Hillock

67 Flips | 2 Magazines | 15 Likes | 2 Following | 95 Followers | @hillockink | https://hillock.ink/

New MX Master 2S leaked!

This afternoon, I came across something awesome tweeted at me today. Apparently, the new version of the MX Master mouse by Logitech (or “Logi” if you …

Backyard skinny-dippers lack effective laws to keep peeping drones at bay

Recent advances in technology mean we can no longer rely on fences or barriers around our homes to protect our privacy. This was certainly the case …

Northern Territory

Checking a Website’s Security

<b>Q.</b> <i>I was browsing online and noticed a small letter “i” in a circle. What does that mean? I use the Chrome browser.</i><p><b>A.</b> The web is full of sites that do not use the strongest security, and some browsers — including Google Chrome and Mozilla Firefox — now warn users when the page they are visiting may …

'Relay hack': the cheap, easy way for thieves to steal your car

As cars get increasingly more high-tech, so do car thieves. A number of high profile stories over the past couple of years, including one just today regarding Hyundai, have raised awareness of issues with various vehicles' onboard computer systems that make them vulnerable to high-tech thieves. …

Your headphones aren't spying on you, but your apps are. Here's why.

Lawyers in the US are claiming that headphone and speaker company Bose, is secretly collecting information about what users listen to when they use …

Privacy

Microsoft Edge Flaw Could Hijack Your Twitter (or Any Other) Account

Charles Darwin was many things — a naturalist, a family man, an orator — but he'd never been the victim of a computer hacker until now. A new and …

IT security

The Apache Struts 2 Vulnerability and the Value of Patch Management

Apache Struts is a free, open source framework for creating Java web applications. It’s widely used to build corporate websites in sectors including …

Security-as-a-Service: How mid-market companies achieve network security

Mid-tier companies are battling a black hole of time, security expertise, and budget to procure, implement, and manage a variety of security …

Chipotle Says Its Payment System May Have Been Hacked

The chain "detected unauthorized activity" on its payment system.<p>Chipotle may have been the target of a data breach. The company, which is just starting to recover financially from the impact of a series of food-borne illnesses linked to its restaurants, reported the issue to investors on Tuesday, …

Ashley Madison blackmailers threaten to create Cheater’s Gallery...

Blackmailers are once again trying to make money out of the notorious Ashley Madison hack, which exposed the details of registered members of the …

INTERPOL Operation Sweeps Up Thousands of Cybercrime Servers Used for Ransomware, DDoS, Spam

Massive public-private 'cyber surge' in Asia identifies hundreds of compromised websites in operation that spans multiple cybercriminal groups, …

xDedic Market Spilling Over With School Servers, PCs

Nearly two-thirds of servers and PCs peddled on the xDedic underground marketplace belong to schools and universities based in United States.

FalseGuide Android Malware: More Than 600,000 Phones Turned Into Money-Generating Botnet

An estimated 600,000 Android devices have been infected by malware hidden in guides for popular mobile games and may be used to create a botnet to …

Many security vulnerabilities could be due to people learning to code using bad web tutorials

German researchers found 117 security vulnerabilities they believe were introduced by popular web tutorials.<p>German cybersecurity researchers have …

Ransomware demands now average about $1,000 because so many victims decide to pay up

The average ransomware attack yielded $1,077 last year, new research shows, representing a 266 percent spike from a year earlier.<p>The reason for the …

Cyber criminals are sharing millions of stolen university email credentials

If you have a .edu e-mail address, beware: The account name, password and other personal information associated with that account may be listed online for cyber criminals to buy.<p>The Digital Citizens Alliance is reporting evidence showing threats of numerous kinds — including hacktivists, scam …

Russian Hacker Receives Record 27 Year Jail Sentence in USA

Roman Seleznev has been sentenced to serve 27 years behind bars for stealing and selling millions of credit card numbers.<p>Roman Valeryevich Seleznev, a Russian hacker also know by the hacker handles "Track2," "NCUX," and "Bulba," was sentenced on Friday by U.S. District Judge Richard Jones to serve …

Corruption

Unroll.me cofounder’s rant reminds us to be wary of free services

Today, Perri Chase, a founder of Unroll.me who is no longer affiliated with the company, published a Medium post defending her co-founder and current CEO of the company, Jojo Hedaya after their company was found to be selling user data to Uber. In her post, Chase ineloquently explains that data …

Healthcare CERT warns about ‘Mole’ ransomware – what you need to know

<i>Thanks to Dorka Palotay and Fraser Howard of SophosLabs for their behind-the-scenes work on this article.</i><p>A few readers have asked us about a …

NSA backdoor detected on >55,000 Windows boxes can now be remotely removed

Microsoft dismisses DoublePulsar infection estimates, but otherwise remains silent.<p>After Microsoft officials dismissed evidence that more than 10,000 …

Watch A Very Vulnerable $140 Quadcopter Drone Get Hacked Out Of The Sky

With so many reports of poor security on consumer drones, UAV enthusiasts would be forgiven for thinking manufacturers would have added mitigations against the most basic attacks. But, looking at one particularly popular model of drone, such hopes might be misplaced.<p>Earlier this month, the U.S. …

Drones

Users tell Microsoft to scrap 'pain in butt' Security Update Guide, bring back old bulletins

They're not happy that Microsoft's replaced Patch Tuesday security bulletins with the searchable Security Update Guide.<p>Customers have lambasted …

Information Security

Experience Is the Best Teacher

There is an enormous cyber security skills gap, according to the Information Systems Audit and Control Association (ISACA). In the rush to attract …

Cybersecurity

Threat Spotlight: USB Devices Gone Rogue

Introduction<p>Hak5 recently released a new tool dubbed Bash Bunny. The tool is a reprogrammed USB device that provides all sorts of fun pen-testing …

Information Security

Web Attacks Decline, Ransomware Attacks Surge

Symantec's annual Internet Security Threat Report data shows how attacks last year directly targeted end users, and became more efficient and …

Brickerbot is mysterious antimalware that nukes badly secured Internet of Shit gadgets

The Mirai Worm is a seemingly unstoppable piece of malware that targets the garbage-security Internet of Things gadgets that have proliferated …

Gear & Gadgets

Halt Hackers in Their Tracks With This Simple Key

Hackers talk a lot of smack about their “leet”—that is, elite—skills, but no method of digital burglary is more tried and true than phishing. …

This Hacker Is My New Hero

The hacker’s name is Janit0r. You’ve probably never heard of him, but perhaps you’ve heard of his work. Janit0r is reportedly the one behind a …

DNS Server

Uber is here to stay

I love riding with Uber, but mainly because I can. Taxi services in Poland, where I live, are rather cheap. Still, Uber is much cheaper and better …