<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VR World &#187; Hacked</title>
	<atom:link href="http://www.vrworld.com/tag/hacked/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.vrworld.com</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2015 07:54:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>USPS Hacked, 800,000 Employees&#039; Info Accessed</title>
		<link>http://www.vrworld.com/2014/11/10/usps-hacked-800000-employees-info-accessed/</link>
		<comments>http://www.vrworld.com/2014/11/10/usps-hacked-800000-employees-info-accessed/#comments</comments>
		<pubDate>Mon, 10 Nov 2014 21:31:36 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Breaking]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Rumors]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[APWU]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Employee]]></category>
		<category><![CDATA[Hacked]]></category>
		<category><![CDATA[New York Times]]></category>
		<category><![CDATA[Social Security]]></category>
		<category><![CDATA[USPS]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=41417</guid>
		<description><![CDATA[<p>The USPS has stated that around 800,000 employees of the USPS have had their personal information, including social security numbers compromised by hackers</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/10/usps-hacked-800000-employees-info-accessed/">USPS Hacked, 800,000 Employees&#039; Info Accessed</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="600" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/USPS-980.jpg" class="attachment-post-thumbnail wp-post-image" alt="USPS 980" /></p><p>According <a href="http://about.usps.com/news/fact-sheets/scenario/media-statement-final.pdf" target="_blank">to the agency</a>, over 800,000 employees of the USPS have had their personal data stolen from the postal service&#8217;s servers. When you consider that the USPS <a href="https://about.usps.com/who-we-are/postal-history/employees-since-1926.pdf" target="_blank">employs just under 500,000 people (below 800,000 in the 90&#8217;s)</a> then you realize that the data stolen includes both current and former employees of the USPS. The data breach mostly affects employees of the USPS rather than customers who may have done business with them. They do state that the USPS&#8217; customers that have done business with them between the months of July and August may have had their contact information lost, but no credit card or payment data was obtained by the hackers.</p>
<p>The USPS has a <a href="http://about.usps.com/news/fact-sheets/scenario/customerFAQs_Final.pdf" target="_blank">long and detailed FAQ</a> that answers consumers questions about the data breach and whether or not their data has been compromised. The interesting thing about this breach is that it isn&#8217;t a typical breach where hackers are going after customer data or going after credit card data or passwords. The hackers in this specifically went after the employee data of the USPS and were able to gain access to what appears to be all of it. The USPS isn&#8217;t clearly saying what employee data had been stolen, but the USPS <a href="http://about.usps.com/news/fact-sheets/scenario/media-statement-final.pdf" target="_blank">official release</a> states that it the data stolen includes, &#8220;The employee information potentially compromised in the incident included some employee personally identifiable information (PII), such as names, dates of birth, Social Security numbers, addresses and other information including beginning and end dates of employment, and emergency contact information.&#8221;</p>
<p>The other huge problem with this breach is that the USPS did not communicate this breach, which occurred in mid-September until now, almost two whole months later. This would mean that the employees that got hacked have had their information out and about without their knowledge for the past two months which means anyone could have caused financial ruin for the employees of the USPS. The fact is that the <a href="http://www.apwu.org/" target="_blank">American Postal Workers Union</a> should be absolutely up in arms about this and should sue the USPS for breaching their duty to protect and properly notify their employees of such risks in a timely fashion. We&#8217;ve already gotten quite angry with retailers taking a month to tell us that our credit card numbers have been stolen, yet even more personal potentially ruining data was kept from USPS employees for nearly 2 months.</p>
<p>There are currently no official suspects or leads in the case, but some publications are indicating that the attack may have come from Chinese hackers.</p>
<p>There is one more interesting tidbit in this USPS story, and that&#8217;s the fact that the USPS has taken this event as an opportunity to take a dig at the New York Times for their piece about the USPS and their involvement in tracking Americans&#8217; mail. Here is the question and answer, verbatim.</p>
<p><strong>Q</strong>: I’m concerned about a New York Times article that mentioned “surveillance” of mail. Is this connected with the cyber-intrusion incident and what is meant by “mail covers”?</p>
<p><strong>A</strong>: The New York Times article is unrelated to the cyber breach. The New York Times article titled ‘Report Reveals Wider Tracking of Mail in U.S.’ published on Tuesday, October 28, 2014 is extremely disappointing. The article is inaccurate and unfairly presents a one-sided version of the facts. First and foremost, the United State Postal Service respects the privacy of its customers and the sanctity of the mail. Contrary to what is suggested in the article, the Postal Service does not monitor the mail behavior of its customers and it does not maintain any system or program of so-called “surveillance.” Unfortunately, and perhaps to create a news story where there is none, the New York Times article conflates three independent mail programs in order to create the wholly false impression that there is some vast mail monitoring system in operation. While such an assertion may make for a more interesting news article – it is not based on the facts. Mail covers are used for criminal investigations. The increased use of mail covers in 2013 and 2014 is connected to single packages investigated involving illegal drug shipments. Eighty percent of all mail covers in 2014 were related to these important investigations. All other mail covers have actually decreased by more than 30 percent since 2012. It is unfortunate that the New York Times presented such a distorted view of the facts. Its readership would have benefited from a more even-handed approach. The Postal Service processed and delivered 158 billion pieces of mail last year, of which only a tiny percentage was subjected to the mail cover process. The people who need to be concerned about mail covers are those who use the U.S. Mail to ship illegal drugs or who are otherwise breaking the law.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/10/usps-hacked-800000-employees-info-accessed/">USPS Hacked, 800,000 Employees&#039; Info Accessed</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/11/10/usps-hacked-800000-employees-info-accessed/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>CurrentC, Apple Pay Competitor, Already Hacked</title>
		<link>http://www.vrworld.com/2014/10/29/currentc-apple-pay-competitor-already-hacked/</link>
		<comments>http://www.vrworld.com/2014/10/29/currentc-apple-pay-competitor-already-hacked/#comments</comments>
		<pubDate>Wed, 29 Oct 2014 17:06:02 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Mobile Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Apple Pay]]></category>
		<category><![CDATA[CurrentC]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[Google Wallet]]></category>
		<category><![CDATA[Hacked]]></category>
		<category><![CDATA[iPhone 6]]></category>
		<category><![CDATA[NFC]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=40821</guid>
		<description><![CDATA[<p>MCX's own CurrentC, a planned competitor to Apple's Apple Pay NFC solution for the iPhone 6 has already been hacked, which puts its security into question.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/10/29/currentc-apple-pay-competitor-already-hacked/">CurrentC, Apple Pay Competitor, Already Hacked</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="600" src="http://cdn.vrworld.com/wp-content/uploads/2014/10/CurrentC.jpg" class="attachment-post-thumbnail wp-post-image" alt="CurrentC" /></p><p>So, it seems like Karma has a way of sorting things out in this world and today&#8217;s news about <a href="http://mcx.com/#3" target="_blank">MCX&#8217;s CurrentC </a> program already <a href="http://www.mcx.com/blog/1028-email-incident-report/" target="_blank">getting hacked</a> pretty much sorts that out. MCX&#8217;s CurrentC is supposed to be the retailers&#8217; own version of Apple Pay, a direct competitor in fact. But recently, MCX retailers that already have pre-installed NFC hardware have disabled it in order to prevent Apple Pay from working in their stores. This is because all of the MCX retailers are still wanting to push for their CurrentC solution rather than Apple Pay.</p>
<blockquote><p>Within the last 36 hours, we learned that unauthorized third parties obtained the e-mail addresses of some of our CurrentC pilot program participants and individuals who had expressed interest in the app. Many of these email addresses are dummy accounts used for testing purposes only. The CurrentC app itself was not affected.</p>
<p>We have notified our merchant partners about this incident and directly communicated with each of the individuals whose email addresses were involved. We take the security of our users’ information extremely seriously. MCX is continuing to investigate this situation and will provide updates as necessary.</p></blockquote>
<p>What&#8217;s amusing about all of this is that it is a replay of what happened with Google Wallet when Google launched it YEARS ago. In fact, talking to tellers about their Apple pay solution at Wholefoods and whether or not it supported Google Wallet, they simply had NO idea it existed or if they supported it. What&#8217;s funny is that they seemed shocked that Google Wallet had already existed for years before Apple pay but got virtually no support from retailers and carriers. Sure, there are places where you can regularly pay with Google Wallet, like 7/11, but the reality is that Google Wallet primarily struggled because the carriers didn&#8217;t want it to succeed.</p>
<p>The carriers simply didn&#8217;t want Google Wallet to succeed because they saw it as a challenger to their own potential NFC payment solutions, especially Verizon. Verizon actually disabled Google Wallet on their version of the Galaxy Nexus and as a result, Google Wallet didn&#8217;t work on Verizon&#8217;s network for a long time. Why did Verizon do that? Because they had their own Google Wallet competitor, formerly known as ISIS, now known as Softcard. So, in reality, Apple is running into the same opposition that Google did, except they are more loved by consumers and when their ideas are shot down or blocked by competitors it becomes a big deal and consumers get upset and start to organize boycotts.</p>
<p>Either way, the backstory is important to understand why CurrentC, Apple Pay and Google Wallet are at odds with each other, but it doesn&#8217;t change the fact that Google Wallet and Apple Pay are clearly more secure solutions than MCX&#8217;s own CurrentC which appears to be insecure well before its launch. Nobody is going to want to use a technology like CurrentC if they can&#8217;t protect consumers, ESPECIALLY when CurrentC does not connect to a credit card but rather directly to a debit card meaning that if anyone were to ever hack your CurrentC account they would have immediate access to your own money and could clear out your bank account. This is one of the biggest complaints about CurrentC right now, and a lot of people are right to be uneasy about it.</p>
<p>If you want to learn more about CurrentC, we recommend you <a href="CurrentC" target="_blank">check out their FAQ</a> where they answer a lot of questions, some poorly albeit.</p>
<p>Some good examples of their confusing FAQs are the fact that they mention that they support credit cards, but then they say that they will support credit cards in the future. They have no problems supporting debit cards and checking accounts though.</p>
<blockquote>
<ul>
<li>Provide consumers with multiple ways to pay at their favorite merchants, including merchant gift cards, credit cards and debit accounts and personal checking accounts. MCX has plans to add additional forms of payment, including credit cards.</li>
</ul>
</blockquote>
<p>Then they talk about merchant exclusivity&#8230;</p>
<blockquote><p>Does MCX Require its Merchants to Only Offer CurrentCTM?</p>
<p>MCX merchants make their own decisions about what solutions they want to bring to their customers; the choice is theirs. When merchants choose to work with MCX, they choose to do so exclusively and we’re proud of the long list of merchants who have partnered with us. Importantly, if a merchant decides to stop working with MCX, there are no fines.</p></blockquote>
<p>They say that merchants can make their own decisions about what solutions they want to bring to consumers, but then they say that merchants that choose to work with MCX choose to do so exclusively. Meaning, they want you to believe that merchants can pick between solutions, but what they really mean is that you can pick to use MCX or not, and if you do, you can&#8217;t really use anything else because that&#8217;s how it works. CurrentC is really an awful solution for consumers and is purely designed for the retailers to maximize their profitability and control. MCX is a retailer platform while Apple Pay and Google Wallet are consumer platforms.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/10/29/currentc-apple-pay-competitor-already-hacked/">CurrentC, Apple Pay Competitor, Already Hacked</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/10/29/currentc-apple-pay-competitor-already-hacked/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hacker Claims to Have Access to 7 Million Dropbox Accounts</title>
		<link>http://www.vrworld.com/2014/10/13/hacker-claims-access-7-million-dropbox-accounts/</link>
		<comments>http://www.vrworld.com/2014/10/13/hacker-claims-access-7-million-dropbox-accounts/#comments</comments>
		<pubDate>Tue, 14 Oct 2014 05:00:13 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Breaking]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Rumors]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[2 Factor Authentication]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[Dropbox]]></category>
		<category><![CDATA[Hacked]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Username]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=40016</guid>
		<description><![CDATA[<p>A hacker claims to have access to the usernames and passwords of nearly 7 million Dropbox users and will post them all if he or she is paid in Bitcoin.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/10/13/hacker-claims-access-7-million-dropbox-accounts/">Hacker Claims to Have Access to 7 Million Dropbox Accounts</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="600" src="http://cdn.vrworld.com/wp-content/uploads/2014/10/Dropbox.jpg" class="attachment-post-thumbnail wp-post-image" alt="Dropbox" /></p><p><strong>Update: Dropbox denies that it was hacked and posted the following on its blog. </strong></p>
<blockquote><p>Recent news articles claiming that Dropbox was hacked aren’t true. Your stuff is safe. The usernames and passwords referenced in these articles were stolen from unrelated services, not Dropbox. Attackers then used these stolen credentials to try to log in to sites across the internet, including Dropbox. We have measures in place to detect suspicious login activity and we automatically reset passwords when it happens.</p>
<p>Attacks like these are one of the reasons why we strongly encourage users not to reuse passwords across services. For an added layer of security, we always recommend <a title="enable 2 step authentication" href="https://blog.dropbox.com/2014/10/have-you-enabled-two-step-verification/">enabling 2 step verification</a> on your account.</p>
<p><strong>Update: 10/14/2014 12:30am PT</strong></p>
<p>A subsequent list of usernames and passwords has been posted online. We’ve checked and these are not associated with Dropbox accounts.</p></blockquote>
<p>In a recent <a href="http://pastebin.com/aRgTJzzg" target="_blank">Pastebin posting</a>, an anonymous hacker, who is <a href="http://pastebin.com/NtgwpfVm" target="_blank">asking for BTC donations</a> to post more account usernames and passwords. He or she <a href="http://pastebin.com/1AZQ7McK" target="_blank">has already posted hundreds</a> of account credentials, which check out to be authentic accounts if you test any of them out. The irony of this situation is that <a href="https://blog.dropbox.com/2014/10/dont-get-baited-by-phishing-or-malware/" target="_blank">Dropbox had just recently posted a blog</a> about now getting baited by phishing or malware on their website. Obviously, the 6,937,081 accounts that have supposedly been compromised are not all going to be the result of phishing or malware, but very likely due to some vulnerability in Dropbox&#8217;s own systems.</p>
<p>Most of the passwords that people have tested are expired passwords and may be flagged by Dropbox&#8217;s own systems as vulnerable accounts. Up until the time of publication, Dropbox has not published any official statements on their website or twitter account, but if you want to ensure that your Dropbox account is safe from account hacking you should <a href="https://www.dropbox.com/en/help/363" target="_blank">enable 2 factor authentication</a> (2FA). This means that even if someone has access to your username and password, they will still need to authenticate through your phone or an email account. This is a mandatory safeguard to keep yourself protected from such major password hacks and obviously, you need to enable it if you are serious about your own security.</p>
<p>Dropbox has recently also come under scrutiny from people like Edward Snowden <a href="http://www.theguardian.com/technology/2014/jul/17/edward-snowden-dropbox-privacy-spideroak" target="_blank">who claim</a> that the service is unsafe for people to use without government spying. They also have the former Secretary of State and National Security Advisor, <a href="http://en.wikipedia.org/wiki/Condoleezza_Rice" target="_blank">Condoleezza Rice</a>, on their board of directors which is seen as a very anti-privacy move considering that she was involved in many of the spying programs implemented today in one way or another</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/10/13/hacker-claims-access-7-million-dropbox-accounts/">Hacker Claims to Have Access to 7 Million Dropbox Accounts</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/10/13/hacker-claims-access-7-million-dropbox-accounts/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Content Delivery Network via Amazon Web Services: CloudFront: cdn.vrworld.com

 Served from: www.vrworld.com @ 2015-04-10 17:08:33 by W3 Total Cache -->