Articles about hack (page 5)

WhatsApp Flaw Lets Hackers Alter Your Chats
One of the security features of WhatsApp is support for end-to-end encryption. This means that messages sent and received through WhatsApp are encrypted, which in theory means that no one would be able to intercept and read your messages mid-transmission. However, security researchers at Check Point are now suggesting otherwise.

Modified Lightning Cable Lets Hackers Remotely Access Your Computer
Apple’s official accessories are pretty expensive and that is a reason why many users opt to use cheaper and unofficial accessories that cost a fraction of the price. However, potential safety and compatibility issues aside, there is a good reason to avoid using these unofficial accessories.

Biohacker Implants RFID Chip Into Her Arm To Unlock Her Tesla Model 3
The idea of implanting technology into our bodies isn’t exactly new. However, it seems that one particular biohacker by the name of Amie DD has gone one step further by implanting an RFID chip into her arm, which in turn could be used by her to unlock the door to her Tesla Model 3 vehicle.

Capital One Disclose Massive Data Breach That Affected 100 Million Customers
Banks hold a lot of sensitive information about us, such as our money, where it comes from, who it’s being sent to, our home addresses, credit card numbers, contact information, and so on. This means that should such data ever get out, it could spell big trouble for both the bank and their customers.

Advertising

New Malware Discovered, Can Steal Data From Both iOS And iCloud Accounts
Law enforcement agencies have been trying to find a way to get into Apple’s products, such as their iOS devices and iCloud. This is because they believe that some suspects could be hiding evidence on their devices, but unfortunately due to the way Apple has created their products, it is rather difficult for law enforcement to get in.

Flaw Discovered In Mac Video Conferencing Client Lets Hackers Enable Your Webcam
If you’ve ever seen photos of people’s laptops with their webcams covered or taped up, it is because there is a legit concern about how the webcams on our laptops can be hijacked to be enabled without our knowledge. Given that they’re built into the display, it’s not as if we can point it away or unplug it so easily.

Security Company Claims To Be Able To Pull Data From Any iOS Device
Cellebrite, for those unfamiliar, is an Israeli mobile security company who gained attention when it was revealed that they had managed to crack Apple’s iPhones, allowing them to gain access to the contents of the device without needing the passcode or biometric authentication from the owner of the device.

Instagram Is Testing An Easier Way For Users To Recover Hacked Accounts
There is a good reason to choose strong and secure passwords and also to enable 2FA whenever you can. Sure, it might be more troublesome, but the trouble now might be worth it in the future compared to trying to recover a stolen account. For anyone who has experienced trying to recover a hacked account, you know what we mean.

Telegram CEO Blames Recent Issues On A ‘State Actor’ Attack
As some of you might have heard, Telegram had recently experience some connectivity issues in which a DDoS attack was to blame. However, it seems that this was more than just a regular DDoS attack, it was one that could have been orchestrated by a country, or at least that’s what Telegram’s CEO, Pavel Durov is implying.

Hackers Steal Traveler Photos, License Plates From US Customs
Whenever you travel to a new country, you usually need to hand over information about yourself, such as your passport. Some countries might even require you to scan your fingerprints, take a photo, and if you’re driving, you might also need to submit the license plate of your vehicle.

Hackers Could Steal Your Password By Hearing How You Type
Your password can be stolen in a variety of ways. The most common way is by using a very easy-to-guess password in which hackers won’t even need to try too hard to break into your account. Other more complex ways involve phishing, where hackers create a website that mimics the website of a service you use and once you enter your credentials, that information is stolen.

19 Million Patient Records Stolen From Quest Diagnostics and LabCorp
We all sign up for a variety of services, both online and offline, and usually these services require us to provide personal information, such as our names, phone numbers, home addresses, personal identification numbers, and so on. It is usually assumed that the information will be stored safely and securely, but unfortunately, that isn’t always the case.

Database Exposes Security Details For Several Major Hotel Chains
In recent years, we have been hearing reports of how some major hotel chains have had their databases hacked which exposed a ton of customer information in the process. Unfortunately, it seems that a new leak has been discovered which could potentially be worse than the previous leaks.

Teen Who Hacked Apple Was Hoping They Would Offer HIm A Job
For the most part, hacking is considered an illegal activity. Unfortunately, despite its illegal nature, many still go about doing it. Sometimes, and only sometimes, those efforts pay off where there are some companies and organizations who are so grateful and/or impressed with the hackers that they offer them a job instead of pursuing legal charges against them.