Saturday, February 15th, 2014
Cyber criminals used data from previous high-profile hacks to break into thousands of Tesco.com accounts.
In total, 2,239 customers are said to have been affected by the incident, which first came to light on Thursday night, as reported by the BBC when it was contacted by some of the affected customers.
Customers reported seeing ...
Posted in Internet, Privacy, Security | No Comments
Thursday, February 13th, 2014
Dozens of self-signed SSL certificates created to impersonate banking, e-commerce and social networking websites have been found on the Web. The certificates don't pose a big threat to browser users, but could be used to launch man-in-the-middle attacks against users of many mobile apps, according to researchers from Internet services ...
Posted in Internet, Mobile, Privacy, Security | No Comments
Thursday, February 13th, 2014
A useful cyber-defensive utility can be turned into a powerful tool for cyber-attackers in the form of full access to millions of users' computers, according to research from Kaspersky Lab regarding an element of Absolute Software’s anti-theft software.
The focus of the Kaspersky research was the Absolute Computrace agent that resides ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Thursday, February 13th, 2014
FireEye Labs has identified a new Internet Explorer (IE) zero-day exploit hosted on a breached website based in the U.S. It’s a brand new zero-day that targets IE 10 users visiting the compromised website–a classic drive-by download attack. Upon successful exploitation, this zero-day attack will download a XOR encoded payload ...
Posted in Internet, Security, Windows | No Comments
Tuesday, February 11th, 2014
Private profiles of Instagram users could be made public as a result of a vulnerability that took almost six months to fix.
The flaw would have enabled hackers to change privacy settings within user profiles to expose potentially sensitive photos to the internet, or to lock down popular pages by marking ...
Posted in Coding, Internet, Privacy, Security | No Comments