website statistics

Archive for the ‘Security’ Category

Hacker Redirects Syrian Telecom Site To AT&T, T-Mobile

Hacker Redirects Syrian Telecom Site To AT&T, T-Mobile

We have recently seen many instances where hackers were successfully able to redirect users visiting popular sites to other pages. Syrian Electronic Army has deployed this tactic towards New York Times in recent days. On Wednesday, a hacker was able to redirect the site of a Syrian telecom provider to that of AT&T and then T-Mobile.

By On August 29, 2013 Respond
Add To Bookmark Add To Readlist  
Syrian Electronic Army Allegedly Takes Down New York Times For 20 Hours

Syrian Electronic Army Allegedly Takes Down New York Times For 20 Hours

The website of New York Times has run into a number of problems in recent times. Many groups of hackers have tried to take down the site or hack it for other nefarious purposes. The site was recently taken down, yet again, on Tuesday and the outage continued well into Wednesday.

By On August 29, 2013 Respond
Add To Bookmark Add To Readlist  
Cyberattack On NYT Was Launched Through A Melbourne IT Account

Cyberattack On NYT Was Launched Through A Melbourne IT Account

Hackers recently made yet another attempt at New York Times site. This time, they undertook the elaborate method of going to NYT’s domain registrar, the Melbourne IT, and somehow getting access to one of its accounts. This account was then used to launch a cyberattack at the NYT site.

By On August 28, 2013 Respond
Add To Bookmark Add To Readlist  
Hackers Deface Google Palestine Site

Hackers Deface Google Palestine Site

Since Google’s localized versions normally garner the highest amounts of traffic, they are the primary targets of different hackers. The localized Palestinian site of Google was recently defaced by hackers who were apparently ‘trying’ to put out a political message.

By On August 27, 2013 Respond
Add To Bookmark Add To Readlist  
70 Million User Accounts Exposed Due To Pinterest Exploit

70 Million User Accounts Exposed Due To Pinterest Exploit

In the recent past, we have seen that many social networks have been struggling with hacks and leaks which allow access to information about user accounts. It now seems that Pinterest has finally made the list. Dan Melamed found a critical vulnerability in the social network which would allow a potential hacker to view the emails of millions of users.

By On August 26, 2013 Respond
Add To Bookmark Add To Readlist  
Huge Denial-Of-Service Attack Takes Down Chinese Internet

Huge Denial-Of-Service Attack Takes Down Chinese Internet

Denial-of-service attacks are the most common method used by hackers when trying to sabotage the servers of any given entity. This weekend, someone locked in the target as China, and launched a huge denial-of-service attack on the Chinese internet. The attack took down a significant part of the internet in China for many hours.

By On August 26, 2013 Respond
Add To Bookmark Add To Readlist  
NSA Hacked Into UN Communications, Violated International Law

NSA Hacked Into UN Communications, Violated International Law

The ‘accomplishments’ of NSA have been surfacing on the web for a while now. Now, a German publication has reported that according to certain documents, the agency hacked into encrypted UN communications, thus violating international law.

By On August 26, 2013 Respond
Add To Bookmark Add To Readlist  
‘Instagram For PC’ Is A Scam, Leads To Filling Surveys

‘Instagram For PC’ Is A Scam, Leads To Filling Surveys

Instagram is the most wildly popular app used by all mobile platforms for sharing photos. Recently, there have been different ads across the social media, touting an ‘Instagram for PC’ version of the app. However, security experts have cited that this is not official and the application is typically a marketing scam.

By On August 22, 2013 Respond
Add To Bookmark Add To Readlist  
McAfee CTO Phyllis Schnek Gets Top Governmental Cybersecurity Post

McAfee CTO Phyllis Schnek Gets Top Governmental Cybersecurity Post

The White House has made a major move by appointing McAfee CTO, Phyllis Schnek, to the post of deputy undersecretary for cybersecurity. The role entails overlooking the efforts of the government in discerning domestic and foreign cyber attacks and countering them.

By On August 21, 2013 Respond
Add To Bookmark Add To Readlist  
UK Govt Destroys Hard Drives Hoping To Stop NSA Leaks

UK Govt Destroys Hard Drives Hoping To Stop NSA Leaks

One thing is nearly common in all the governments around the globe. They either have no idea how technology works or they decide to play dumb. Recently the UK government enacted this judgment by destroying hard drives at the Guardian office and hoping that would stop the NSA leaks by Edward Snowden.

By On August 20, 2013 1 Response
Add To Bookmark Add To Readlist  
Glen Greenwald’s Partner Held For Nine Hours At Heathrow Airport

Glen Greenwald’s Partner Held For Nine Hours At Heathrow Airport

Glen Greenwald has been instrumental in collaborating with Edward Snowden and publishing whatever he had to offer. The journalist was one of the key figures in letting the PRISM leaks reach the public. Recently, UK authorities held his partner at Heathrow Airport for nine hours on the pretext of questioning him.

By On August 19, 2013 1 Response
Add To Bookmark Add To Readlist  
Hacker Community Decides To Counter The Problem Of Suicide

Hacker Community Decides To Counter The Problem Of Suicide

In the past, a number of high-profile, highly-gifted hackers have committed suicide, out of depression. This has stirred the hacker community at large, instigating a debate as to how the hackers can prevent suicidal thoughts and get help if they run into depression.

By On August 16, 2013 Respond
Add To Bookmark Add To Readlist  
Hacker Breaks Into Baby Monitor, Parents Worry

Hacker Breaks Into Baby Monitor, Parents Worry

Baby monitors are usually used by parents to ensure that their kids have access only to controlled and limited content. However, a hacker was recently able to break into the baby monitor of a family in Houston and then went out to shout obscenities at a two-year old.

By On August 15, 2013 Respond
Add To Bookmark Add To Readlist  
Android Exploit Forces Bitcoin Applications To Upgrade Wallets

Android Exploit Forces Bitcoin Applications To Upgrade Wallets

Recently, a serious cryptography problem was discovered in Android. The exploit, when used by hackers to break into Bitcoin wallets, would’ve enabled them to steal the currency. In view of the security loophole, several Bitcoin applications have upgraded their wallets.

By On August 14, 2013 Respond
Add To Bookmark Add To Readlist  
NSA Claims Its Surveillance Involves Only 1.6% Of Internet Traffic

NSA Claims Its Surveillance Involves Only 1.6% Of Internet Traffic

The Obama government has come all out in defense of NSA and its extensive surveillance programs. The government has, in recent days, refused to tolerate absolutely any criticism of the agency. After the recent defense of NSA by President Obama, the agency has claimed that it’s surveillance web ‘touches’ only 1.6% of the internet traffic.

By On August 12, 2013 1 Response
Add To Bookmark Add To Readlist  
Topic List
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook