• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Signal is down for multiple users worldwide
  • Expert launched Malvuln, a project to report flaws in malware
  • Winnti APT continues to target game developers in Russia and abroad
  • Cisco says its RV routers will no longer receive updates
  • Expert discovered a DoS vulnerability in F5 BIG-IP systems
  • Operation Spalax, an ongoing malware campaign targeting Colombian entities
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Hacking (Page 586)

Hacking

Who has hacked the Apple iOS Developer Center?

After a weekend of outage and various mysterious password reset emails Apple has revealed that the iOS Developer Center was hacked. After 3 days of absolute silence of the voice of a possible hack to the IOS Developer Center, Apple has just confirmed...

July 23, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Utopian security. Clamorous data breaches on Ubuntu Forums and Tango

The news for clamorous data breaches on Tango Application and The Ubuntu Forum create concerns on the level of security offered by principal service providers News of numerous and clamorous data breaches due cyber attacks is circulating on the internet,...

July 22, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Vulnerability on SIM cards compromises security for millions of phones

A vulnerability on SIM cards, and in particular on the DES algorithm for the encryption, could compromise the security of mobile phones. A serious vulnerability on SIM cards used in some mobile phones has been found, exploiting the flaw an attacker...

July 21, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Anonymous leaked incorrect credentials of Congress members

Alleged members of the hacker collective Anonymous posted alleged passwords of Hill staffers, but according expert they are outdated and inaccurate. Anonymous claimed to have stolen credentials of members of Congress to protest against the popular surveillance...

July 20, 2013  By Pierluigi Paganini   Posted In  Hacking 

“Cyber-crime, securities markets and systemic risk” study released

“Cyber-crime, securities markets and systemic risk” is the study issued by IOSCO and WFE that discussed systemic impact by cybercrime on securities markets “Cyber-crime, securities markets and systemic risk” is the title of a paper issued by The International...

July 18, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

New Android Master Key attack revealed by Android Security Squad

The China-based group Android Security Squad revealed a new Android Master Key attack that exploits the vulnerability in the way the OS reads APK files allowing modification of signed legitimate apps. The China-based group Android Security Squad found...

July 17, 2013  By Pierluigi Paganini   Posted In  Hacking  Malware  Security 

Researchers can hack Verizon Wireless femtocells to spy on customers

Two security researchers announced that they have succeeded to transform Verizon mobile phones into spy tools to track Verizon’s users. The security experts revealed to the Reuters agency that it is possible to hack Verizon mobile phones for surveillance...

July 16, 2013  By Pierluigi Paganini   Posted In  Hacking 

Critical Facebook vulnerability allows account hacking

Security expert Dan Melamed discovered a critical Facebook vulnerability would allow an attacker to take complete control over any account. A critical Facebook vulnerability would allow an attacker to take complete control over any account, the discovery...

July 14, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Gaming platforms under attack – Nintendo and Ubisoft hacks

The number of attacks against gaming platforms is constantly increasing, the recent data breach occurred to Nintendo and Ubisoft are just the tip of the iceberg. Gaming platforms are considerable privileged targets for cybercriminals but also for state-sponsored...

July 11, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking 

Critical Facebook flaw exposed email address for any account

A critical Facebook flaw exposed email address for any account, the discovery was made by Stephen Sclafani, security researcher and founder of PlayToWin. Another vulnerability menaces privacy of Facebook users allowing the disclosure of primary email...

July 10, 2013  By Pierluigi Paganini   Posted In  Hacking  Security  Social Networks 


« First‹ Previous582583584585586587588589590Next ›Last »
Page 586 of 609




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.