more, even as governments across the world tried to shut it down.To read this article in full or to leave a comment, please click here

Edward Snowden has developed an iPhone case meant to kill surveillance

National Security Agency whistleblower Edward Snowden has come up with a concept iPhone case that could prevent the government from finding your location.Smartphones, while incredibly useful, are also the “perfect tracking device,” Snowden wrote in a co-authored paper that covers his research.Governments can monitor a user’s location through the radio signals from the phone and this can put journalists, activists, and rights workers in danger, he warned.On Thursday, Snowden and hacker Andrew Huang presented a possible solution. It’s called “the introspection engine,” and it’s designed to alert the user if and when the phone’s radio signals are turned on.To read this article in full or to leave a comment, please click here

Edward Snowden has developed an iPhone case meant to kill surveillance

National Security Agency whistleblower Edward Snowden has come up with a concept iPhone case that could prevent the government from finding your location.Smartphones, while incredibly useful, are also the “perfect tracking device,” Snowden wrote in a co-authored paper that covers his research.Governments can monitor a user’s location through the radio signals from the phone and this can put journalists, activists, and rights workers in danger, he warned.On Thursday, Snowden and hacker Andrew Huang presented a possible solution. It’s called “the introspection engine,” and it’s designed to alert the user if and when the phone’s radio signals are turned on.To read this article in full or to leave a comment, please click here

Edward Snowden has developed an iPhone case meant to kill surveillance

National Security Agency whistleblower Edward Snowden has come up with a concept iPhone case that could prevent the government from finding your location. Smartphones, while incredibly useful, are also the “perfect tracking device,” Snowden wrote in a co-authored paper that covers his research. Governments can monitor a user’s location through the radio signals from the phone and this can put journalists, activists, and rights workers in danger, he warned. On Thursday, Snowden and hacker Andrew Huang presented a possible solution. It’s called “the introspection engine,” and it’s designed to alert the user if and when the phone’s radio signals are turned on.To read this article in full or to leave a comment, please click here

Edward Snowden has developed an iPhone case meant to kill surveillance

National Security Agency whistleblower Edward Snowden has come up with a concept iPhone case that could prevent the government from finding your location. Smartphones, while incredibly useful, are also the “perfect tracking device,” Snowden wrote in a co-authored paper that covers his research. Governments can monitor a user’s location through the radio signals from the phone and this can put journalists, activists, and rights workers in danger, he warned. On Thursday, Snowden and hacker Andrew Huang presented a possible solution. It’s called “the introspection engine,” and it’s designed to alert the user if and when the phone’s radio signals are turned on.To read this article in full or to leave a comment, please click here

Hackers are targeting the Rio Olympics, so watch out for these cyberthreats

The Olympic Games in Rio de Janeiro will attract more than just athletes and tourists this year. Hackers from across the world will also be on the prowl, trying to exploit the international event.  That means visitors to the Olympics and even people watching from home should be careful. Cyberthreats related to the games will probably escalate over the coming weeks and could creep into your inbox or the websites you visit.Don't click if it's too good to be true The Olympics have become a beacon for cyber criminals, said Samir Kapuria, senior vice president with security firm Symantec. A great deal of money is spent on the international event, so hackers naturally want a slice of the pie, he added.To read this article in full or to leave a comment, please click here

Hackers are targeting the Rio Olympics, so watch out for these cyberthreats

The Olympic Games in Rio de Janeiro will attract more than just athletes and tourists this year. Hackers from across the world will also be on the prowl, trying to exploit the international event.  That means visitors to the Olympics and even people watching from home should be careful. Cyberthreats related to the games will probably escalate over the coming weeks and could creep into your inbox or the websites you visit.Don't click if it's too good to be true The Olympics have become a beacon for cyber criminals, said Samir Kapuria, senior vice president with security firm Symantec. A great deal of money is spent on the international event, so hackers naturally want a slice of the pie, he added.To read this article in full or to leave a comment, please click here

Hackers have targeted 130 restaurants at Cicis pizza chain

More than 130 restaurants at the Cicis pizza chain were the recent target of hackers, and customers' credit card data may have been stolen.The company reported the data breach on Tuesday and posted a list of the restaurants affected, most of which are located in Texas.The hackers struck by secretly installing malware into the restaurant’s point-of-sale systems. Other companies, including fast-food chain Wendy’s and retailer Target, have been attacked in the same way in order to steal payment card data.To read this article in full or to leave a comment, please click here

Hackers have targeted 130 restaurants at Cicis pizza chain

More than 130 restaurants at the Cicis pizza chain were the recent target of hackers, and customers' credit card data may have been stolen.The company reported the data breach on Tuesday and posted a list of the restaurants affected, most of which are located in Texas.The hackers struck by secretly installing malware into the restaurant’s point-of-sale systems. Other companies, including fast-food chain Wendy’s and retailer Target, have been attacked in the same way in order to steal payment card data.To read this article in full or to leave a comment, please click here

OurMine is now breaking into Minecraft accounts

The same hacking group that took over Mark Zuckerberg's Twitter account has now found a way to break into accounts connected to the hit game Minecraft.The group, OurMine, made the claim on Tuesday in a video demonstrating its hack. The attack is aimed at the user login page run by Minecraft's developer, Mojang.OurMine isn't revealing all the details behind the hack. The group said it works by stealing the Internet cookies from the site, which can be used to hijack any account. All that OurMine needs is the victim's email address.To read this article in full or to leave a comment, please click here

OurMine is now breaking into Minecraft accounts

The same hacking group that took over Mark Zuckerberg's Twitter account has now found a way to break into accounts connected to the hit game Minecraft.The group, OurMine, made the claim on Tuesday in a video demonstrating its hack. The attack is aimed at the user login page run by Minecraft's developer, Mojang.OurMine isn't revealing all the details behind the hack. The group said it works by stealing the Internet cookies from the site, which can be used to hijack any account. All that OurMine needs is the victim's email address.To read this article in full or to leave a comment, please click here

The hacking group that pwned Zuckerberg’s Twitter account broke into Minecraft

The same hacking group that took over Mark Zuckerberg's Twitter account said on Tuesday it had found a way to break into accounts connected to the hit game Minecraft. The group, OurMine, made the claim in a video in which it demonstrated the hack, which was aimed at the user login page run by Minecraft's developer, Mojang. Later on Tuesday, Microsoft, which bought Mojang two years ago, said it had fixed the issue.To read this article in full or to leave a comment, please click here

The hacking group that pwned Zuckerberg’s Twitter account broke into Minecraft

The same hacking group that took over Mark Zuckerberg's Twitter account said on Tuesday it had found a way to break into accounts connected to the hit game Minecraft. The group, OurMine, made the claim in a video in which it demonstrated the hack, which was aimed at the user login page run by Minecraft's developer, Mojang. Later on Tuesday, Microsoft, which bought Mojang two years ago, said it had fixed the issue.To read this article in full or to leave a comment, please click here

How a healthcare hacker is pressuring victims to pay up

Pay up or face your patients' wrath.That’s how one hacker is trying to shake down U.S. healthcare providers after stealing sensitive data about their patients.TheDarkOverlord claims to have stolen 10 million patient records and is selling them on the black market. In the meantime, the hacker is trying to extort the providers by telling them their patient data won't be sold if they pay a ransom.At least one of the healthcare providers so far has refused to give in, TheDarkOverlord said in an interview Friday. To apply pressure, the hacker claims to have called some of its patients to warn them their records will be leaked if the provider doesn't pay up.To read this article in full or to leave a comment, please click here

1 26 27 28 29 30 37