attack

Latest

  • The facade of an Apple Store with the Apple logo lit up and surrounded by the shape of the Vision Pro headset.

    iPhone users in 92 countries received a spyware attack warning from Apple

    by 
    Sarah Fielding
    Sarah Fielding
    04.11.2024

    Apple notified individuals in 92 countries of possible mercenary spyware attacks on their systems.

  • File photo: Small toy figures with laptops and smartphones are seen in front of displayed Xfinity Internet logo, in this illustration taken December 5, 2021. REUTERS/Dado Ruvic/Illustration/File photo

    Xfinity breach may have affected as many as 35.8 million customers

    by 
    Kris Holt
    Kris Holt
    12.19.2023

    Xfinity says it suffered a data breach in October with attackers likely obtaining usernames, hashed passwords and potentially other sensitive information.

  • Lil Nas X receives the Male Artist of the Year award at the iHeartRadio Music Awards, at Shrine Auditorium in Los Angeles, California, U.S., March 22, 2022.  REUTERS/Mario Anzuoni

    Vevo says an 'unauthorized source' vandalized Drake, Lil Nas X and other YouTube channels

    by 
    Steve Dent
    Steve Dent
    04.06.2022

    If you were trying to watch Taylor Swift, Drake, The Weeknd and other artists on YouTube this morning, you may not have seen what you expected.

  • CD Projekt RED hacked for ransom

    CD Projekt Red says it was hacked but won't pay the ransom

    by 
    Steve Dent
    Steve Dent
    02.09.2021

    CD Projekt Red tweeted that it has been hacked and must pay a ransom or code from games like Cyberpunk 2077 and an “unreleased version of Witcher 3” will be revealed.

  • Baltimore, Maryland, USA Downtown Skyline Aerial.

    A ransomware attack has shut down Baltimore County public schools

    by 
    Kris Holt
    Kris Holt
    11.25.2020

    The city's government was affected by a similar attack last year.

  • An aerial view of the Tesla Gigafactory near Sparks, Nevada, U.S. August 18, 2018. REUTERS/Bob Strong

    Tesla worked with the FBI to block a million dollar ransomware attack

    by 
    Christine Fisher
    Christine Fisher
    08.27.2020

    Tesla avoided a ransomware attack with the help of an honest employee and the FBI.

  • May 3, 2018 Santa Clara / CA / USA - Intel sign located in front of the entrance to the offices and museum located in Silicon Valley, south San Francisco bay area

    Intel's Tiger Lake processors will feature on-chip malware protections

    by 
    Rachel England
    Rachel England
    06.15.2020

    Intel has a new way to defend against malware threats.

  • Samsung

    US Samsung Pay users can't send money internationally after Travelex hack (update)

    by 
    Rachel England
    Rachel England
    01.09.2020

    Travelex's ransomware attack continues to affect people and businesses around the globe -- including those that might not consider themselves affiliated with the company in any way. Engadget can reveal that Samsung Pay's international money transfer service -- which relies on the Travelex platform -- has been suspended as a result of the issues faced by its partner.

  • REUTERS/Jason Redmond

    The first in-the-wild BlueKeep cyberattack isn't as dangerous as feared

    by 
    Jon Fingas
    Jon Fingas
    11.03.2019

    When word broke of the BlueKeep vulnerability in Windows, many feared a repeat of NotPetya and other widespread worms that have wreaked havoc. They might not have to worry quite so much, though. Kryptos Logic has discovered the first known in-the-wild BlueKeep exploit, and it isn't as vicious as feared. The initial attack from a "low-level actor" appears to have scanned the internet and infected vulnerable systems with a cryptocurrency miner, but little else. There are no data wipes, no automatic spreading or other signs of a worm in action.

  • VCG via Getty Images

    Chrome for Android update protects against Spectre-like chip hacks

    by 
    Christine Fisher
    Christine Fisher
    10.17.2019

    Last year, Chrome 67 for desktop introduced Site Isolation to protect users from Spectre-style security threats by making it harder for attackers to steal data from other websites. Now, Chrome 77 is bringing Site Isolation to Chrome on Android.

  • Roman Stavila via Getty Images

    Apple tries to clear up Google's claims about iOS vulnerabilities

    by 
    Christine Fisher
    Christine Fisher
    09.06.2019

    Apple has taken issue with Google's findings about exploit-laden websites injecting malicious code into iPhones. Last week, Google published a blog post describing how a handful of hacked websites had taken advantage of an iOS vulnerability. Today, Apple shared a rebuttal.

  • @ Mariano Sayno / husayno.com via Getty Images

    UN claims North Korea hacks stole $2 billion to fund its nuclear program

    by 
    Rachel England
    Rachel England
    08.13.2019

    United Nations experts say they are formally investigating at least 35 instances of cyberattacks by North Korea in 17 countries, believed to be carried out in a bid to fund its nuclear program. According to a report seen by Associated Press, North Korea has acquired as much as $2 billion from increasingly sophisticated cyber activities against financial institutions and cryptocurrency exchanges.

  • PA Wire/PA Images

    Facebook unveils a 'one-strike' policy for live streaming violations

    by 
    Steve Dent
    Steve Dent
    05.15.2019

    Facebook has unveiled a one-strike policy for live streaming violations in the wake of an extreme right terrorist attack in New Zealand, the company announced. It said users who violate community standards just a single time on Facebook Live could be banned from streaming for a set time, depending on the nature of the violation. "Our goal is to minimize risk of abuse on Live while enabling people to use Live in a positive way every day," wrote Integrity VP Guy Rosen.

  • seksan Mongkhonkhamsao via Getty Images

    Evidence mounts that Russian hackers are trying to disrupt the EU elections

    by 
    Rachel England
    Rachel England
    03.21.2019

    Russian hackers are targeting government systems ahead of the EU parliament election, according to cybersecurity company FireEye. The firm says that two state-sponsored hacking groups -- APT28 (aka Fancy Bear) and Sandworm -- have been sending out authentic-looking phishing emails to officials in a bid to get hold of government information.

  • SIPA USA/PA Images

    Google Photos flaw let attackers grab users' location data

    by 
    Rachel England
    Rachel England
    03.20.2019

    Researchers have revealed a now-patched flaw that would allow hackers to track your location history using Google Photos. Ron Masas, from security company Imperva, explains in a blog post that Google Photos -- which was recently subject to an Android TV bug -- was vulnerable to browser-based timing attacks, which could leverage a photo's image data to approximate the time of a visit to a specific place or country.

  • Farmington City Council

    A single ransomware creator made almost $6 million

    by 
    Rachel England
    Rachel England
    08.01.2018

    The SamSam ransomware, which throttled the city government of Atlanta earlier this year, netted its creators more than $5.9 million in ransom payments, according to a comprehensive report by UK cybersecurity firm Sophos. The report, which details SamSam's activity since its launch in 2015, also reveals that a lone black hat hacker could've raked in the entire haul by themselves.

  • Engadget

    Cortana can be used to hack Windows 10 PCs

    by 
    Rachel England
    Rachel England
    06.13.2018

    Cortana might be super helpful at keeping track of your shopping lists, but it turns out it's not so great at keeping your PC secure. Researchers from McAfee have discovered that by activating Cortana on a locked Windows 10 machine, you can trick it into opening up a contextual menu which can then be used for code execution. This could deploy malicious software, or even reset a Windows account password.

  • PA Wire/PA Images

    Major UK electrical retailer Dixons Carphone confirms it was hacked

    by 
    Rachel England
    Rachel England
    06.13.2018

    One of Europe's largest electrical retailers has been the subject of a cyber attack that's compromised more than 5.9 million card records and as many as 1.2 million personal accounts. Dixons Carphone, the owner of Currys PC World and Dixons Travel stores, says that most of these cards have chip and pin protection and noted that the data accessed doesn't include PIN numbers, card verification values (CVV) or any authentication data "enabling cardholder identification or a purchase to be made." However, some 105,000 cards were from non-EU countries and do not have the chip and pin feature.

  • Getty Images/iStockphoto

    GitHub survives massive DDoS attack relatively unscathed

    by 
    Rob LeFebvre
    Rob LeFebvre
    03.01.2018

    GitHub, a web-based code distribution and version control service, survived a massive denial of service attack on Wednesday. According to a report at Wired, a staggering 1.35 terabits per second (Tbps) of traffic hit the site at once. Within 10 minutes the company called for help from a DDoS mitigation service similar to Google's Project Shield, Akamai's Prolexic, which took over to filter and weed out malicious traffic packets. The attack, says Wired, ended after eight minutes. This may have been the largest DDoS attack ever; Wired notes the attack on domain name server Dyn in late 2016 reached 1.2 Tbps of traffic.

  • Tashatuvango

    Nastier version of IoT botnet could brick your smart toaster

    by 
    Rob LeFebvre
    Rob LeFebvre
    04.25.2017

    Two new versions of a nasty botnet called BrickerBot were spotted in the wild by researcher Pascal Geenens, who reported the latest attack for security firm Radware. Permanent denial-of-service botnets like these can infect poorly-protected IoT devices like smart toasters and web-enabled vibrators to bring down various connected web servers. These new BrickerBot iterations use scripts with even more commands and almost four times as many actual attacks as previous iterations to completely overwhelm their targets.