Saturday, February 15th, 2014
Cyber criminals used data from previous high-profile hacks to break into thousands of Tesco.com accounts.
In total, 2,239 customers are said to have been affected by the incident, which first came to light on Thursday night, as reported by the BBC when it was contacted by some of the affected customers.
Customers reported seeing ...
Posted in Internet, Privacy, Security | No Comments
Thursday, February 13th, 2014
Dozens of self-signed SSL certificates created to impersonate banking, e-commerce and social networking websites have been found on the Web. The certificates don't pose a big threat to browser users, but could be used to launch man-in-the-middle attacks against users of many mobile apps, according to researchers from Internet services ...
Posted in Internet, Mobile, Privacy, Security | No Comments
Thursday, February 13th, 2014
A useful cyber-defensive utility can be turned into a powerful tool for cyber-attackers in the form of full access to millions of users' computers, according to research from Kaspersky Lab regarding an element of Absolute Software’s anti-theft software.
The focus of the Kaspersky research was the Absolute Computrace agent that resides ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Tuesday, February 11th, 2014
Private profiles of Instagram users could be made public as a result of a vulnerability that took almost six months to fix.
The flaw would have enabled hackers to change privacy settings within user profiles to expose potentially sensitive photos to the internet, or to lock down popular pages by marking ...
Posted in Coding, Internet, Privacy, Security | No Comments
Friday, February 7th, 2014
Attacks recently observed in Poland involved cybercriminals hacking into home routers and changing their DNS settings so they can intercept user connections to online banking sites.
Researchers from the Polish Computer Emergency Response Team (CERT Polska) believe attackers will likely target users from other countries as well in the future using ...
Posted in Internet, Privacy, Security | No Comments