The credit data agency Experian could be facing criminal investigations, fines and class action lawsuits, after a hack that compromised the records of 15 million people, all of them customers of the wireless carrier T-Mobile.
And while this may appear just like any other hacking story — there’s a breach, a promise of free credit monitoring, investigations — this time Social Security numbers were among the data compromised. When it’s not just a credit card number, stolen data can create all kinds of headaches.
People can have fake tax returns filed in their name, fraudulant car loans and even mortgages. And when it comes to identity theft, the onus is on the victims. When the fraudsters don’t pay up, banks and loan collectors can come after the victims, instead. And it could take victims of fraud years to clear their name and financial histories.
“Law enforcement can’t deal with the volume” of fraud, said Chester Wisniewski, a senior adviser at the security firm Sophos. “If you approach the FBI, they’re not really interested if the crime is less than $1 million.”
Here’s what cutting-edge technology has brought us: The increase in automobiles armed with internet-connected technology has opened the door for hacking looking to get into our cars – remotely.
One of the world’s largest manufacturers of chips and processors used in computers has some ideas about the best ways for automakers to safeguard cars against cyber attacks.
The hackers who stole security dossiers from the Office of Personal Management also got the fingerprints of 5.6 million US federal employees.
US intelligence agencies have blamed China for the hacking against the office, which is the main custodian of the government’s most important personnel records, but it is unclear what group or organization engineered it. Before Wednesday, the agency had said it lost 1.1 million sets of fingerprints among the roughly 22 million individuals whose records were compromised.
The Kremlin was willing to pay 3.9 million rubles ($59,000) to anyone able to crack Tor, a popular tool for communicating anonymously over the Internet. Now the company that won the government contract expects to spend more than twice that amount to abandon the project.
A New York Blue Cross Blue Shield plan revealed late Wednesday that it has been the victim of a massive cyberattack, exposing the data of more than 10 million people.
The hack falls within the top 20 worst healthcare breaches ever reported, according to the Department of Health and Human Services’ list of breaches, known in the industry as the agency’s “wall of shame.”
The auto world has been thinking a lot about hacking lately. For years, it wasn’t much of a concern, but now that many new cars are connected to telematics networks like Uconnect and OnStar and to cellular networks via dongles attached to their onboard diagnostics ports, our rides are becoming increasingly vulnerable.
As proof, consider recent stories about Volkswagen (including Audi and Porsche), BMW, and Mercedes-Benz. We have a feeling that this is just the tip of the proverbial iceberg.
Volkswagen’s story is perhaps the more troubling, and it’s definitely the harder to repair. That may explain why the automaker spent two years trying to hide the information from the public. VW’s vulnerability is rooted in radio-frequency identification (RFID) chips manufactured by Megamos Crypto. Those chips help keep…
The bust of an international hacking ring that spent years manipulating the stock market has many proclaiming a new, insidious era of insider trading.
On Tuesday, federal authorities brought charges against 32 people and companies that allegedly conspired to steal unpublished financial press releases and shuttle that information to traders. Together, officials say the group made over $100 million in profits off illegal trades.
While investigators and prosecutors say they’ve been attuned to the threat for years, most thought the incidents were unaffiliated outliers.
Hackers don’t even need your password anymore to get access to your cloud data.
Newly published research, released at the Black Hat conference in Las Vegas on Wednesday by security firm Imperva, shows how a “man-in-the-cloud” attack can grab cloud-based files — as well as infecting users with malware — without users even noticing.
Russian hackers are attacking the Pentagon’s Joint Staff unclassified email system, leaving thousands of Department of Defense (DOD) workers without email for nearly two weeks, a DOD spokeswoman confirmed.
Officials believe Moscow may have orchestrated the “sophisticated cyberattack,” which infiltrated the Joint Chiefs of Staff email system….
A security researcher has posted a video on YouTube demonstrating how a device he made can intercept wireless communications to locate, unlock and remotely start GM vehicles that use the OnStar RemoteLink mobile app.
Samy Kamkar, who refers to himself as a hacker and whistleblower, posted the video today showing him using a device he calls OwnStar. The device, he said, intercepts communications between GM’s OnStar RemoteLink mobile app and the OnStar cloud service.