Plug-ins for Shops Handling Przelewy24 with Critical Security Gaps

What can be worse than a leaky plug-in? Perhaps many leaky plug-ins supplied by one supplier, installed in several places and responsible for handling of financial transactions.

Continue reading “Plug-ins for Shops Handling Przelewy24 with Critical Security Gaps”

Don’t laugh at somebody else’s misfortune, like CashBill did. For you will be laughing on the other side of your face, like they did.

Life is the best teacher and lessons come out of the blue, like a speeding truck exiting a corner in your lane. Such a lesson has just been learned the hard way by CashBill, which laughed at Przelewy24 in mid-November 2017.

Continue reading “Don’t laugh at somebody else’s misfortune, like CashBill did. For you will be laughing on the other side of your face, like they did.”

A History of a Hack – Epilogue, or anakata’s sentence

Some time ago we recounted the plight of anakata, co-founder of The Pirate Bay, charged with numerous counts of hacking to mainframe computers in Sweden. A few days ago a judgement was passed in his case, but it is probably not the end.

Continue reading “A History of a Hack – Epilogue, or anakata’s sentence”

A History of a Hack

Anakata in the Court Room (source: Aftonbladet)

On 20 May 2013, the trial of Gottfrid Svartholm a.k.a. anakata, co-founder of TPB, commenced in Stockholm. Yet, he was not accused of any copyright infringement but of serious hackings. What he was accused of and how the police picked up his trail?

Continue reading “A History of a Hack”

Multiple bank accounts robbed by thieves using an innovative service of a mobile phone operator

In June and July of 2015, the thieves stole several hundred thousand zlotys (at least 100k EUR) from accounts of the bank customers. The affected customers had one thing in common – they had a phone in Play network (a Polish mobile operator) and received a series of text messages with codes to authorize non-commissioned transfers.

Continue reading “Multiple bank accounts robbed by thieves using an innovative service of a mobile phone operator”

Bypassing Apple’s Activation Lock with typing and magnets – for a fraction of a second

One of the strongest security mechanisms implemented by Apple is called Activation Lock. It prohibits anyone without access to owner’s Apple ID password from accessing a stolen or lost iDevice. Unless they have a lot of patience and some magnets. Read more »