Before you throw away that old hard drive, make sure you purge the memory clean. A new study has found that most users are accidentally giving up photos, social security numbers and financial data, by failing to properly delete the files on their recycled hard drives.
Blancco Technology Group, which specializes in data erasure, conducted the study by randomly buying 200 secondhand PC storage drives from eBay and Craigslist. Their goal was to see if the company could recover any of the old data saved inside.
In most cases, it could. 78 percent of the drives contained residual data that could be recovered.To read this article in full or to leave a comment, please click here
A hacker claims to have stolen close to 10 million patient records and is selling them for about US$820,000.Over the weekend, the hacker, called thedarkoverlord, began posting the sale of the records on TheRealDeal, a black market found on the deep Web. (It can be visited through a Tor browser.)The data includes names, addresses, dates of birth, and Social Security numbers – all of which could be used to commit identity theft or access the patient’s bank accounts.These records are being sold in four separate batches. The biggest batch includes 9.3 million patient records stolen from a U.S. health insurance provider, and it went up for sale on Monday.To read this article in full or to leave a comment, please click here
A hacker claims to have stolen close to 10 million patient records and is selling them for about US$820,000.
Over the weekend, the hacker, called thedarkoverlord, began posting the sale of the records on TheRealDeal, a black market found on the deep Web. (It can be visited through a Tor browser.)
The data includes names, addresses, dates of birth, and Social Security numbers – all of which could be used to commit identity theft or access the patient’s bank accounts.
These records are being sold in four separate batches. The biggest batch includes 9.3 million patient records stolen from a U.S. health insurance provider, and it went up for sale on Monday.To read this article in full or to leave a comment, please click here
A hacker claims to have stolen close to 10 million patient records and is selling them for about US$820,000.
Over the weekend, the hacker, called thedarkoverlord, began posting the sale of the records on TheRealDeal, a black market found on the deep Web. (It can be visited through a Tor browser.)
The data includes names, addresses, dates of birth, and Social Security numbers – all of which could be used to commit identity theft or access the patient’s bank accounts.
These records are being sold in four separate batches. The biggest batch includes 9.3 million patient records stolen from a U.S. health insurance provider, and it went up for sale on Monday.To read this article in full or to leave a comment, please click here
Google CEO Sundar Pichai has become the latest tech executive to have a social media account hacked, and the group responsible says more targets will follow.On Sunday, a group of hackers calling themselves OurMine briefly took over Pichai’s account on Quora, a question-and-answer site."We are just testing your security,” the hackers wrote, with the same message auto-posted via Quora to Pichai’s Twitter account. On Monday, the posts had been deleted.OurMine is the same group that hacked the social media accounts of Facebook CEO Mark Zuckerberg earlier this month, and they've claimed other victims too, including the CEO of Spotify and a prominent Amazon executive.To read this article in full or to leave a comment, please click here
Google CEO Sundar Pichai has become the latest tech executive to have a social media account hacked, and the group responsible says more targets will follow.On Sunday, a group of hackers calling themselves OurMine briefly took over Pichai’s account on Quora, a question-and-answer site."We are just testing your security,” the hackers wrote, with the same message auto-posted via Quora to Pichai’s Twitter account. On Monday, the posts had been deleted.OurMine is the same group that hacked the social media accounts of Facebook CEO Mark Zuckerberg earlier this month, and they've claimed other victims too, including the CEO of Spotify and a prominent Amazon executive.To read this article in full or to leave a comment, please click here
Even the noise from your PC’s fans could be used to steal the data inside. Researchers in Israel have found a way to do just by hijacking the fans inside and manipulating the sounds they create.The research from Ben-Gurion University of the Negev shows how data could be stolen from “air-gapped” computers, which are not connected to the Internet.These air-gapped computers are isolated and typically contain the most sensitive information. To hack them, attackers typically need to gain physical access and install malware, possibly through a USB stick. To read this article in full or to leave a comment, please click here
Even the noise from your PC’s fans could be used to steal the data inside. Researchers in Israel have found a way to do just by hijacking the fans inside and manipulating the sounds they create.The research from Ben-Gurion University of the Negev shows how data could be stolen from “air-gapped” computers, which are not connected to the Internet.These air-gapped computers are isolated and typically contain the most sensitive information. To hack them, attackers typically need to gain physical access and install malware, possibly through a USB stick. To read this article in full or to leave a comment, please click here
A U.S. court has ruled that the FBI can hack into a computer without a warrant -- a move which is troubling privacy advocates.The criminal case involves a child pornography site, Playpen, that had been accessible through Tor, a browser designed for anonymous web surfing.The FBI, however, managed to take over the site in 2014, and then tracked down and arrested its members by hacking their computers. This allowed law enforcement to secretly collect their IP addresses.To read this article in full or to leave a comment, please click here
A U.S. court has ruled that the FBI can hack into a computer without a warrant -- a move which is troubling privacy advocates.
The criminal case involves a child pornography site, Playpen, that had been accessible through Tor, a browser designed for anonymous web surfing.
The FBI, however, managed to take over the site in 2014, and then tracked down and arrested its members by hacking their computers. This allowed law enforcement to secretly collect their IP addresses.To read this article in full or to leave a comment, please click here
A U.S. court has ruled that the FBI can hack into a computer without a warrant -- a move which is troubling privacy advocates.
The criminal case involves a child pornography site, Playpen, that had been accessible through Tor, a browser designed for anonymous web surfing.
The FBI, however, managed to take over the site in 2014, and then tracked down and arrested its members by hacking their computers. This allowed law enforcement to secretly collect their IP addresses.To read this article in full or to leave a comment, please click here
Proving who pulled off a cyber attack is never easy and sometimes impossible. That’s the reality investigators face as they try to figure out who breached the network of the Democratic National Committee, which revealed last week that hackers had made off with confidential documents including research on Republican presidential opponent Donald Trump.Russia was fingered as the likely suspect, until a hacker calling himself Guccifer 2.0 stepped up and claimed that he acted alone. But despite what appear to be DNC documents posted by Guccifer online, some security experts remain convinced that a group of skilled Russian hackers was behind the attack - likely acting on behalf of the Russian government. Here's why they think that:To read this article in full or to leave a comment, please click here
Proving who pulled off a cyber attack is never easy and sometimes impossible. That’s the reality investigators face as they try to figure out who breached the network of the Democratic National Committee, which revealed last week that hackers had made off with confidential documents including research on Republican presidential opponent Donald Trump.Russia was fingered as the likely suspect, until a hacker calling himself Guccifer 2.0 stepped up and claimed that he acted alone. But despite what appear to be DNC documents posted by Guccifer online, some security experts remain convinced that a group of skilled Russian hackers was behind the attack - likely acting on behalf of the Russian government. Here's why they think that:To read this article in full or to leave a comment, please click here
The privacy settings on your phone don’t mean much if tech companies choose to ignore them. One major mobile advertiser allegedly did just that.The company InMobi was secretly tracking user locations, regardless of consent, the U.S. Federal Trade Commission alleged on Wednesday. The motive: to serve location-based ads over mobile apps.InMobi is headquartered in India and partners with thousands of apps to offer advertising. This gives the company access to 1.5 billion devices.Collecting user information to serve tailored ads is all too common, but InMobi did so through deception, the FTC alleged. The company stated it would only collect the location-based data if given permission, however, InMobi secretly collected it anyway, the agency said.To read this article in full or to leave a comment, please click here
The privacy settings on your phone don’t mean much if tech companies choose to ignore them. One major mobile advertiser allegedly did just that.The company InMobi was secretly tracking user locations, regardless of consent, the U.S. Federal Trade Commission alleged on Wednesday. The motive: to serve location-based ads over mobile apps.InMobi is headquartered in India and partners with thousands of apps to offer advertising. This gives the company access to 1.5 billion devices.Collecting user information to serve tailored ads is all too common, but InMobi did so through deception, the FTC alleged. The company stated it would only collect the location-based data if given permission, however, InMobi secretly collected it anyway, the agency said.To read this article in full or to leave a comment, please click here
Android users beware: a new type of malware has been found in legitimate-looking apps that can “root” your phone and secretly install unwanted programs.The malware, dubbed Godless, has been found lurking on app stores including Google Play, and it targets devices running Android 5.1 (Lollipop) and earlier, which accounts for more than 90 percent of Android devices, Trend Micro said Tuesday in a blog post.Godless hides inside an app and uses exploits to try to root the OS on your phone. This basically creates admin access to a device, allowing unauthorized apps to be installed.To read this article in full or to leave a comment, please click here
Android users beware: a new type of malware has been found in legitimate-looking apps that can “root” your phone and secretly install unwanted programs.The malware, dubbed Godless, has been found lurking on app stores including Google Play, and it targets devices running Android 5.1 (Lollipop) and earlier, which accounts for more than 90 percent of Android devices, Trend Micro said Tuesday in a blog post.Godless hides inside an app and uses exploits to try to root the OS on your phone. This basically creates admin access to a device, allowing unauthorized apps to be installed.To read this article in full or to leave a comment, please click here
Don’t be surprised if you see spam coming from the top websites in the world. Lax security standards are allowing anyone to "spoof" emails from some of the most-visited domains, according to new research.Email spoofing — a common tactic of spammers — basically involves forging the sender’s address. Messages can appear as if they came from Google, a bank, or a best friend, even though the email never came from the actual source. The spammer simply altered the email’s "from" address.Authentication systems have stepped in to try and solve the problem. But many of the top website domains are failing to properly use them, opening the door for spoofing, according to Sweden-based Detectify, a security firm.To read this article in full or to leave a comment, please click here
Don’t be surprised if you see spam coming from the top websites in the world. Lax security standards are allowing anyone to "spoof" emails from some of the most-visited domains, according to new research.Email spoofing — a common tactic of spammers — basically involves forging the sender’s address. Messages can appear as if they came from Google, a bank, or a best friend, even though the email never came from the actual source. The spammer simply altered the email’s "from" address.Authentication systems have stepped in to try and solve the problem. But many of the top website domains are failing to properly use them, opening the door for spoofing, according to Sweden-based Detectify, a security firm.To read this article in full or to leave a comment, please click here
One lone hacker has tried to take credit for the recent breach of the Democratic National Committee, calling it “easy.” But some security researchers aren’t convinced.On Monday, security company Fidelis Cybersecurity came forward, and agreed that expert hacking groups from Russia were indeed behind the attack.The malware involved was advanced, and at times identical to malware the Russian hacking groups have used in the past, Fidelis said in a blog post on Monday.“This wasn’t ‘Script Kiddie’ stuff,” the company added.It backs the conclusion that security firm CrowdStrike made last week, when the company said two Russia-based hacking groups were behind the breach.To read this article in full or to leave a comment, please click here