Security firmâ Eioneus Systemsâ claims to have found a serious security flaw in Universal Account Number(UAN) website (India). In a recent incident an information security firmâ Eioneus Systemsâ claims to have found a serious security flaw in Universal Account Number(UAN) website (India) which could have led to the theft of millions of userâs data. Eioneus Systems […]
A security expert discovered a serious five-year-old privilege-escalation vulnerability, tracked as CVE-2016-8655, that affects every Linux distro. In October, the security expert Phil Oester discovered a flaw in the Linux kernel, dubbed âDirty COWâ that could be exploited by a local attacker to escalate privileges. The name âDirty COWâ is due to the fact that itâs triggered by a […]
In November, an unknown attacker hacked the computer systems of the San Franciscoâs Municipal, now an individual hacked back the San Francisco Muni hacker. A couple of weeks ago, an unknown attacker hacked the computer systems of the San Franciscoâs Municipal railway giving riders a free ride all day on Saturday. Now the same hacker seems […]
The young hacker Kapustkiy and his colleague Kasimierz have broken into another website, the Argentinian Ministry of Industry (Ministerio de Produccion). The data breach exposed personal information, contact details (i.e. names, addresses, emails, phone numbers, Facebook and Twitter accounts), and private documents of a large number of individuals. The hackers breached the Argentinian Ministry of Industry website produccion.gob.ar by […]
Stegano campaign – Millions of people visiting major websites may have been infected with malicious code that was embedded in pixels of the ads banners. A single pixel could be used to compromise your PC, millions of people visiting major websites over the past months may have been infected with malicious code that was embedded in […]
Many Sony cameras could be hijacked by hackers and infected with Mirai-like malware due to the presence of a sort of secret backdoor. Sony has closed a sort of debug backdoor that was spotted in 80 web-connected surveillance cameras. The hardcoded logins in the firmware of the Sony cameras can be exploited to hijack the […]
Experts from the firm Recorded Future published a report on the most common vulnerabilities used by threat actors in the exploit kits. Recorded Future published an interesting report on the most common vulnerabilities used by threat actors in the exploit kits. The experts observed that Adobe Flash Player and Microsoft products (Internet Explorer, Silverlight, Windows) continue […]
The North Korean operating system Red Star OS isn’t hacker proof, researchers demonstrated that it can be easily hacked remotely. Red Star OS is an operating system used by the population in North Korea. According to two German researchers from the IT security company ERNW who analyzed it early this year, it is characterized by a high […]
Nintendo presented its bug bounty program for 3DS consoles, the company is willing to pay between $100 and $20,000 for vulnerabilities found in the product. Good news, Nintendo joins the club of the “bug bounty program,” companies that decide to exploit this mechanism to involve ethical hacking communities. The company is the last in order of […]
The popular video sharing website Dailymotion has suffered a massive data breach that leads the exposure of 87 million accounts. According to the data breach notification service LeakedSource, millions of user accounts allegedly stolen from the Video-sharing Website Dailymotion. LeakedSource confirmed to have received a database containing 87.6 million accounts belonging to roughly 85 million users having […]