EricSB

14 Flips | 1 Magazine | @EricSB | Professional Software Engineer, InfoSec enthauiest.

JP Morgan’s security breach points to broader issues in cyber security

Recent revelations surrounding hacker attacks infiltrating JPMorgan Chase & Co. leave questions about why we’re seeing an increasing number of successful attacks on major institutions. It turns out that protecting an institution full of personally identifiable information is more complex than just …

Here’s What We Know So Far About The Celebrity Photo Hack

<b>UPDATE</b>: Clearly this post was written very early on in this incident and information has since come to light which suggests Apple has majorly dropped the ball.<p><b>Original post:</b><p>As you will by now have probably read, around 100 women celebrities (including Jennifer Lawrence, Ariana Grande, Victoria …

Associated Press News

Celebrity iCloud Accounts Compromised by Weak Passwords, Not iCloud Breach

A breach of Apple's iCloud and Find My iPhone service was not involved in the recent hacking incident that saw the private photos and videos of several celebrities leaked onto the Internet, according to a press release just issued by Apple.<p>Instead, celebrity iCloud accounts were compromised by a …

Gang of hackers behind nude celebrity photo leak routinely attacked iCloud

A gang of hackers who collected and traded nude pictures of female celebrities by routinely breaking into Apple's iCloud system were the source of private photographs leaked online, new evidence shows.<p>Private photos and videos of more than 100 mostly female American and British stars were released …

Celeb hacking scandal shows digital vulnerability

LOS ANGELES (AP) — To keep private pictures private, never upload them online.<p>That's the advice experts offer after hackers broke into female …

Leaked Nude Images Reveal Celebs' Location Information

Our devices are way too adept at collecting information about us. When we take photos with GPS-enabled cameras and smartphones, they often add a geotag to mark the spot where the image was taken, which is bad news for the many high-profile individuals whose photos leaked online this weekend. On top …

Home Depot Investigating Potentially Massive Credit Card Breach

Did you just get your credit card replaced after the Great Target Fiasco of 2013?<p>Don’t get too used to that new card. It’s starting to look like it’s that time again.<p>Home Depot has confirmed that it’s investigating some “unusual activity” with regards to its customer data, and the consistently …

Malicious software in cash registers could affect more than 1,000 US retailers, gov't warns

More than 1,000 U.S. retailers could be infected with malicious software lurking in their cash register computers, allowing hackers to steal customer financial data, the Homeland Security Department said Friday.<p>The government urged businesses of all sizes to scan their point-of-sale systems for …

U.S. undercover investigators among those exposed in data breach

BOSTON/WASHINGTON (Reuters) - A cyber attack at a firm that performs background checks for U.S. government employees compromised data of at least 25,000 workers, including some undercover investigators, and that number could rise, agency officials said on Friday.<p>A man types on a computer keyboard …

Sneak Attack: Android Apps Can Spy on Each Other

Modern operating systems "sandbox" apps so that they can't affect each other — in theory. Yet three researchers have shown that, at least in Android, one app can "spy" on another and then, at just the right moment, interfere with the targeted app's user display in order to steal passwords, …

Apps

You can steal data from a computer by touching it

Normally, breaking a PC's security involves either finding security exploits or launching brute force attacks, neither of which is necessarily quick or easy. However, a team at Tel Aviv University has come up with a potentially much simpler way to swipe data from a computer: touch it. If you make …

Russian criminals steal 1.2 billion passwords

Russian criminals have stolen 1.2 billion Internet user names and passwords, amassing what could be the largest collection of stolen digital credentials in history, a respected security firm said Tuesday.<p>There's no need to panic at this point -- Hold Security, the firm that discovered the theft, …