The new malware affecting iPhones in China and Taiwan is called YiSpecter and it is causing users to encounter fullscreen ads on Apple devices. There are also a number of other security breaches that are associated with the malware, which is being referred to as a new species all together, according to recent reports.
GM, Chrysler and even Tesla had security flaws in their automobiles exposed and it began a chain reaction of researchers trying to hack into vehicles computer systems. Now, new research shows that the vehicle diagnostics and software upgrade equipment used by car dealerships and mechanic shops could be used to spread malware.
Hacking into databases isn’t just a minuscule task anymore. Hackers are stealing information by the millions and this time T-Mobile has been caught up in yet another data breach in 2015. 15 million T-Mobile customers have had their Social Security numbers, birth dates and names stolen in a recent data breach.
Microsoft released a new Windows update however, it was a bit suspicious and showed signs of being compromised. The company has since issued a statement saying that it was a test that wasn’t carried out correctly and as a result some computers may have fallen victim.
Mac users might want to think closely about their web-browsing, at least until a current exploit in the Gatekeeper’s malware protection is fixed. A new report claims that there is a “drop-dead simple exploit” that will give attackers an upper-hand.
Following a report of a hack in Amazon’s EC2 platform that would allow attackers to steal the cryptographic keys, the company issued a patch to solve the issue while pointing out that researchers are performing hacks with rare and unlikely conditions.
A new report says that the passwords we use on a daily basis should require a supplemental step. With e-mail, Facebook, Twitter, Instagram and all of the other passwords tech users are required to remember things can get pretty complicated, especially if you have ever used “password” as your actual password.
Multiple sites have begun reporting a cyber-war between India and Pakistan following a Pakistani hack on the Kerala Government’s official website. India has responded with a hack of their own and it’s all getting very interesting.
The hacks just keep coming and this time Apple’s iPhone is highlighted. iPhone’s users can have their photos and contacts accessed and the hacker doing so won’t even need the passwords to get to them.
The U.S. and China have engaged in a back and forth over cybersecurity issues after the large U.S. Federal hack that exposed millions of employees personal information. All fingers were pointed at China who continued to deny involvement. However, the two countries are now vowing to denounce an involvement in cyber espionage for commercial gain purposes.