Hacking News, Page 3 ▼

Hilton Confirms Malware Targeted Payment Card Information

11/24/2015, A couple of months ago it was reported that the Hilton hotel chain might have been the target of a hack. The company claimed at that time that they were investigating the issue and it looks like we have bad news for you guys. If you have recently stayed...

54 Starwood Hotel Chain Properties Infected By Credit Card Malware

11/22/2015, Starwood, the luxury hotel group that owns and operates dozens of properties across the globe, has confirmed that 54 of its properties were caught in a malware attack designed to harvest credit and debit card information from cash registers and payment...

Anonymous Releases Guide On How You Can Help Hack ISIS

11/18/2015, As many of you guys have heard by now, the hackers collective known as Anonymous has publicly declared cyberwar on ISIS following the attacks in Paris, France. So far the group has reportedly managed to get multiple social media accounts that are...

US Considering “Hack Back” Options Against China

11/17/2015, There have been several reports in the past of how hackers in China have been hacking into the systems of US companies and stealing their data. So far not much can be done save for going after them legally, but sometimes that can be a long and drawn out...

FCC Clarifies That It Is Legal To Hack Your Own Router

11/15/2015, When the term “hack” is used, sometimes it carries negative connotations which is why sometimes when you think about hacking your own phone, computer, or a piece of hardware you own, one has to wonder about the legalities of such an act. Now for those...

Researchers Demonstrate MITM Attacks On Samsung Phones

11/13/2015, A lot of OEMs like to think that their phones are secure, and for the most part we’d like to think that they have done their due diligence too. However sometimes certain loopholes are overlooked which can sometimes lead to disastrous results. Recently...

Biohackers Implant LED Lights Under Their Skin

11/10/2015, Body modifications come in many different forms, with piercings and tattoos being the more common ones that you see these days. However with the advancement in technology, it has led to the rise of biohacking which according to its definition is “the...

Exploit Claims To Be Able To Hack iPhones Remotely

11/02/2015, If there is one gripe that government agencies like the FBI have against devices from Apple is that gaining access to the contents of a locked iPhone is almost impossible, unless you get the passcode from the device’s owner. This is something that Apple...

TalkTalk Attack Suspect Apprehended

10/26/2015, TalkTalk Telecom Plc in the UK has undergone some rather trying times in recent memory, especially when you take into consideration that the British Internet provider has been attacked. Thankfully, UK authorities have stepped forward to inform the masses...

Easily Hacked Smart Kettle Highlights IoT’s Security Issues

10/23/2015, Connected devices like smart thermostats, smart washing machines, smart locks, smart fridges, and etc. are all great ideas. The idea of being able to remotely turn them on, set them on a schedule, adjust themselves based on your needs, and so on are huge...

Fitbit Trackers Can Apparently Be Hacked In 10 Seconds [Update]

10/21/2015, Update – Fitbit’s full statement can be found below. If you have a Fitbit tracker, here’s a bit of troubling news. According to security research Axelle Apvrille, it seems that Fitbit’s series of fitness trackers have a vulnerability that...

Radio Waves Can Control Siri, Google Now

10/14/2015, It looks as though anything that is of the digital age is never 100% secure, although it sure is a whole lot more secure than storing your password on a written piece of paper. Still, this does not mean that we do not do our part in making sure that the...

Hackers Use Fake LinkedIn Profiles Used To Scout Potential Targets

10/08/2015, From time to time you might notice a new friend request pop up on Facebook, or you might see a new follower on Instagram or Twitter, or someone who wants to connect with you on LinkedIn. Sometimes these are spam accounts used to send you advertisements...

Chinese Hackers Breach LoopPay, Samsung Pay Not Affected

10/07/2015, For those unfamiliar, LoopPay is the service that powers Samsung’s mobile payments service, Samsung Pay. According to a recent report by the New York Times, it seems that hackers in China have managed to breach LoopPay, throwing everyone into a frenzy...