Categories
Bisnis Industri

Use iPhone to change website passwords that hackers stole

[ad_1]

It’s World Password Day, and that’s a good opportunity to do something you’ve probably been procrastinating about: Replace your website passwords that hackers stole because of some company’s lax security. Fortunately, your Apple devices make it easy to find out which of your passwords leaked so you can change them.

Fix a potentially serious problem now, before something bad happens..

iCloud Keychain helps you deal with too many passwords

If you’re like me, you probably use unique passwords to log in to hundreds of websites and apps. I have so many I can’t conveniently count them – I stopped at 100 and was still near the top of the list.

Apple makes it easy to store and use your passwords with iCloud Keychain. With it, your Apple device (iPhone, Mac, etc.) remembers passwords for you, and automatically inserts them into websites and apps. All you have to do is verify your identity with Face ID or Touch ID.

This makes it easy for you to use strong passwords and change them periodically, because you never need to remember them. Your computer remembers for you.

But if you don’t ever change passwords, you’re opening yourself up to a criminal using your password to, say, buy a bunch of products on Amazon. Or simply empty your bank accounts.

How to find and change passwords compromised by data breaches

How to find hacked passwords on your iPhone
Go to the Passwords section of Settings, see the Security Recommendations, then tap Change Password on Website.
Graphic: Ed Hardy/Cult of Mac

Beyond simply storing them, your Apple device also will warn you if passwords in your iCloud Keychain have been compromised by a data leak. It’s easy to find which ones need to be updated.

This feature is available on iPhone, iPad and Mac. (I’m using iPhone for my example.) And you must be using iCloud Keychain, but that’s something Apple urges you to turn on whenever you set up a new device.

Go to Settings > Passwords. You’ll need to go through Face ID or Touch ID to open this section, of course.

Then look for the Security Recommendations section. Next to this is probably a number. This is how many security problems Keychain has found in your password list. You’ll note I have 184 – I need to take my own advice and update some passwords.

Tap on Security Recommendations to open a list of websites and applications for which your passwords have problems. You are told why for each one, with “this password has appeared in a data leak” being the most common reason.

You have the option to tap on each website for a more detailed description of the security problems. This might include a scolding on reusing passwords.

For each password, you are given the option to Change Password on Website.

An example of changing a Google password via iCloud Keychain

To give you an example of how easy this is, I’ll change the password for one of my Google accounts when going through Passwords in Settings.

While looking at the list of Security Recommendations, I hit Change Password on Website, which opens the Google sign-on screen. I have to sign in to the Google account before I can change the password, obviously. There’s no problem because iCloud Keychain has the user name and current password stored.

Google wants me to go through two-factor authentication so it texts me a code. After I supply this, the screen to enter a new password opens.

The Safari browser is smart enough to figure out that I want to create a new password and automatically suggests a strong one.

Keychain then asks if I should store the new password. I tell it to do so.

And that’s it. The process is very similar with other sites. Or you could just take the iCloud Keychain as a warning and switch over to your favorite web browser, go to the website, and update the password there.

Change passwords the easy way: You’ll be glad you did

I get it – changing passwords is kind of a hassle. I’m the guy with 184 security warnings, after all. But it’s worth it.

Any day you discover someone has used one of your leaked passwords to steal money from you is a bad day. Changing your passwords goes a long way toward preventing that.



[ad_2]

Source Article Link

Categories
Featured

Hackers of all kinds are attacking routers across the world

[ad_1]

When hackers find a vulnerable router, they compromise it by installing malware that grants persistence, the ability to run distributed denial of service (DDoS) attacks, hide malicious traffic, and more. But what happens when the hackers find a router that was already compromised by a rival gang?

Cybersecurity researchers from Trend Micro published a report that found that one of two things happen: either one group allows the other one to use the compromised infrastructure for a fee, or they each find a different way to break into the device and they use them simultaneously.

[ad_2]

Source Article Link

Categories
Featured

Hackers attempt to hijack a major WordPress plugin that could allow for site takeovers

[ad_1]

A critical vulnerability recently discovered in a popular WordPress plugin, is being actively abused in the wild, researchers have said, with hackers potentially able to use the flaw to fully take over a victim’s website.

WordPress security firm Patchstack first discovered an SQL injection (SQLi) vulnerability in the WP‑Automatic plugin, in mid-March 2024. 

[ad_2]

Source Article Link

Categories
Featured

Developing countries are being used by hackers to try out new ransomware strains

[ad_1]

IT security pros are not the only ones with sandboxes and honeypots to test malware in, as hackers are doing the same – in developing parts of the world.

A report from Performanta says that many hackers would first try out new malware strains in developing countries, before targeting companies in the developed world.

[ad_2]

Source Article Link

Categories
Featured

UnitedHealth confirms major cyberattack, says hackers stole “substantial” amount of patient data

[ad_1]

UnitedHealth Group has issued an update on the data breach that recently struck its subsidiary, Change Healthcare.

The healthcare giant suffered a ransomware attack that knocked some of its services offline and affected different pharmacies and other adjacent businesses across the United States.

[ad_2]

Source Article Link

Categories
Featured

Microsoft says Russian hackers are exploiting an ancient printer security flaw

[ad_1]

Russian state-sponsored threat actors were observed abusing an old printer vulnerability to drop custom malware on target endpoints.

The malware helped them exfiltrate sensitive data and login credentials. This is according to a new report from Microsoft Threat Intelligence, published earlier this week.

[ad_2]

Source Article Link

Categories
Featured

Hackers are loading SVG files with multi-stage malware in new phishing attack

[ad_1]

A sophisticated new phishing attack was spotted in the wild, leveraging a wide variety of tools to bypass antivirus protections and ultimately deliver different Remote Access Trojan (RAT) malware.

According to cybersecurity researchers at Fortinet, an unidentified threat actor was seen sending phishing emails, stating a shipment has been delivered, and attaching an invoice. This attachment, however, is a Scalable Vector Graphics (SVG) file which, when run, triggers the infection sequence. 

[ad_2]

Source Article Link

Categories
Featured

Hospital helpdesks targeted by hackers — US Health Department warns health services are under threat

[ad_1]

The US Department of Health and Human Services (HHS) has issued a warning that hackers are attempting to target the helpdesks of hospitals in order to gain access to critical hospital systems.

The hackers have been observed contacting hospital IT help desks using local area code phone numbers and then pretending to be a hospital employee, providing the helpdesk with stolen identification.

[ad_2]

Source Article Link

Categories
Featured

Hackers can now hijack your face. Here’s how to fight back

[ad_1]

The future of mobile malware is here. For the first time, cybercriminals are infiltrating iOS and Android devices and stealing user face scans. Then, armed with the power of deepfakes and AI, they’re replicating the user’s likeness to break into their bank accounts.

Yes, you read that correctly. Today’s technology allows bad actors to spoof biometric safeguards and hijack your face. This hack is as novel as it is terrifying – and it warrants immediate action from enterprises and users alike.

The arrival of deepfake hacking

[ad_2]

Source Article Link

Categories
Featured

Hackers are already attacking this Microsoft SharePoint vulnerability, so patch now

[ad_1]

The US Cybersecurity and Infrastructure Security Agency (CISA) has added a new Microsoft Sharepoint Server vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, signaling that hackers have begun exploiting it in the wild.

The vulnerability is tracked as CVE-2023-24955, and carries a severity score of 7.2. It is described as a critical remote code execution (RCE) flaw, that allows an authenticated threat actor, with Site Owner privileges, to execute arbitrary code on the vulnerable endpoints. 

[ad_2]

Source Article Link