MongoDB, the free and open source NoSQL database (see Wikipedia entry here) that is used by hundreds of thousands of web sites is under attack. A number of attackers are using search engines like Shodan to find Mongo databases that are exposed to the Internet and attempting to compromise them. Apparently, a surprising number of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Normally when hackers want to attack a router, they attempt to compromise the router directly. They try default passwords or a list of passwords; they look for software vulnerabilities. Maybe patches that haven’t been applied. Another approach is to compromise a device inside the network and use that device to compromise the router from the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Just after midnight on August 11th, Jered Kenna in Medellin, Columbia was notified that two of his email accounts had their passwords reset. He tried regaining control of the accounts by getting the services to send him a text, which he never received. When he called his phone company (T-Mobile), they said that he didn’t […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Until recently, the black market price of medical records was very high compared to stolen credit card records. Stolen medical records are used to get health care for people who do not have insurance and to submit fraudulent insurance claims. Medical records used to go for as much as $50 for one complete record. However, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
UPDATE: Some people are suggesting that you cancel your Yahoo account immediately. This is likely a really bad idea. If you cancel the account, someone else may be able to open an account with the same name. If they do, they will be able to send emails that appear to be from you and they […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
First the good news – you have to have physical control of the iPhone in order to make this hack work. Now the bad news – there is more than one YouTube video describing how to do it. Too bad the FBI didn’t see the videos before they tried to get Apple to unlock the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]