Two former college graduates are in a lot of trouble after breaking into other students’ accounts and stealing sensitive personal data. They’re facing some serious charges with restitution payments of $35,430, potential jail time, and the threat of very big fines thrown into the mix. What happened? A man from New York has pleaded guilty to one count of aggravated identity theft, and … [Read more...]
Researcher’s audacious hack demonstrates new type of supply-chain attack
Often the most brilliant ideas are the most simple. The hard part is being the first one to come up with the idea and put it to use. One such brilliant yet simple idea belongs to Alex Birsan, a researcher who came up with a method to breach 35 big tech companies including Microsoft, Apple, Yelp, Paypal, Shopify, Netflix, Tesla, and Uber, that’s earned him $130,000 in bug bounties. … [Read more...]
Hackers try to poison Florida City’s drinking water
The FBI, the Secret Service, and the Pinellas County Sheriff’s Office are currently investigating an attempted poisoning of a city by an individual or group of hackers that occurred Friday last week. If it hadn’t been caught in time, at least 15,000 people could have been affected. In a Monday press conference, Pinellas County Sheriff Bob Gualtieri revealed details of this attack to … [Read more...]
SolarWinds advanced cyberattack: What happened and what to do now
Over the weekend we learned more about the sophisticated attack that compromised security firm FireEye, the US Treasury and Commerce departments and likely many more victims. Threat actors hacked into IT company SolarWinds in order to use its software channel to push out malicious updates onto 18,000 of its Orion platform customers. This scenario, referred to as a supply-chain attack, is … [Read more...]
Lock and Code S1Ep19: Forecasting IoT cybersecurity with John Donovan and Adam Kujawa
This week on Lock and Code, we offer something special for listeners—a backstage pass to a cybersecurity training that we held for employees during Cybersecurity Awareness Month, which ended in October. The topic? The future of cybersecurity for the Internet of Things. Our guests, Chief Information Security Officer John Donovan and Security Evangelist and a Director for Malwarebytes Labs … [Read more...]
Explosive technology and 3D printers: a history of deadly devices
Hackers: They’ll turn your computer into a BOMB! “Hackers turning computers into bombs” is a now legendary headline, taken from the Weekly World News. It has rather set the bar for “people will murder you with computers” anxiety. Even those familiar with the headline may not have dug into the story too much on account of how silly it sounds, but it’s absolutely well … [Read more...]
The skinny on the Instacart breach
The COVID-19 outbreak has affected many facets of our lives—from how we visit our families, socialize with friends, meet with colleagues, to how we should be conducting ourselves outside of our homes. Ideally, a few meters apart from everyone else and with a mask on. These—on top of imposed lockdowns—have pushed most people to stay indoors, pushing them to do almost everything they want to do … [Read more...]
EncroChat system eavesdropped on by law enforcement
Due to the level of sophistication of the attack, and the malware code, we can no longer guarantee the security of your device. This text caused a lot of aggravation, worries, and sleepless nights. No one wants to hear the security of their device has been compromised by a malware attack. The good news is that the actual victims of this malware attack were almost exclusively criminals. The bad … [Read more...]
A brief history of video game saves and data modification
Games consoles and handhelds have always been an interesting battleground for hacking activities. The homebrew scene for using hardware in interesting ways has a long and varied history, especially where porting games to run on different platforms is concerned. Tampering with games while playing them to gain a distinct advantage has always been frowned upon by the majority of players and … [Read more...]