Apple refutes the security vulnerabilities disclosed as part of WikiLeaks Vault 7 ‘Dark Matter’
A day after WikiLeaks published its second archive of the Central Intelligence Agency (CIA) files claiming the agency developed hacking devices for Apple products, the Cupertino-based tech company has refuted security vulnerabilities in its products. Wikileaks on Thursday released documents, originated with the CIA, which detailed methods for compromising Apple devices if an agent was able to gain physical access to the device, TechCrunch reported. “We have preliminarily assessed the Wikil...
Hackers demand Apple pay up or millions of iCloud accounts will be wiped
Hackers are attempting to extort Apple by threatening to wipe the iCloud accounts and connected devices unless Apple pays a ransom. It's unclear exactly how many accounts were accessed. The post Hackers demand Apple pay up or millions of iCloud accounts will be wiped appeared first on Digital Trends.
Wanna hack your car? Macchina is a plug-and-vroom solution
 You can hack your IKEA furniture to be more awesome. You can hack video games to make your fellow gamers hate your guts. And with the help of Macchina — now on Kickstarter — you can teach your car a few new tricks, too. What could possibly go wrong? Read More ...
G20 countries decide to jointly tackle banking sector hacking
The world’s biggest economies will pledge to jointly fight cyber attacks on the global banking system, one of the biggest coordinated efforts yet to protect lenders since an $81 million heist of the Bangladesh central bank’s account last year. Meeting in the German resort town of Baden-Baden, G20 finance chiefs will agree to fight attacks regardless of their origin and promise cross-border cooperation to maintain financial stability, according to a draft document seen by Reuters. &ld...
WhatsApp and Telegram security flaw: Here’s how hackers make malicious images and take control
Check Point, an Israel-based cyber security company disclosed a serious flaw in popular messaging apps like WhatsApp and Telegram that could allow hackers to take over their accounts. All that was required by the attacker was to send a malicious image file to the victim. As soon as the victim clicked the image, the attacker could control the victim’s account. There are several important things to note about the attack. Even though the flaw has been fixed by WhatsApp as well as Telegra...
Thousands of Twitter accounts hacked by Nazi swastikas
Thousands of Twitter accounts, including high-profile ones belonging to Forbes, Amnesty International and the BBCs North American service, were compromised on Wednesday, resulting in them tweeting propaganda related to Turkeys escalating diplomatic conflict with Germany and the Netherlands. The hijacked accounts have all posted the same Turkish-language tweets with a Nazi swastika followed by the hashtags #Nazialmanya and #Nazihollanda (#NaziGermany and #NaziHolland). The text after the hashtags...
Thousands of Twitter accounts hacked by Nazi swastikas
Thousands of Twitter accounts, including high-profile ones belonging to Forbes, Amnesty International and the BBCs North American service, were compromised on Wednesday, resulting in them tweeting propaganda related to Turkeys escalating diplomatic conflict with Germany and the Netherlands. The hijacked accounts have all posted the same Turkish-language tweets with a Nazi swastika followed by the hashtags #Nazialmanya and #Nazihollanda (#NaziGermany and #NaziHolland). The text after the hashtags...
Thousands of Twitter accounts hacked by Nazi swastikas
Thousands of Twitter accounts, including high-profile ones belonging to Forbes, Amnesty International and the BBCs North American service, were compromised on Wednesday, resulting in them tweeting propaganda related to Turkeys escalating diplomatic conflict with Germany and the Netherlands. The hijacked accounts have all posted the same Turkish-language tweets with a Nazi swastika followed by the hashtags #Nazialmanya and #Nazihollanda (#NaziGermany and #NaziHolland). The text after the hashtags...
Thousands of Twitter accounts hacked by Nazi swastikas
Thousands of Twitter accounts, including high-profile ones belonging to Forbes, Amnesty International and the BBCs North American service, were compromised on Wednesday, resulting in them tweeting propaganda related to Turkeys escalating diplomatic conflict with Germany and the Netherlands. The hijacked accounts have all posted the same Turkish-language tweets with a Nazi swastika followed by the hashtags #Nazialmanya and #Nazihollanda (#NaziGermany and #NaziHolland). The text after the hashtags...
Pokemon GO News Update: new ways to hack the game
Niantic’s efforts to stop hacking of Pokemon GO seem to have gone away – at least, so seems to think the Reddit masses. As a result, several methods for mayhem have surfaced, or re-surfaced with new techniques. Players are currently able to walk around the world with a simple joystick controller on their smartphone device in Pokemon GO without hacking … Continue reading...
Public sector banks are pulling their act together and aiming at getting cyber insurance policies
Public sector banks as now looking to cover themselves against damages caused by cyber, in the wake of an increasing number of customers adopting digital transactions. The banks are aiming at covering themselves against hacking attacks that include data loss and damages caused by the loss of the data. The move comes immediately after RBI ruled that every bank must report incidents related to cyber breach or frauds around digital transactions. Major private players are already covered by insuranc...
Public sector banks are pulling their act together and aiming at getting cyber insurance policies
Public sector banks as now looking to cover themselves against damages caused by cyber, in the wake of an increasing number of customers adopting digital transactions. The banks are aiming at covering themselves against hacking attacks that include data loss and damages caused by the loss of the data. The move comes immediately after RBI ruled that every bank must report incidents related to cyber breach or frauds around digital transactions. Major private players are already covered by insuranc...
Superintelligent AI explains Softbank’s push to raise a $100BN Vision Fund
 Anyone who’s seen Softbank CEO Masayoshi Son give a keynote speech will know he rarely sticks to the standard industry conference playbook. And his turn on the stage at Mobile World Congress this morning was no different, with Son making like Eldon Tyrell and telling delegates about his personal belief in a looming computing Singularity… Read More ...
Superintelligent AI explains Softbank’s push to raise a $100BN Vision Fund
 Anyone who’s seen Softbank CEO Masayoshi Son give a keynote speech will know he rarely sticks to the standard industry conference playbook. And his turn on the stage at Mobile World Congress this morning was no different, with Son making like Eldon Tyrell and telling delegates about his personal belief in a looming computing Singularity… Read More ...
Hacker drone could extract data from your computer by ‘reading’ blinking lights
Security experts at Ben-Gurion University in Israel have demonstrated how hackers could extract data from your computer using a drone, USB stick, and the blinking lights on your machine. The post Hacker drone could extract data from your computer by ‘reading’ blinking lights appeared first on Digital Trends.
FBI starts three probes in suspected Russian hacking of U.S presidential elections
The U.S. Federal Bureau of Investigation is pursuing at least three separate probes relating to alleged Russian hacking of the U.S. presidential elections, according to five current and former government officials with direct knowledge of the situation. While the fact that the FBI is investigating had been reported previously by the New York Times and other media, these officials shed new light on both the precise number of inquires and their focus. The FBI’s Pittsburgh field office, which...
Cracking the IMEI: Here is why the unique identity number of your phone is crucial
The smartphone has become the most popular and probably the most important consumer electronic device today. The year 2016 saw 2.1 billion smartphone users globally and by 2020, the number is expected to grow to 2.87 billion according to a report by Statista. With the rise in number of users, there has also been a rise in the number of mobile phone thefts. According to a survey report from 2013, about 3.1 million smartphones were stolen in the US alone. And that is not the only thing. During the...
Schools in England to offer cyber security lessons
School children in England will be offered lessons in cyber security in a bid to find the experts of the future to defend the UK from attacks, the media reported on Saturday. It is hoped that 5,700 pupils aged 14 and over will spend up to four hours a week on the subject in a five-year pilot, the BBC reported. Classroom and online teaching, “real-world challenges” and work experience will be made available from September. Cyber security is a fast-growing industry, employing 58,000 ex...
Schools in England to offer cyber security lessons
School children in England will be offered lessons in cyber security in a bid to find the experts of the future to defend the UK from attacks, the media reported on Saturday. It is hoped that 5,700 pupils aged 14 and over will spend up to four hours a week on the subject in a five-year pilot, the BBC reported. Classroom and online teaching, “real-world challenges” and work experience will be made available from September. Cyber security is a fast-growing industry, employing 58,000 ex...
Schools in England to offer cyber security lessons
School children in England will be offered lessons in cyber security in a bid to find the experts of the future to defend the UK from attacks, the media reported on Saturday. It is hoped that 5,700 pupils aged 14 and over will spend up to four hours a week on the subject in a five-year pilot, the BBC reported. Classroom and online teaching, “real-world challenges” and work experience will be made available from September. Cyber security is a fast-growing industry, employing 58,000 ex...