We’ve probably all done it in the past: left our computer open, but locked, thinking no one would be able to gain access. But security researchers say we shouldn’t feel so confident about the security of our data, especially now that there’s an inexpensive device that can snatch login credentials from locked computers in a matter of seconds. [More]
In July, boutique hotel chain Kimpton revealed it was investigating indications that its credit card payment system had possibly been the latest to fall victim to a data breach. Now the company has confirmed the bad news, announcing that the payment terminals at dozens of Kimpton hotels, restaurants and bars were compromised for nearly six months. [More]
Last week, Dropbox asked longtime users to update their login credentials after learning that their information may have been compromised nearly four years earlier. At the time, the file-sharing site didn’t say just how many users were affected by this breach, but a new report shows that more than 68 million accounts were involved.
If it’s a day that ends in Y, someone who shouldn’t have access to a system is trying to get access to that system. Unfortunately, today there’s news in the air of two big successes for the bad guys. One has hit 1.7 million web browser users; the other, at least 200,000 registered voters.
Are you a longtime user of Dropbox? Then you might be asked to change your password. Was the online storage service hacked? No… at least not recently. Instead, Dropbox says some login credential may have been compromised nearly four years ago [More]
Apple’s pushing a major iOS security update today that iPhone users will want to download and install as soon as they can.
If you’re worried about the security of mobile banking, you’re not alone. Mobile banking apps use a wide array of complicated passwords, biometric tools (like thumbprint or facial scanning), and two-factor authentication to make sure you’re you before “you” try to mess with your money. But preventing anyone from being able to guess how to log in to your account does no good if your phone’s got malware on it that gives would-be baddies a wide-open back door.
Owning a vehicle with keyless entry is often a convenience: Forget your key? Just enter a code. But for the owners of more than 100 million Volkswagen vehicles, that convenience has been turned into a doorway for hackers. [More]
Next time you’re sitting on a United Airlines flight next to a European teenager getting the royal treatment, it could be the latest young hacker to figure out a security flaw in the airline’s network. [More]
The folks at computing giant Oracle have alerted users of its hugely popular point-of-sale payment system that cybercriminals managed to breach the company’s customer support computers and insert malicious code, potentially affecting hundreds of thousands of retail locations around the world. [More]
Getting an email from a retailer telling you to reset your password because you may have been the victim of a data breach is alarming enough. Imagine you’re one of the Walmart.com shoppers who say they have received dozens of emails directing them to reset their login credentials.
You might not be familiar with the Kimpton chain of boutique hotels, but we can guarantee that a lot of business travelers (and the folks in their companies’ accounting departments) are now keeping an eye out for odd activity on their credit cards after news of a possible payment card data breach affecting multiple Kimpton locations. [More]
Source code essentially runs a program, be it a webpage or an app. So when that code is made available to the public, it not only opens the door to copycats, it gives competitors and hackers a look under the hood. Thankfully for Twitter, the person who found a security flaw that left the source code for its short-form video platform vulnerable didn’t have nefarious plans. And now he’s on the receiving end of $10,000. [More]
There remains a perception, among many owners of Apple devices and products, that they are immune from the malware, security flaws, and viruses that often hit the competition. Sadly, that’s not true. An iOS device or a Mac can be just as vulnerable to a flaw as any other — and right now, yours is.