Bob

1,622 Flips | 4 Magazines | 7 Following | 18 Followers | @Bob67k9 | Keep up with Bob on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Bob”

Facebook buys black market passwords to keep your account safe

For a data-saturated company of its size and scope, Facebook has markedly managed to avoid the kind of security scandals, breaches and hacks that have affected many other major web companies.<p>Take a closer look, and you'll see why. Though on the surface all seems calm, below the waves the social …

Algorithms

Yahoo-Hack: Gestohlene Daten sollen bereits drei Mal verkauft worden sein

Neue Details zum 500 Millionen Nutzerkonten umfassenden Hack bei Yahoo: Der Angriff soll nicht von einem Staat unterstützt worden sein, und CEO …

Yahoo hack hits 500 million users, but who are the suspects?

<b>Yahoo says "state-sponsored" hackers stole information from about 500 million users in 2014.</b><p>Names, email addresses, telephone numbers, dates of birth and encrypted passwords have been taken.<p>Yahoo advises users to change passwords if they haven't in the past two years.<p>But the tech giant has not yet …

Huge DDoS attack takes down popular security researcher's site

Just a few weeks after helping to bust some of the biggest cyberattack sellers on the web, security researcher Brian Krebs' popular site, <i>KrebsOnSecurity</i>, has been knocked offline by a distributed denial of service (DDoS) attack. Earlier this week, Krebs noted that the site was facing one of the …

Security

This scary new Mac malware will let hackers take over your computer

Up until this year, Mac users never had to worry about malware infecting their computers, but it appears that hackers have finally caught up with the …

How to tell if your Android phone has the HummingBad malware

Bad news: a malicious app has taken hold of about 10 million Android phones around the world, and it's creepy.<p>Security specialist Check Point says …

Apps

Euer digitaler Fußabdruck bei Google: Neuer Dienst „Meine Aktivitäten“ zeigt ihn euch

Google will, dass ihr besser auf dem Laufenden darüber seid, welche Daten das Unternehmen über euch sammelt. Dafür wurde der Service „Meine …

LeakedSource-Daten: 18atcskd2w ist zweitbeliebtestes Passwort

Gleichermaßen überraschend finden sich "3rjs1la7qe" auf dem vierten und "q0tsrbv488" auf dem sechsten Platz. Nach Meinung des Sicherheitsexperten …

Microsoft Is Banning Easy-to-Remember Passwords

You know those really simple, easy-to-remember passwords you use that help you log into apps? Well, Microsoft is banning them from some of its …

Did TeslaCrypt kill its ransomware so it could launch a new product?

Last week saw an unusual development in the field of ransomware: The cybercriminal group that operates the TeslaCrypt malware published a universal decryption key for their software. Any victim can download and use it – and repair files encrypted by TeslaCrypt – so this threat is technically …

LinkedIn password change flaw poses threat to hacked profiles

Make sure you log out of all sessions!<p>Author:<p>Published<p>in LinkedIn, Privacy, Vulnerability 1<p>A vulnerability in LinkedIn’s password change process …

The Petya ransomware just got a whole lot worse

The Petya ransomware now bundles a second file-encrypting program for cases where it cannot replace a computer's master boot record to encrypt its file table.<p>Petya is an unusual ransomware threat that first popped up on security researchers' radar in March. Instead of encrypting a user's files …

How to tell if someone is stealing your Wi-Fi?

Is your Wi-Fi connection sometimes a little sluggish or unresponsive? Perhaps your monthly allowance seems to run out a little too quickly? If that’s the case, then it’s possible that someone might be piggybacking on your home wireless network. This guide will walk you through a few tips to check …

Wi-Fi

Another Day, Another Hack: Passwords and Sexual Desires for Dating Site 'Fling'

The hacker claims to be selling tens of millions of accounts, which include plain text passwords, email addresses, and information about users' sexual desires.<p><i>Quite literally, every day someone gets hacked. Whether that's a telecommunications company having its customer data stolen, or another</i> …

Sicherheitsforscher: Angriffe auf ImageMagick-Lücke nehmen zu

Ein Exploit in Form eines Python-Skripts öffnet auf einem betroffenen Webserver eine Shell. Ein Hacker erhält so die vollständige Kontrolle über die …

Microsoft stopft kritische Löcher in Windows, IE und Edge

Darunter ist auch eine Zero-Day-Lücke, die Nutzer aller Versionen von Internet Explorer betrifft. Insgesamt bringt der Mai-Patchday 15 …

Reddit Is So Insecure, a Bored Hacker Easily Stole a Bunch of Subreddits

A bored hacker is hacking into mods’ accounts and messing with dozens of seemingly random subreddits.<p>A hacker has been stealing and defacing seemingly random subreddits for a couple of weeks—all for shits and giggles and because he was bored.<p>The hacker, who goes by the name BVM, said he's taken …

Viking Horde malware attacks Android devices

Android devices are under siege by yet another breed of malware.<p>Dubbed Viking Horde, the new malware has waged war by infecting certain apps at the Google Play store, researchers at Check Point said Monday. Affected apps include Viking Jump, Parrot Copter, Memory Booster, Simple 2048 and WiFi …

Apps

Don’t do it! 5 ways to upgrade your passwords this #PasswordDay

Happy #PasswordDay!<p>Another year goes by and here we are again, it’s World Password Day, and, hey… it’s that day of the of year when we gather round …

6 Ways Every Company Can Fight Ransomware Attacks

While it's impossible to completely eliminate ransomware vulnerability, these six steps will reduce the risk of falling victim to ransomware attacks and being hacked in general.<p>Recent ransomware attacks on hospitals and medical centers should serve as a wake-up call for organizations of all shapes …

Aging and bloated OpenSSL is purged of 2 high-severity bugs

Padding oracles and memory corruption threats caused by use of older schemes.<p>Maintainers of the OpenSSL cryptographic library have patched …

Adding end-to-end encrypted messaging to your app just got a lot easier

Setting up encrypted communication by yourself is hard. If you’ve ever set up PGP for your email or implemented an off-the-record chat in Pidgin, you know that it can be a clunky, burdensome process. Thankfully, cryptographers are working to make it easier — and a new partnership will make it …

Facebook rewarded a 10-year-old with $10,000 for finding Instagram security flaw

Earlier this year, a 10-year-old — who is not even old enough to sign up on Facebook — impressed Mark Zuckerberg by hacking Instagram, the photo-sharing application owned by Facebook. The Helsinki-based boy genius, called Jani, received $10,000 from Facebook for identifying a security bug, <i>Forbes</i> …

DARPA Is Looking For The Perfect Encryption App, and It’s Willing to Pay

The blue-sky research arm of the Pentagon wants somebody to create the ultimate encrypted messaging app for the US military.<p>While the FBI keeps crying wolf about the dangerous dark future where criminals use technology that's impossible to spy on, the Pentagon's blue-sky research arm wants someone …

Cyber-attacks

How to Stop Hackers From Taking Over Your Computer

Grayson Barnes had just started working at his father’s law firm in Tulsa, Oklahoma when a note popped-up on one of the computer screens. It informed …

Opera VPN: Can the privacy-enhanced browser really protect you online?

Opera Software has released a new version of its developer browser that comes bundled with a virtual private network (VNP) built in. The feature is …

A guy who hacks Macs in his free time thinks he's found a way to stop ransomware in its tracks

Burgess has good reason to be frustrated. Ransomware is a type of computer virus that encrypts its victim's files and demands payment, usually a few hundred dollars in Bitcoin, for the key to restore them.<p>Ransomware with properly-implemented encryption is effectively irreversible without those …

Gesperrte iPhones: Apple lehnt weiterhin Zusammenarbeit mit dem FBI ab

Laut Apple fehlen bisher Beweise, dass die Regierung auf die Hilfe des iPhone-Herstellers angewiesen ist. Als Beispiel nennt es das ohne Apples …

iPhone

Google and Microsoft’s shortened URLs make it easy to spy on people

Shortened URLs are convenient: they’re a whole lot easier to handle than unwieldy strings that email messes up with line breaks when you cut and …

How to secure your wireless network

Make your wireless network really secure<p>Securing your network beyond the password level may seem like a chore but with so many wireless devices in …