hacking Archives - Stuff

hacking

Your car is more likely to be hacked by your mechanic than a terrorist

Hollywood would have us believe our cars are extremely vulnerable to hackers. A hacker remotely logs into the onboard computer of a car on display in a showroom, causing the car to burst through the glass out onto the street – just in the nick of time to block a car chase.

How far should organizations be able to go to defend against cyberattacks?

The deluge of cyberattacks sweeping across the world has governments and companies thinking about new ways to protect their digital systems, and the corporate and state secrets stored within. For a long time, cybersecurity experts have erected firewalls to keep out unwanted traffic and set up decoy targets on their networks to distract hackers who do get in. They have also scoured the internet for...[Read More]

Data breaches are inevitable – here’s how to protect yourself anyway

It’s tempting to give up on data security altogether, with all the billions of pieces of personal data – Social Security numbers, credit cards, home addresses, phone numbers, passwords and much more – breached and stolen in recent years. But that’s not realistic – nor is the idea of going offline entirely. In any case, huge data-collection corporations vacuum up data about almost every American (a...[Read More]

Open-source hardware could defend against the next generation of hacking

Imagine you had a secret document you had to store away from prying eyes. And you have a choice: You could buy a safe made by a company that kept the workings of its locks secret. Or you could buy a safe whose manufacturer openly published the designs, letting everyone – including thieves – see how they’re made. Which would you choose? It might seem unexpected, but as an engineering professor, I’d...[Read More]

The Facebook hack ‘only’ affected 30 million accounts — what we know about the Hackening

Additional information has surfaced that the Facebook hack that occurred on 25 September affected a total of 30 million accounts, instead of the 50 million initially reported. Yup, that makes us feel much better. Thanks Facebook. We already know what happened. Facebook’s ‘View as’ feature was compromised to give hackers access to user accounts. They started out with control of around 400,000 accou...[Read More]

With USB-C, even plugging in can set you up to be hacked

Plugging in the power – or at least what you think is power – to a USB-C powered laptop can connect your computer, and the valuable personal data on it, directly to hackers. Your personal financial information, passwords and documents stored on the laptop could help a cybercriminal steal your identity. The laptop may even be used to attack your employer’s computers and network. The European Union ...[Read More]

British Airways hacking: how not to respond to a cyber attack

Chaos appears to reign at British Airways, where hackers stole the details of around 380,000 customer bookings. There have been some poor responses to cyber attacks on major companies in the past, but the airline’s actions in this case could be one of weakest in recent history. Part of this may be because companies are now required by the EU to report cyber attacks within 72 hours, and because inf...[Read More]

Fax machines and coffee pots – the surprising ways you could be hacked

Hopefully you protect your computers from cyber attacks. You might have anti-virus software on your phone, tablet, laptop or desktop. You might avoid using them to visit suspicious websites and carefully protect your various login details. But it’s no longer just what we typically think of as computers that are connected to the internet and so at risk of cyber attacks. And if multiple devices are ...[Read More]

What Hollywood gets right and wrong about hacking

Technology is everywhere we look, so it’s no surprise that the films and TV we enjoy are similarly obsessed. That’s not to say they manage to get it right when it comes to portraying tech accurately however – and one of their worst areas is computer hacking. I’ve been a Linux system administrator in and out of industry for 20 years. That means I ensure all kinds of internet services such as email,...[Read More]

How everyday devices make you vulnerable to cyber attack – and what to do about it

If you run a business, you’re probably concerned about IT security. Maybe you invest in antivirus software, firewalls and regular system updates. Unfortunately, these measures might not protect you from malicious attacks that enter your systems through everyday devices. On the evening of Friday the 24th of October 2008 Richard C. Schaeffer Jr, the NSA’s top computer systems protection officer was ...[Read More]

Hacking your holiday: how cyber criminals are increasingly targeting the tourism market

Imagine if a hacker shut down the baggage handling system of one of the world’s busiest airports. Or took control of a fleet of autonomous delivery trucks and re-routed them to disrupt rush hour traffic in a major metropolis. What if the hacker then demanded a ransom to unlock the digital networks they’d hijacked? According to the latest State of the Internet report from Akamai, one of the world’s...[Read More]

World Cup: all the ways footballers and fans can be hacked

Visitors to the 2018 World Cup in Russia will be eager to enjoy the football and soak up the culture. But safety concerns are lurking in the background of this tournament. Whether it is the threat of racial abuse, football hooliganism, or falling victim to fraud, many football fans have good reason to be wary. But alongside these traditional threats, travelling fans and players also need to be vig...[Read More]

Lost Password