Archive for the ‘Security’ Category

NSA Can Hack Into Your Wi-Fi Network From Up To 8 Miles Away

NSA Can Hack Into Your Wi-Fi Network From Up To 8 Miles Away

It was recently reported that NSA has specific units of elite hackers, tasked with hacking into all kinds of hardware and networks. Further details on the subject reveal that these NSA hackers can hijack a Wi-Fi network, even while they are miles away.

By On January 2, 2014 Respond
Add To Bookmark Add To Readlist  
Official Facebook & Twitter Account Of Skype Got Hacked By Syrian Electronic Army

Official Facebook & Twitter Account Of Skype Got Hacked By Syrian Electronic Army

The Syrian Electronic Army (SEA) has decided to celebrate the new year with a solid dose of hacking. The pro-Assad group recently gained control of Skype’s social media accounts, demanding an end to online spying.

By On January 2, 2014 Respond
Add To Bookmark Add To Readlist  
Hacker Leaks Info Of 4.6 Million Snapchat Users Online

Hacker Leaks Info Of 4.6 Million Snapchat Users Online

Recently, security researchers were able to reveal a critical flaw in Snapchat, which allowed a hacker to match Snapchat usernames against actual passwords. Now, a detailed database of 4.6 million Snapchat usernames and phone numbers has been posted online.

By On January 1, 2014 Respond
Add To Bookmark Add To Readlist  
NSA Has Complete Access To iPhone Communications

NSA Has Complete Access To iPhone Communications

After reporting NSA can intercept shipments and bug machines with spyware, yesterday an anonymous blogger leaked details of an NSA catalogue, containing backdoor techniques for different hardware tools. The catalogue reveals that the agency can easily access all communications made through an iOS device.

By On January 1, 2014 Respond
Add To Bookmark Add To Readlist  
Hackers Invent Clever Methods To Use Stolen Target Cards

Hackers Invent Clever Methods To Use Stolen Target Cards

The hacking of nearly 40 million credit and debit cards of Target customers recently was among the largest heists in the entire year. Now, it has transpired that the hackers who stole the information are trying to put these cards to use.

By On December 31, 2013 Respond
Add To Bookmark Add To Readlist  
Security Firm Publishes Snapchat Exploits, Allowing Name/Phone Number Matching

Security Firm Publishes Snapchat Exploits, Allowing Name/Phone Number Matching

Snapchat has a rather notorious record when it comes to heeding security researchers. Gibson Security has published two major Snapchat exploits which, the firm says, were initially reported to Snapchat but the company didn’t respond.

By On December 26, 2013 Respond
Add To Bookmark Add To Readlist  
Hacker Demands Bitcoin Ransom, Threatens To Leak 3.7 Million Israeli Bank Customers Data

Hacker Demands Bitcoin Ransom, Threatens To Leak 3.7 Million Israeli Bank Customers Data

A hacker has somehow been able to grab hold of the data of some 3.7 million bank customers in Israel. He has now asked three major Israeli banks to either pay up a certain amount in Bitcoin or that he would sell the data to others.

By On December 24, 2013 Respond
Add To Bookmark Add To Readlist  
Hacking Forums Start Selling The Stolen Target Credit Card Numbers

Hacking Forums Start Selling The Stolen Target Credit Card Numbers

One of the biggest banking heist of recent times occured when hackers were successful in making away with 40 million credit card numbers. It would now appear that these hackers are now selling the numbers at underground hacking forums.

By On December 21, 2013 Respond
Add To Bookmark Add To Readlist  
Details Of 54 Million Turkish Citizens Stolen By Russian Hackers

Details Of 54 Million Turkish Citizens Stolen By Russian Hackers

Personal details of individuals can be used by hackers in a whole lot of possibly malicious ways. This is why when Russian hackers recently stole details of 45 million Turkish citizens, it sent the alarm bells ringing among security researchers.

By On December 20, 2013 Respond
Add To Bookmark Add To Readlist  
Chinese Hackers Spyied On European Diplomats During G20 Meetings Using Malware

Chinese Hackers Spyied On European Diplomats During G20 Meetings Using Malware

Chinese hackers have earned a notorious reputation over the years, hacking into the machines of countless organizations. Now, a report from FireEye reveals that hackers based in China were able to access the computers of European diplomats during G20 meetings.

By On December 15, 2013 Respond
Add To Bookmark Add To Readlist  
Twitter Vulnerability Allows Apps To Send DMs Without User Permission

Twitter Vulnerability Allows Apps To Send DMs Without User Permission

We routinely authorize different apps to have limited access to our Twitter accounts. However, many of these apps can easily exceed the accorded permissions to send out DMs from a user’s account without his or her knowledge.

By On December 15, 2013 Respond
Add To Bookmark Add To Readlist  
Hacker Discovers Remote Code Execution Vulnerability On eBay

Hacker Discovers Remote Code Execution Vulnerability On eBay

White-hat hackers are often accredited with finding serious flaws in online sites and services. David Vieira-Kurz is such a hacker who recently discovered a remote code execution vulnerability in eBay’s site.

By On December 15, 2013 Respond
Add To Bookmark Add To Readlist  
Microsoft Joins Efforts To Replace Passwords With Better Authentication Technologies

Microsoft Joins Efforts To Replace Passwords With Better Authentication Technologies

Over the years, passwords have turned out to be predictable, crackable and overall, vulnerable. Microsoft has now joined hands with an alliance which aims to replace online passwords with better technologies.

By On December 14, 2013 Respond
Add To Bookmark Add To Readlist  
Gmail Will Always Display Images In Emails From Now On

Gmail Will Always Display Images In Emails From Now On

Until now, Gmail asked your permission to ‘Display Images Below’ before showing any pics within an email. With a new update, the email service will directly display the images, not requiring your permission any more.

By On December 13, 2013 Respond
Add To Bookmark Add To Readlist  
Hacker Tries To Sell Supercomputer Time, Gets Sentenced For 18 Months

Hacker Tries To Sell Supercomputer Time, Gets Sentenced For 18 Months

A hacker in eastern Pennsylvania came up with a unique entrepreneurial idea. He hacked into a couple of supercomputers and started selling access to them online. Sadly, an undercover FBI agent was among the first of his clients.

By On December 13, 2013 Respond
Add To Bookmark Add To Readlist  
Topic List
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook