Lionytics Security Blog

Current posts

Wednesday November 16, 2016 - 12:45-EST 0704

Hacker can backdoor your computer

Hacker can backdoor your computer

If you lock your computer and walk away, it takes only 30 seconds for a hacker armed with a small $5 Raspberry Pi Zero, which is loaded with devious code, to completely pwn your password-protected computer and install remotely accessible.

Wednesday October 07, 2015 - 12:00-EST 2,785

Trump Hotels Infected

Trump Hotels Infected

In an announcement on the chain's website, the Trump Hotel Collection informed its customers that their credit card data may have been stolen through malware installed on its payment systems. The malware apparently was active at a number of Trump

Monday October 05, 2015 - 12:00-EST 2,150

Experian Data Breach

Experian Data Breach

T-Mobile recently announced that a breach of a server at Experian, which processes T-Mobile's credit applications, exposed the personal information of approximately 15 million people who applied for T-Mobile services between September 1, 2013 and.

Thursday October 01, 2015 - 09:00-EST 1,795

Padlocks4Less breach

Padlocks4Less breach

Frank J. Martin Company is notifying an undisclosed number of individuals who made purchases on the Padlocks4Less website that their personal information – including payment card data –may have been accessed without authorization.

Wednesday September 30, 2015 - 13:00-EST 1,843

Medical Kit Flaws

Medical Kit Flaws

Security researchers have found tens of thousands of vital internet-connected medical systems including pacemakers and MRI scanners vulnerable to cyber attack at just one healthcare provider.  Presenting at the DerbyCon conference at the

Wednesday September 30, 2015 - 12:00-EST 1,709

Linux BotNet

Linux BotNet

Security researchers have uncovered a network of infected Linux computers that's flooding gaming and education sites with as much as 150 gigabits per second of malicious traffic—enough in some cases to take the targets completely offline.

Monday September 28, 2015 - 14:00-EST 2,150

Hilton Hotels Data Breach

Hilton Hotels Data Breach

Sources at multiple financial institutions say they have detected a pattern of fraudulent activity on customer cards that were used at Hilton Hotel properties between mid-April and late July 2015.  The apparent breach—the numbers affected

Monday September 28, 2015 - 13:00-EST 1,942

US and China Deal

US and China Deal

The United States and China have agreed a joint deal whereby neither government will engage in cyber-espionage for commercial advantage.

The agreement was issued on Friday and also includes a commitment at a law enforcement level to share

Monday September 28, 2015 - 12:00-EST 1,596

Hackers Access iPhone

Hackers Access iPhone

iPhone users have yet another screenlock bypass vulnerability to watch out for, according to a new video demonstration that shows how the bug can be exploited to gain unauthorized access to photos and contacts.  The hack reportedly works

Wednesday September 23, 2015 - 14:00-EST 1,717

Kardashian Website Security

Kardashian Website Security

The Kardashians are often called 'over-exposed,' but a flaw in recently launched websites for the celebrity family offered exposure of an entirely different kind: the names and email addresses of more than half a million users.  A

Wednesday September 23, 2015 - 13:00-EST 1,483

CVS employee steals data

CVS employee steals data

Molina Healthcare is notifying nearly 55,000 current and former members that a former CVS employee – CVS is Molina Healthcare's over-the-counter (OTC) benefits vendor – took their personal information from CVS' computers and sent it to his personal.

Wednesday September 23, 2015 - 12:00-EST 1,563

Serious Imgur exploit

Serious Imgur exploit

A recently discovered attack on visitors of the 8chan image website went well beyond the venue's usual script-kiddie fare by combining two weaknesses on that property with a potentially catastrophic vulnerability on the wildly popular photo-sharing.

Monday September 21, 2015 - 12:00-EST 1,364

Trojan targets poker sites

Trojan targets poker sites

Anybody who has ever played poker, online or offline, always suspects that they might be the victim of cheating when the cards aren't going their way.  Now there's evidence to suspect that the hunch is real when it comes to two of the

Thursday September 17, 2015 - 14:00-EST 1,464

Sutter Health breach

Sutter Health breach

Sutter Health's revelation that a former employee inappropriately sent patient information to a personal email account in violation of the organization's policy is yet another reminder of the privacy risks posed by email communication.
In a

Thursday September 17, 2015 - 13:00-EST 1,219

Android lockscreen hack

Android lockscreen hack

Software bugs that allow attackers to bypass smartphone lockscreens are common enough for both Android and iOS devices, but like a fender bender on the highway, many of us can't resist the urge to gawk anyway. There's a newly disclosed way for

Thursday September 17, 2015 - 12:00-EST 1,549

Seven years of malware

Seven years of malware

For the past seven years, a cyberespionage group operating out of Russia—and apparently at the behest of the Russian government—has conducted a series of malware campaigns targeting governments, political think tanks and other organizations. In a

Wednesday September 16, 2015 - 09:00-EST 1,733

Mohu website breach

Mohu website breach

North Carolina-based consumer electronics company Mohu – an unincorporated division of GreenWave Scientific, Inc. – is notifying approximately 2,500 customers that credit card information and other data was compromised during an attack on the

Tuesday September 15, 2015 - 14:00-EST 1,373

TLS Flaw Exposed

TLS Flaw Exposed

A flaw in the Transport Layer Security (TLS) protocol can allow man-in-the-middle attackers to access apparently encrypted communications, researchers have warned.  Experts at Austria-based IT services provider Research Industrial Systems

Tuesday September 15, 2015 - 13:00-EST 1,428

Chinas IP Theft

Chinas IP Theft

The size and complexity of China’s state-sponsored cyber-espionage apparatus has been laid bare in a new report which claims government, military, business and academia are organized around a massive information-theft and tech-transfer network.

Tuesday September 15, 2015 - 12:00-EST 1,316

Intel Takes On Car Hacking

Intel Takes On Car Hacking

Chipmaker establishes new Automotive Security Review Board for security tests and audits  After a summer full of car hacking revelations, Intel, today, announced the creation of a new Automotive Security Review Board (ASRB), focused on.

Monday September 14, 2015 - 14:00-EST 1,131

Excellus Healthcare Breach

Excellus Healthcare Breach

Yet another US healthcare company has reported a major data breach – this time insurance firm Excellus said hackers have stolen the personal details of 10.5 million customers.  The breach affected around 7 million 'members, patients or