Hacky Hack Hack

Hacky Hack Hack

A 14-year-old Australian boy hacked into Apple servers and downloaded 90GB in documents The 14-year-old teen from Melbourne Australia was found to have broken into Apple servers and downloaded approximately 90GB of information. When law enforcement intercepted him, they confiscated two laptops, a mobile phone and a hard drive. Following this confiscation, the officers found a folder on the network labeled ‘Hacky Hack Hack’, within lay the stolen Apple files. The teen...

Read More
Have you heard of Fruitfly, a near-undetectable Mac backdoor Malware?

Have you heard of Fruitfly, a near-undetectable Mac backdoor Malware?

Even six months after it was discovered, the first Mac malware of the year is still causing a giant headache. According to ZDNet, the recently discovered Fruitfly malware is a stealthy but highly-invasive infection for Macs that went undetected for years. The controller of the malware has the capability to remotely take complete control of an infected computer -- files, webcam, screen, and keyboard and mouse. But despite its recent discovery, there is...

Read More

Google Project Zero Prize Pays $200,000 for Critical Vulnerability Chains

Apple isn’t the only one offering up a $200,000 reward for severe vulnerabilities on mobile devices. Google followed suit yesterday with the announcement of the Project Zero Prize, and like the Apple Security Bounty, the top payout is $200,000. Announced by Google’s Project Zero research team, the contest began yesterday and is scheduled to run through next March 14. Researchers are invited to find critical bugs in Android, specifically on Nexus...

Read More

iCloud Takeover Really is as Simple as One, Two, Three

Approximately 40 million iCloud accounts are rumoured to be hacked, but according to CSO Online, that number is likely overblown. Step one: Leaked credentials. Step two: “Find My iPhone” – lost mode. Step three: Lock user out and leave a ransom message. Approximately 40 million iCloud accounts are rumoured to be hacked, but according to CSO Online, that number is likely overblown. However, since February of this year, Apple users have been reporting their...

Read More

How Hackers Are Getting Siri to Show Them Your Photos

When the FBI took Apple to court it was with the intention of ordering the tech giants to build a backdoor that allowed them entry into a terrorists locked iPhone, as we have previously blogged. The FBI has since dropped the case as they were able to find a way into the phone without Apple’s help, and it appears that someone else has too. On Monday April 4, 2016, a bug...

Read More

iMessage Vulnerability Discovered

Researchers from Johns Hopkins University have discovered a flaw that allows skilled attackers to intercept and decrypt video and images sent on iMessage. Apple partially fixed the flaw in the latest iOS 9, but the exploit leaves versions prior vulnerable.  However, Johns Hopkins professor Matthew D. Green expressed to the Washington Post, that a modified version of the exploit could possibly be developed for iOS 9 versions. This iMessage vulnerability is...

Read More

My Mac Can’t Really Be Vulnerable, Can It?

On March 4, 2016, the Palo Alto Networks research team discovered a new MAC OS X ransomware called KeRanger that had infected the Transmission BitTorrent client installer. KeRanger is the first official complete and functioning ransomware to affect OS X. FileCoder, which was discovered in 2015 by Kapsersky Lab, was the first of its kind, but incomplete at the time of its discovery. While malware is usually distributed through email, these...

Read More