Every year hackers descend on Las Vegas in the sweltering August heat to break ground on security research and the most innovative hacks. This year was no different, even if it was virtual. To name a few: Hackers tricked an ATM to spit out cash. A duo of security researchers figured out a way to…
Category: Hackers
Few could ever forget back in 2015 when security researchers Charlie Miller and Chris Valasek remotely killed a Jeep’s engine on a highway with a Wired reporter at the wheel. Since then, the car hacking world has bustled with security researchers looking to find new bugs — and ways to exploit them — in a…
An unnamed U.S. security official told Reuters on Friday that hackers linked to the Chinese government have targeted Moderna, Inc., a Massachusetts-based biotech firm conducting research on vaccines for the Wuhan coronavirus. Moderna representatives confirmed that the company has been in contact with the FBI about “information reconnaissance activities” conducted against it by the Chinese…
A renowned iPhone hacking team has released a new “jailbreak” tool that unlocks every iPhone, even the most recent models running the latest iOS 13.5. For as long as Apple has kept up its “walled garden” approach to iPhones by only allowing apps and customizations that it approves, hackers have tried to break free from…
Magecart hackers have struck again, this time targeting the NutriBullet website. According to new research by security firm RiskIQ, hackers broke into the blender maker’s website several times over the past two months, injected malicious credit card-skimming malware on its payment pages and siphoned off the credit card numbers and other personal data — like…
If there’s one thing certain during a pandemic, it’s that hackers will use it for their own gain. Don’t be too surprised. Every time there’s a major news story, a world event or even regular national events like tax preparation season, hackers jump at the chance to take advantage of the uptick in chatter to…
A newly discovered malware campaign suggests that hackers have themselves become the targets of other hackers, who are infecting and repackaging popular hacking tools with malware. Cybereason’s Amit Serper found that the attackers in this years-long campaign are taking existing hacking tools — some of which are designed to exfiltrate data from a database through…