The Finnish security expert Jouko Pynnönen discovered a vulnerability in the Yahoo email service that allowed hackers to read anyone messages. A vulnerability in the Yahoo email service allowed hackers to read anyone messages. The giant IT has recently patched the flaw that was discovered by Jouko Pynnönen, a Finnish Security researcher from security firm Klikki […]
On Tuesday night, a group of unknown hackers took control of the Israeli TV broadcast Channel 2 and played Muslim call to prayer. On Tuesday night, a group of hackers took control of an Israeli news Channel 2 and played Muslim call to prayer. The hackers want to protest a controversial bill that limits the […]
The Thieving Magpie programme allows the NSA and the GCHQ to intercept data from passengers traveling on board commercial aircrafts. This isn’t a sci-fi movie, the GCHQ and the NSA have spied on air passengers using in-flight GSM mobile services for years. The news was revealed by new documents obtained by Edward Snowden and recently […]
Security firmâ Eioneus Systemsâ claims to have found a serious security flaw in Universal Account Number(UAN) website (India). In a recent incident an information security firmâ Eioneus Systemsâ claims to have found a serious security flaw in Universal Account Number(UAN) website (India) which could have led to the theft of millions of userâs data. Eioneus Systems […]
A security expert discovered a serious five-year-old privilege-escalation vulnerability, tracked as CVE-2016-8655, that affects every Linux distro. In October, the security expert Phil Oester discovered a flaw in the Linux kernel, dubbed âDirty COWâ that could be exploited by a local attacker to escalate privileges. The name âDirty COWâ is due to the fact that itâs triggered by a […]
In November, an unknown attacker hacked the computer systems of the San Franciscoâs Municipal, now an individual hacked back the San Francisco Muni hacker. A couple of weeks ago, an unknown attacker hacked the computer systems of the San Franciscoâs Municipal railway giving riders a free ride all day on Saturday. Now the same hacker seems […]
The young hacker Kapustkiy and his colleague Kasimierz have broken into another website, the Argentinian Ministry of Industry (Ministerio de Produccion). The data breach exposed personal information, contact details (i.e. names, addresses, emails, phone numbers, Facebook and Twitter accounts), and private documents of a large number of individuals. The hackers breached the Argentinian Ministry of Industry website produccion.gob.ar by […]
Many Sony cameras could be hijacked by hackers and infected with Mirai-like malware due to the presence of a sort of secret backdoor. Sony has closed a sort of debug backdoor that was spotted in 80 web-connected surveillance cameras. The hardcoded logins in the firmware of the Sony cameras can be exploited to hijack the […]
Experts from the firm Recorded Future published a report on the most common vulnerabilities used by threat actors in the exploit kits. Recorded Future published an interesting report on the most common vulnerabilities used by threat actors in the exploit kits. The experts observed that Adobe Flash Player and Microsoft products (Internet Explorer, Silverlight, Windows) continue […]
The North Korean operating system Red Star OS isn’t hacker proof, researchers demonstrated that it can be easily hacked remotely. Red Star OS is an operating system used by the population in North Korea. According to two German researchers from the IT security company ERNW who analyzed it early this year, it is characterized by a high […]