Articles about hack

TikTok Had A Vulnerability That Could Have Allowed Hackers To Steal Phone Numbers
It can be dangerous to associate your phone number with online services and apps, but sometimes some services do require it. The reason it’s dangerous is because should a data breach happen, it could result in phone numbers being leaked into the wild, which can then be used for malicious or harassment purposes.

Facebook Users’ Phone Numbers Are Being Sold Through A Telegram Bot
If you ever associated your phone number with your Facebook account in the past couple of years, then you might want to take note that there is a chance your phone number could be shopped around online. This is according to a report from Motherboard in which they are reporting that a Telegram bot is selling access to a database containing these phone numbers.

Microsoft Edge Will Now Tell You When Your Passwords Are Compromised
If you happen to use Microsoft Edge as your browser of choice, you’ll be pleased to learn that Microsoft has recently issued an update to the browser. This update will introduce a new security feature where if it detects that you have a password that has been compromised, it will warn you about it.

Google’s Titan Security Key Vulnerable To Cloning
To prevent their employees from being phished, Google introduced the Titan security key which they then released to the public. This is a USB dongle that authenticates the user whenever it’s plugged into the computer. It sounds like a pretty useful security tool, but it turns out that even such devices are not completely invulnerable to attacks.

Advertising

IBM Claims Hackers Are Targeting COVID-19 Vaccine Supply Chains
Right now, many companies around the world are working to develop a viable vaccine for COVID-19. This is a good thing as it means that the pandemic could be brought under control, or best case scenario, eliminated for good. However, it seems that all the companies rushing to develop their own vaccine has created an opportunity for hackers.

iOS Exploit Could Allow Hackers Remote Access To An iPhone Without The User’s Knowledge
Due to the complexity of platforms like iOS, which needs to manage the features of the software and the hardware, we imagine that there are probably some security flaws that the team at Apple might have missed, which is why every now and then, we come across a story that reports on one of these flaws.

Spotify Starts A Rolling Reset Of Passwords Following Security Issues
Over the past few years, we’ve come across various massive data breaches where usernames, passwords, and other personally identifiable information have been stolen from various locations and then put online in huge databases. It is often a good idea to check every now and then to see if your accounts have been affected, which Spotify is now doing.

Ransomware Attack Shuts Down Baltimore County’s Public Schools
The problem with relying on massive connected networks is that the minute it goes down, all other computers and devices connected to it are affected as well, and will not be able to access it and the information stored on it. Now it looks like this is what Baltimore County Public Schools are facing as they have been hit with a ransomware attack.

Popular Hotel Booking Websites Might Have Exposed Customer Data
Chances are if you’ve booking a hotel online before, you might have used popular platforms like Hotels.com, Expedia, and Booking.com. Unfortunately, it seems that if you have used either of these platforms, your data might have been exposed as a result of a massive data breach that has affected these platforms.

Watch Dogs, A Game About Hacking, Was Hacked
The Watch Dogs franchise is essentially a cyberpunk-style game about hacking, and in a rather ironic turn of events, it appears that hackers have managed to hack Watch Dogs: Legion and stole the source code where they are now threatening to release the code online which could be rather damaging for the company and its intellectual properties.

Don’t Edit iPhone Videos On Windows 10 Until You’ve Patched Your PC
There are plenty of iPhone users who are also Windows users, and as such, some of these users might actually be exporting their photos and videos onto their computers for backup or editing purposes. If you do export your iPhone videos to Windows 10 to edit them on your computer, don’t, at least not until you’ve downloaded the latest Windows 10 patch.

Apple’s T2 Security Chip Has An Ironic Unpatchable Security Flaw
One of the newer hardware features that Apple has been introducing to its products is the T2 security chip. For those who are unfamiliar, the T2 chip was introduced to Apple’s Mac computers not too long ago. It is basically a secure enclave co-processor that helps to secure sensitive information like Touch ID data, encrypted storage, and more.

Instagram Bug Would Have Allowed Hackers To Take Over Your Smartphone
It would seem that Instagram had a particularly nasty bug on their hands when cybersecurity researchers at Check Point Security discovered that this bug, when exploited, would have allowed a hacker to take over the victim’s phone. Yup, the entire phone, not just their Instagram account.

Shopify Reveals That ‘Rogue’ Employees Stole Some Customer Data
If you’ve ever bought something online, there is a chance that you might have used Shopify’s online shopping platform. It is an incredibly popular system that many retailers are using these days, which is why it’s a bit worrying to hear that the company had recently experienced having some customer data stolen.

A Ransomware Attack On A Hospital Could Have Killed A Patient
Ransomware attacks aren’t new, and generally speaking they’re not exactly life-threatening attacks either as the attacks are basically meant to encrypt the data on a computer and hold it hostage, only providing the victims with the decryption key once a ransom has been paid (hence the name).

Bluetooth Vulnerability Put Billions Of Devices At Risk
One of the features of Bluetooth connections is that when you move within range of a previously paired device, it should reconnect almost immediately. This is useful when you have wireless headphones, speakers, or are trying to connect to your car’s infotainment system, but unfortunately, it seems that a flaw in this system has put billions of devices at risk.

Apple Accidentally Approved Malware To Run On Macs
One of the reasons why Apple is so insistent on users getting their apps through the App Store is because of the checks that they put in place to prevent bad actors from getting in. However, it’s a slightly different story for Mac computers where users can download apps from anywhere, which can be dangerous.

Money-Stealing Malware Found Preloaded On Cheap Android Phones
There are plenty of markets around the world that might not have a population that’s willing to shell out $1,000 for a smartphone. This is why there are companies that purely make cheap Android phones to sell to the masses. Obviously there are compromises when you make a cheap phone, such as using less premium materials or using lower-end hardware.

Gmail Bug Would Have Allowed Attackers To Spoof Emails
One of the ways that might result in your online accounts getting compromised is to fall prey to scam emails. While it might be easy to recognize an email as being spam, sometimes when the attacker uses spoofing to trick users into believing it’s a legitimate email, that’s when the trouble begins.

Smartphones Could Be Exploited To Clone Our House Keys
We’ve all heard about keys getting cloned, but that usually involves the person taking your actual key, making a mould, and then recreating that key. This means that if you never let your keys out of your sight, you’re usually safe. However, it seems that might not be that way anymore.