Facebook Vulnerability Allowed Hacker To Delete Any Photo

Facebook Vulnerability Allowed Hacker To Delete Any Photo

Facebook vulnerabilities are nothing new but they are always significant all the same. This time, an Indian security researcher has unearthed a critical vulnerability in the social network. By exploiting the vulnerability, any hacker could easily delete any Facebook image.

By On September 2, 2013 Respond
Add To Bookmark Add To Readlist  
Syrian Electronic Army Allegedly Takes Down New York Times For 20 Hours

Syrian Electronic Army Allegedly Takes Down New York Times For 20 Hours

The website of New York Times has run into a number of problems in recent times. Many groups of hackers have tried to take down the site or hack it for other nefarious purposes. The site was recently taken down, yet again, on Tuesday and the outage continued well into Wednesday.

By On August 29, 2013 Respond
Add To Bookmark Add To Readlist  
Cyberattack On NYT Was Launched Through A Melbourne IT Account

Cyberattack On NYT Was Launched Through A Melbourne IT Account

Hackers recently made yet another attempt at New York Times site. This time, they undertook the elaborate method of going to NYT’s domain registrar, the Melbourne IT, and somehow getting access to one of its accounts. This account was then used to launch a cyberattack at the NYT site.

By On August 28, 2013 Respond
Add To Bookmark Add To Readlist  
Hacker Breaks Into Baby Monitor, Parents Worry

Hacker Breaks Into Baby Monitor, Parents Worry

Baby monitors are usually used by parents to ensure that their kids have access only to controlled and limited content. However, a hacker was recently able to break into the baby monitor of a family in Houston and then went out to shout obscenities at a two-year old.

By On August 15, 2013 Respond
Add To Bookmark Add To Readlist  
US And China Set To Meet Over Cybersecurity Issues

US And China Set To Meet Over Cybersecurity Issues

Cybersecurity has emerged as a major espionage tool in recent years, one that can be used by individual nations. In the past, China has been repeatedly accused of using hackers to steal industrial and military designs from U.S. firms. To discuss the matter, U.S. and China are all set to meet next month.

By On June 3, 2013 Respond
Add To Bookmark Add To Readlist  
Yahoo Japan: 22 Million User IDs Leaked

Yahoo Japan: 22 Million User IDs Leaked

Yahoo is back in the tech headlines every once in a while. And most of the times, it is for all the wrong reasons. The company has repeatedly been criticized for having systems which turn out to be insecure. Now, Yahoo Japan has revealed that it suspects that the IDs of some 22 million of its users have been leaked.

By On May 18, 2013 Respond
Add To Bookmark Add To Readlist  
Three LulzSec Hackers Sentenced To Prison Terms

Three LulzSec Hackers Sentenced To Prison Terms

LulzSec is among one of the most well-known hacktivist outfits online. The group has been involved in many high-profile hacks in the past. Now, a court has sentenced three LulzSec members to prison terms ranging between one and three years.

By On May 17, 2013 Respond
Add To Bookmark Add To Readlist  
LulzSec Leader Arrested By Australian Federal Police

LulzSec Leader Arrested By Australian Federal Police

LulzSec is a very well-known hacktivist outfit which often indulges in taking down or defacing governments websites as well as those of different corporations. Australian Federal Police (AFP) has now arrested an individual in Sydney which, the police claims, is the leader of LulzSec.

By On April 24, 2013 Respond
Add To Bookmark Add To Readlist  
Bangladeshi Hacker Defaces Google’s Kenyan Domain

Bangladeshi Hacker Defaces Google’s Kenyan Domain

Google is among the popular website around most of the world. So naturally, when any one of the search giant’s domains run into trouble, it is propelled into limelight. Recently, a Bangladeshi hacker targeted Google’s Kenyan domain name by hacking and defacing it.

By On April 17, 2013 Respond
Add To Bookmark Add To Readlist  
China Initiated Massive Cyberattack On South Korea

China Initiated Massive Cyberattack On South Korea

China has been implicated in countless cases of cyber attacks directed at governments, media and corporate entities. Yet, the country hasn’t budged in its policies of continuing support for state-sponsored hackers. The latest victim of the country’s espionage attempts was South Korea.

By On March 21, 2013 Respond
Add To Bookmark Add To Readlist  
Convert GTX 690 Into Tesla K10 Or Quadro K5000 With A Simple Hack

Convert GTX 690 Into Tesla K10 Or Quadro K5000 With A Simple Hack

The GTX 690 from Nvidia costs a cool $999. In comparison, the Tesla K10 is an even expensive piece of hardware, priced at $3000, and Quadro K5000 costs $1750. What if you were told that you could turn GTX 690 into Tesla K10 and/or Quadro K5000 too with a simple hack? A hacker just found a way of doing so by tweaking a resistor mod!

By On March 21, 2013 Respond
Add To Bookmark Add To Readlist  
Database Of US National Cyber Vulnerabilities Hacked

Database Of US National Cyber Vulnerabilities Hacked

It is fairly ironic when a government entity, meant to help thwart cyber attacks and hacking attempts, gets to be under the ax itself. In this case, it is the National Institute of Standards and Technology’s National Vulnerability Database website which has been offline since many days, apparently due to a malware infection.

By On March 15, 2013 Respond
Add To Bookmark Add To Readlist  
Hacker Uses Facebook App For Phishing Attack And Hacking Facebook Pages

Hacker Uses Facebook App For Phishing Attack And Hacking Facebook Pages

It seems that hackers have devised some really interesting ways of phishing login credentials on Facebook. Apparently, this is being done with the help of a very authentic-looking Facebook app called ‘Verify Pages.’ The app is created by a hacker but with the Facebook Security logo on it, it looks very real and has led to the hacking of multiple Facebook pages.

By On March 9, 2013 Respond
Add To Bookmark Add To Readlist  
Evernote Reveals Plans Of Implementing Two-Step Authentication After Recent Hack

Evernote Reveals Plans Of Implementing Two-Step Authentication After Recent Hack

We recently reported that Evernote recently suffered a security breach in which the hackers were able to access the login credentials of its users. The company was quick to respond to this by resetting the passwords of all the users and now, it has expressed the intent of implementing two-step authentication soon.

By On March 6, 2013 Respond
Add To Bookmark Add To Readlist  
Jailed Hacker Breaks Into Prison Computers During IT Class

Jailed Hacker Breaks Into Prison Computers During IT Class

Hackers are rarely nabbed by the authorities but once they get caught, they usually end up in a jail, given the long list of charges against most of them. One such hacker, Nicholas Webber, was jailed for a hacker marketplace site ‘GhostMarket’ which he had created. In prison, he was invited to an IT class where he was able to hack into prison’s mainframe.

By On March 4, 2013 Respond
Add To Bookmark Add To Readlist  
Topic List
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook