Stefan ATC

598 Flips | 1 Magazine | 3 Following | 211 Followers | @FLIP_ATC | Keep up with Stefan ATC on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Stefan ATC”

Mobile spyware maker leaks 2 million records

mSpy, a commercial spyware solution designed to help you spy on kids and partners, has leaked over 2 million records including software purchases and iCloud usernames and authentication tokens of devices running mSky. The data appears to have come from an unsecured database that allowed security …

Spyware

Teen burglar wakes up California couple, asks to use their Wi-Fi

A couple of 60-somethings in Palo Alto awoke to quite a surprise on Sunday night: a masked intruder standing in their bedroom. While any number of things could have gone wrong at this point, the intruder actually turned out to be rather chill, as masked bandits go, and just asked to use the …

Palo Alto

Ransom Demands and Frozen Computers: Hackers Hit Towns Across the U.S.

Online extortionists search for vulnerabilities, offer instructions on how to pay in bitcoin<p>Town officials in Rockport, Maine, were closing up shop on Friday, April 13, when they realized they couldn’t open files on their computers.<p>After fielding messages from town workers, local …

Public Sector

Police take down the world's largest DDoS-for-hire service

WebStresser launched denial of service attacks for as little as $15.<p>The internet might be slightly safer against distributed denial of service attacks in the near future... slightly. Police in twelve countries have taken down WebStresser, believed to be the world's largest service for paid DDoS …

Hackers Distribute Malware-Infected Media Player to Hundreds of Mac Users

Yet another software supply-chain attack hits popular applications.<p>Hackers managed to compromise the website of a company that develops several popular apps for Apple computers, distributing malware-infected versions of those apps to hundreds of users.<p>Security researchers from antivirus firm ESET …

Dubai police reveal new Scorpion hoverbike at GITEX

Last week's Gulf Information Technology Exposition (GITEX) showcased <i>The Rise of the Machines</i>, one machine rising above them all: a new hoverbike for the Dubai police force. Developed with Russian company Hoversurf using that company's recently released, battery-powered Scorpion-3 model as a base, …

Larry Ellison On Cyber Attacks: 'It's A War -- And We're Losing This Cyberwar'

<i>(Note: After an award-winning career in the media business covering the tech industry, Bob Evans was VP of Strategic Communications at SAP in 2011, and Chief Communications Officer at Oracle from 2012 to 2016. He now runs his own firm, Evans Strategic Communications LLC.)</i><p>CLOUD WARS — Swinging a …

Cyber-attacks

Passwords as we know them are dying, here's what will take their place

Weak passwords offer many hackers an entry point into enterprises. Here's what the future of security will look like.<p>As employees remain the no. 1 …

We Asked 6 Privacy and Legal Experts About Apple’s New Face ID

Here’s an answer to every question you have about Apple’s latest innovation.<p>Apple executives stood on stage Tuesday and revealed the way we'll unlock the brand new iPhone X: with our faces, using a new feature called Face ID.<p>It utilizes the selfie camera's "TrueDepth" camera system—a set of sensors …

11 Tips To Protect Yourself Against Online Romance Scams

You can do a little detective work yourself.<p>Hundreds of thousands of women and men worldwide fall victim to online romance scams every year. Reported losses in the U.S. alone top $230 million annually, although the FBI estimates that only 15 percent of such crimes are reported and the actual losses …

Google: Ransomware victims paid $25 million to hackers

Victims of ransomware attacks have paid hackers more than $25 million to get back their data over the past two years, according to researchers from …

For 20 Years, This Man Has Survived Entirely by Hacking Online Games

A hacker says he turned finding and exploiting flaws in popular MMO video games into a lucrative, full-time, job.<p>Manfred's character is standing still in the virtual world of the 2014 sci-fi online multiplayer game <i>WildStar Online</i>. Manfred, the real life person behind the character, is typing …

Can your smart home be used against you in court?

On a November, 2015 morning in Bentonville, Arkansas, first responders discovered a corpse floating in a hot tub. The home’s resident, James Andrew Bates, told authorities he’d found the body of Victor Collins dead that morning. He’d gone to bed at 1 AM, while Collins and another friend stayed up …

Saudi Arabia warns of new crippling cyberattack

Five years ago Saudi Arabia suffered the world's biggest cyberattack. Now it's on red alert for a repeat.<p>A warning was issued by the elite computer security team that helps guard Saudi Arabia's infrastructure, the Computer Emergency Response Team.<p>"Following a recent cyberattack which targeted …

Cybersecurity

Survey: Americans Have Kinda Just Given Up on Cybersecurity

Two results from the latest survey at the Pew Research Center paint a dismal picture of the typical Americans’ approach to cybersecurity. As it turns …

Personal Information

6 key tips for keeping hackers out of your smart home

If forecasts and research firms have it right, pretty much everything in your home might soon be connected to the internet, from your fridge to your …

iPhone lock screen hack puts your private messages and nude pics at risk

Your iPhone might not be as secure as you think – even when your device is locked and protected with a passcode.<p>Popular tech YouTuber iDeviceHelp has uncovered a new exploit that could potentially give attackers access to your iPhone, including contact information, message logs as well as photos. …

This $5 Device Can Hack Your Locked Computer In One Minute

A new plug and hack device can steal your cookies even if your computer is locked.<p>Next time you go out for lunch and leave your computer unattended at the office, be careful. A new tool makes it almost trivial for criminals to log onto websites as if they were you, and get access to your network …

ATM skimmer caught in the wild by a real security engineer

Whoda thunk it? Tourist/cybersecurity expert Benjamin Tedesco was hanging out in Vienna when he walked up to an ATM. Because he trusts no one he decided to give the reader a little tug and came away with a working skimmer designed to look exactly like the card slot on the original machine.<p>“It pays …

Hackers are using this nasty text-message trick to break into people's accounts

It requires a second level of proof of who you are — typically a code sent to your phone — before you can log in. This prevents anyone from gaining unauthorised access to your account, even if they manage to get hold of your password.<p>However, hackers and hijackers are managing to find ways around …

The shocking truth of how you'll be tracked online and why

A recent study, Online tracking: A 1-million-site measurement and analysis, conducted by researchers at Princeton University discovered that Google …

Google voice search records and keeps conversations people have around their phones – but the files can be deleted

Google could have a record of everything you have said around it for years, and you can listen to it yourself.<p>The company quietly records many of the …

Android News

If You Use Gmail, Hotmail or Yahoo Mail, You Should Change Your Password Now

If you rely on Google, Microsoft, Yahoo or Mail.ru for your emails, you should go change your password right now.<p>Reuters is reporting that Russian hackers have stolen more than 273 million email passwords and are selling them online. If true, this would be the largest security breach since hackers …

Hotmail

U.S. judges can now issue search warrants on computers in any jurisdiction

<i>(Reuters)</i> – The Supreme Court on Thursday approved a rule change that would let U.S. judges issue search warrants for access to computers located in any jurisdiction despite opposition from civil liberties groups who say it will greatly expand the FBI’s hacking authority.<p>U.S. Chief Justice John …

Apple’s best defense against the FBI is the one it can’t share publicly

With Apple vowing to resist all the way to the Supreme Court the FBI’s demands for an iPhone backdoor in the San Bernardino case, many people assume the company is motivated purely by principles and concern for their customers.<p>No doubt these are key reasons for Apple’s stand, and I have great …

This Net-Firing Cannon Can Take Down a Drone Without Destroying It

Behold SkyWall100, the latest in a string of new tools to neutralize problematic drones. This shoulder-mounted cannon can capture a drone with a …

Drones

Pirates hack into shipping company’s servers to identify booty

Pirates used backdoor in shipping company's website to target freighters.<p>When the terms "pirate" and "hacker" are used in the same sentence, usually …

A drone could take out a plane before the UK works out how to police our decentralized sky

“Serious” potential drone collisions are on the increase in the UK according to air safety watchdog the Airprox Board, with 23 near misses with aircraft investigated in just six months last year, including 12 that were given the top danger rating.<p>In December, a drone “came very close to colliding …

Huge rise in hack attacks as cyber-criminals target small businesses

Experts say consequences for SMEs that ignore security risks can be disastrous<p>It seemed like just another ordinary day for staff at vehicle hire company MNH Platinum. Little did they know that the simple click of an email link was about to threaten their entire business.<p>It was early last year when …

Russian Cops Bust Key Members Of World's Busiest Cybercrime Gang: Sources

In November, Russia’s FSB quietly led an operation to take down the world’s most active cybercriminal groups, the operators of the banking malware Dyre, according to a number of sources with knowledge of the matter.<p>Little is known about the investigation, which is ongoing, or who was arrested. One …