Tag Archive for: Hacks

Here’s what Apple thinks about the black market for $1 million iPhone hacks

So when a hacker finds a vulnerability, they don’t have to sell it to a malicious actor or the FBI — they can sell it back to the company. Microsoft, Facebook, and Google all offer bug bounties. Apple doesn’t. One reason could be that Apple doesn’t …
mac hacker – BingNews

Hacks! Breaches! Skimming! And some good news, too… [Chet Chat Podcast 225]

Chester’s back from vacation, and so is the Chet Chat. We look back at 2015 – and remind you that there’s good news amongst the bad!
Naked Security – Sophos

The most innovative and damaging hacks of 2015

Not a week went by in 2015 without a major data breach, significant attack campaign, or serious vulnerability report. Many of the incidents were the result of disabled security controls, implementation errors, or other basic security mistakes, highlighting how far organizations have to go in nailing down IT security basics.

But looking beyond the garden-variety attacks and vulnerabilities lends great insight into the future of malicious activity and how to defend against it. And 2015 had its share of intriguing invasions, each of which highlighted the modified techniques that lead to new forms of breaches or pinpoint areas in need of new defenses. The past year saw cyber criminals adopting innovative approaches and state-sponsored actors becoming bolder. Motivations shifted, with financial gain no longer the sole reason for launching an attack. Inflicting physical damage, stealing trade secrets, hacking as a form of protest — 2015 was a year in which malicious activity served many ends.

To read this article in full or to leave a comment, please click here

Network World Security

The Worst Hacks of 2015 – Motherboard


Motherboard

The Worst Hacks of 2015
Motherboard
In the last few years, the Russian security firm Kaspersky Lab has helped uncover some of the most secretive and high profile government-led cyberattacks and espionage operations ever, from the landmark Stuxnet to Flame, Red October, and those of the

and more »

flame malware – read more