Thứ Bảy, 25 tháng 7, 2015

Car Hacking ? Scary, But Now it’s REALITY!

Next time you find yourself hooked up behind the wheel, make sure that your car is actually in your control.
Hackers are now able to break into hundreds of thousands of vehicles on the road.
Car hacking is a hot topic today and until now it was performed only while researchers were hard-wired into a car's electrical system.
However, the most recent hack performed by two computer hackers, who have

All Smartwatches are vulnerable to Hackers





Do you own a Smartwatch? If yes, then how safe it is? There are almost 100 percent chances that you own a vulnerable Smartwatch.



Computer manufacturer Hewlett-Packard is warning users of smartwatches including Apple Watch and Samsung Gear that their wearable devices are vulnerable to cyber attacks.



In a study, HP's Fortify tested today's top 10 smartwatches for security features, such

Thứ Sáu, 24 tháng 7, 2015

Introducing 93Gbps High-Speed Tor-Like Encrypted Anonymous Network





I think you'll agree with me when I say:



It's quite hard to maintain anonymity on the Internet using the slow Tor network. Or is it?



Well, it turns out, you may soon boost your online anonymity dramatically with the help of a new high-speed anonymity network.



A group of six academics have developed a Tor network alternative for users that allows high-speed anonymous web surfing,

RCSAndroid — Advanced Android Hacking Tool Leaked Online





As digging deeper and deeper into the huge Hacking Team data dump, security researchers are finding more and more source code, including an advanced Android Hacking Tool.



Yes, this time researchers have found a source code to a new piece of weaponized android malware that had the capability to infect millions of Android devices even when users are running latest versions of the android

Oh Gosh! Four Zero Day Vulnerabilities Disclosed in Internet Explorer





How many Zero-Days do you think could hit Microsoft today? Neither one nor two; this times its Four.



The Hewlett-Packard's Zero-Day Initiative (ZDI) has disclosed four new zero-day vulnerabilities in Microsoft's Internet Explorer browser that could be exploited to remotely execute malicious code on victim's machine.



All the four zero-days originally were reported to Microsoft, affecting

Thứ Năm, 23 tháng 7, 2015

WordPress 4.2.3 Security Update Released, Patches Critical Vulnerability





WordPress has just released the new version of its content management system (CMS), WordPress version 4.2.3, to fix a critical security vulnerability that could have been exploited by hackers to take over websites, affecting the security of its Millions of sites.



WordPress version 4.2.3 resolves a Cross-Site Scripting (XSS) flaw that could allow any user with the Contributor or Author role

Bug in OpenSSH Opens Linux Machines to Password Cracking Attack





A simple but highly critical vulnerability recently disclosed in the most widely used OpenSSH software allows attackers to try thousands of password login attempts per connection in a short period.



OpenSSH is the most popular software widely used for secure remote access to Linux-based systems. Generally, the software allows 3 to 6 Password login attempts before closing a connection, but a

Apple Mac OS X Vulnerability Allows Attackers to Hack your Computer





A security researcher has discovered a critical vulnerability in the latest version of Apple's OS X Yosemite that could allow anyone to obtain unrestricted root user privileges with the help of code that fits in a tweet.



The privilege-escalation vulnerability initially reported on Tuesday by German researcher Stefan Esser, could be exploited by to circumvent security protections and gain

Thứ Tư, 22 tháng 7, 2015

Hacking Team: We're Victim of a Criminal Cyber Attack





Hacking Team, the Italy-based spyware company that sells spying software to law enforcement agencies worldwide, says the company has always operated with the law and regulation in an ethical manner.



However, there was only one Violation of Law in this entire event, and that is – "the massive cyber attack on the Hacking Team." company stated.



The recent hack on Hacking Team exposed

​Google, Yahoo, Facebook Collaborate to Blacklist Bad Bots





The major tech companies including Google, Facebook, and Yahoo! have joined their hands to launch a new program meant to block fake web traffic by blacklisting flagged IP addresses.



Today, majority of data center traffic is non-human or illegitimate, so to fight against this issue the Trustworthy Accountability Group (TAG) has announced a program that will tap into Google's internal

600TB MongoDB Database 'accidentally' exposed on the Internet





System administrators have reportedly exposed almost 600 Terabytes (TB) of MongoDB database due to running outdated and unpatched versions of the NoSQL MongoDB database.



The open source MongoDB is the most popular NoSQL database used by companies of all sizes, from eBay and Sourceforge to The New York Times and LinkedIn.



According to Shodan's representative John Matherly, nearly 30,000

Thứ Ba, 21 tháng 7, 2015

Lessons We Learned From Ashley Madison Data Breach





Do you use your Real Identity online and think about being private? If yes, then you are insane.



Ashley Madison, the popular online dating website with tagline "Life is short. Have an affair", recently got hacked, reportedly exposing a sample of its users' account information and other personal data online.



The hacker group, called itself 'The Impact Team', is also threatening to

Oops! Adult Dating Website Ashley Madison Hacked; 37 Million Accounts Affected





"Life is short. Have an affair," but always remember "Cheaters never prosper."



AshleyMadison.com, an American most prominent dating website, that helps married people cheat on their spouses has been hacked, potentially putting very private details of Millions of its users at risk of being exposed.



The Stolen personal data may include information from users’ real names, addresses and

Thứ Hai, 20 tháng 7, 2015

Microsoft releases Emergency Patch Update for all versions of Windows





In the wake of a critical Remote Code Execution vulnerability in all supported versions of its operating system platform, Microsoft has just issued an emergency fix.



Yes, it’s time to patch your Windows operating system against an alarming security hole that could allow remote attackers to run malicious code on your computer, thereby taking "complete control of the affected system."



Hacking Team is known for its advanced and

Thứ Hai, 13 tháng 7, 2015

Bitcoin Cloud Mining Service Hacked; Database On Sale for Just 1 Bitcoin





Bitcoin Cloud Mining service Cloudminr.io has been hacked and its whole users database is on sale for 1 Bitcoin.



The unknown hackers have successfully taken full control of the website's server and defaced the homepage of the website.



Users visiting the website are greeted with a defaced homepage showing the partial database of around 1000 clients including their usernames and

Google Photo App Uploads Your Images To Cloud, Even After Uninstalling





Have you ever seen any mobile application working in the background silently even after you have uninstalled it completely?



I have seen Google Photos app doing the same.



Your Android smartphone continues to upload your phone photos to Google servers without your knowledge, even if you have already uninstalled the Google Photos app from your device.



Nashville Business

Chủ Nhật, 12 tháng 7, 2015

Malicious Gaming App Infects More than 1 Million Android Users





It's not at all surprising that the Google Play Store is surrounded by a number of malicious applications that may gain users' attention to fall victim for one, but this time it might be even worse than you thought.



Threat researchers from security firm ESET have discovered a malicious Facebook-Credentials-Stealing Trojan masquerading as an Android game that has been downloaded by more

Israeli Singer Jailed for Hacking Madonna Emails





An Israeli Singer and former contestant on a reality talent show has been jailed for hacking Madonna's online accounts and stealing songs from her unreleased music tracks.



Adi Lederman, 39, who participated in Israel's version of American Idol called A Star Is Born, is set to spend his 14 months in prison and pay $4000 in fine after confessing to computer trespassing, infringement of

Gamer Drugged His Girlfriend So He Could Play Xbox for a Few More Hours





Yes, you heard it right. A gamer drugged his girlfriend to avoid interruption while playing on his Microsoft's Xbox Live.



The 23-year-old German man, who has not been named, was fined EUR€500 (approx USD$555) by a judge in a Castrop-Rauxel district court, German website The Local reports.



The man admitted in front of judge that he put between four and five drops of a

Second Flash Player Zero-day Exploit found in 'Hacking Team' Dump





Another Flash zero-day exploit has emerged from the hundreds of gigabytes of data recently leaked from Hacking Team, an Italian surveillance software company that is long been accused of selling spying software to governments and intelligence agencies.



The critical zero-day vulnerability in Adobe Flash is a Use-After-Free() programming flaw (CVE-2015-5122) which is similar to the

Thứ Bảy, 11 tháng 7, 2015

The Pirate Bay Founders Free Of Criminal Copyright Case





The four co-founders of The Pirate Bay, the world’s most popular torrent website, have been cleared of charges alleging criminal copyright infringement and abuse of electronic communications in a Belgian court.



The Pirate Bay co-founders Gottfrid Svartholm, Fredrik Neij, Peter Sunde and Carl Lundström were acquitted by a Belgian court located in Mechelse after it was found that they could

WhatsApp Could Offer 'Like' and 'Mark as Unread' Features Soon





The popular instant messaging app WhatsApp might adopt some features from its parent company, Facebook.



The messaging giant is testing some new features that might be coming to the app soon. The features include a 'Like' button similar to that of Facebook and a 'Mark as Unread' feature for chat messages, AndroidPit reports.


'Like' Button for Images



Ilhan Pektas, WhatsApp beta tester,

German Missile System Hacked; 'Unexplained' Commands Executed Remotely





Now this is a shockingly dangerous threat when hackers are taking over weapons and missiles.



This time I am not talking about weapon systems being hackable, but being HACKED!



A German Patriot anti-aircraft missile system stationed on Turkish-Syrian border was reportedly hacked and taken over by an unknown "foreign source" who successfully executed "unexplained commands."


Similar to the

Facebook Can Recognize You Even if You Don't Show Your Face





Well, this is incredible and scary both at the same time. Forget about "facial" recognition; Facebook's newest technology is way good at identifying you in photos even without the need to see your face.



The New Scientist is reporting about the Facebook's new "experimental" facial recognition algorithm which is so powerful that it can identify you in photos even when your faces are hidden.

You Can Now Use Messenger App without a Facebook Account





Don't have Facebook account but want to use its Messenger service? Then go for it because Mark Zuckerberg wants even the people who hate Facebook to use the social network's separate Messenger service.



So, you no longer need an active Facebook account to make use of the Messenger service, all you need is just your name and phone number, the company announced today.



France May Offer Asylum to Edward Snowden and Julian Assange





In wake of the latest revelations about the National Security Agency (NSA) global spying on country’s leaders, France may decide to offer political asylum to whistleblowers Edward Snowden and Julian Assange, as a "symbolic gesture."



Former NSA contractor Edward Snowden, who is facing criminal espionage charges in the U.S., has remained in Russia for almost two years after exposing the

Thứ Năm, 25 tháng 6, 2015

Adobe Releases Emergency Patch for Flash Zero-Day Vulnerability





Adobe has rolled out an emergency software patch for its Flash Player to patch a critical zero-day vulnerability that is already exploited by the hackers in the wild.



The company said the flaw could potentially allow hackers to take control of the affected system and that it had evidence of "limited, targeted attacks" exploiting the flaw.



Therefore, Adobe is urging users and

Google Chrome Silently Listening to Your Private Conversations





Google was under fire of downloading and installing a Chrome extension surreptitiously and subsequently listened to the conversations of Chromium users without consent.



After these accusations, a wave of criticism by privacy campaigners and open source developers has led Google to remove the extension from Chromium, the open-source version of the Chrome browser.



The extension in

Mind Blowing Radar-based Gesture Recognition Technology for Everything





Since it introduced at the annual Google I/O conference, Project Soli has been trending on the Internet.



Project Soli is one of Google's latest cutting-edge experiments that could actually transform the way humans interact with technology.



Project Soli is not a wearable watch you might think it is.



So what is Project Soli?




It's you.



Yes, you heard it right. Google's secretive

Thứ Tư, 24 tháng 6, 2015

'Undo Send' — How to Unsend Emails in Gmail





Sending an important and confidential email to one of my friends and mistakenly clicked send to someone else. Holy crap!



This is something experienced by everyone of us at some point. When we accidentally hit the reply-all button, send an email to the wrong person, or sometimes forget to attach a file, and then left only with an instant pain of regret. It feels like there is no going back.

Creator of Blackshades Malware Jailed 4 Years in New York





A Swedish man who was the mastermind behind the $40 BlackShades Remote Access Tool (RAT) that infected over half a million systems around the world was sentenced to almost five years in a U.S. prison on Tuesday.



Alex Yücel, 25, owned and operated an organization called "BlackShades" that sold a sophisticated and notorious form of software, called RAT, to several thousands of hackers and

Thứ Ba, 23 tháng 6, 2015

How to Hack into Computers using Pita Bread and A Radio





There's a new and clever way of hacking into computers, and it can be done cheaply – Using just a radio receiver and a piece of pita bread.



Yeah, you heard it right. Security researchers at Tel Aviv University have demonstrated how to extract secret decryption keys from computers by capturing radio emissions of laptop computers.



Capturing the radio signals to steal data from a computer

How Google Is Tracking Your Movie and Event Activities





No doubt, You must be aware that Google tracks you, but what you probably did not realize is how precisely and till what extent it tracks you.



Well, Google knows which movies I watched where, when, at what time and with how many of my friends, and knows it so well — even my eyebrows raised slightly in surprise!



Yes, you heard right.



If you are using your Gmail account like I do,

WebAssembly — New Standard for Powerful and Faster Web Apps





Google, Apple, Microsoft, and Mozilla have joined hands to create code for use in the future web browsers that promises up to 20 times faster performance.



Dubbed WebAssembly (or wasm for short), a project to create a new portable bytecode for the Web that will be more efficient for both desktop as well as mobile web browsers to parse than the complete source code of a Web page or an

Thứ Hai, 22 tháng 6, 2015

How to Manage Android App Permissions to Protect Your Privacy





Do you actually read the list of permissions that Android apps are asking for before you install them?



I know most of us treat those permissions like terms and conditions, blindly tapping our way through. But if you actually do, you would be aware of their reach.



Some of your apps can make phone calls
Some can track your location
Some can read your browsing history, contacts, SMS,

Thứ Bảy, 20 tháng 6, 2015

WhatsApp Ranked Worst at Protecting Your Privacy and Data





The Electronic Frontier Foundation has released its annual report card of tech companies for 2015 based upon how much they keep your personal data secure from government snoops.



And the Worst Companies Award goes to…



At&T
WhatsApp
Verizon


Yes, you heard right! WhatsApp is one of the three worst companies at protecting its users’ data so if you are concerned about your data privacy,

This Simple Trick Requires Only Your Phone Number to Hack your Email Account





We all have been receiving spam phone calls and messages on almost daily basis from scammers who want to pilfer your money and personal information, but a new type of social engineering hack that makes use of just your mobile number to trick you is a little scarier.



Security firm Symantec is warning people about a new password recovery scam that tricks users into handing over their webmail

5G Mobile Networks to Offer Speed Up To 20Gbps





While many of us are battling with the slow data access and still awaiting the roll-out of 4G Networks, the International Telecommunication Union (ITU) is already looking forward to the next generation of telecommunication network technology.



Yes folks, we are talking about the future 5G standard for mobile networking.



Since 5G standard is currently in the definition stage, the ITU has

Thứ Sáu, 19 tháng 6, 2015

Free Encryption Project to issue First SSL/TLS Certificates Next Month





Let's Encrypt, a project aimed to provide free-of-charge and easier-to-implement way to obtain and use a digital cryptographic certificates (SSL/TLS) to secure HTTPS website, is looking forward to issue its first digital certificates next month.



With Let's Encrypt, any webmaster interested in implementing HTTPS for their services can get the certificates for free, which is a great move for

Samsung Flaw Lets Hacker Easily Take Control of Your Galaxy Mobile Remotely





More than 600 Million users of Samsung Galaxy smartphones, including the newly released Galaxy S6, are potentially vulnerable to a software bug that allows hackers to secretly monitor the phone's camera and microphone, read text messages and install malicious apps.



The vulnerability is due to a problem with the Samsung built-in keyboard app that enables easier predictive text.



One of

Zero-Day Exploits for Stealing OS X and iOS Passwords





I think you'll agree with me when I say: Apple devices are often considered to be more safe and secure than other devices that run on platforms like Windows and Android, but a recent study will make you think twice before making this statement.



A group of security researchers have uncovered potentially deadly zero-day vulnerabilities in both iOS and OS X operating systems that could put

Thứ Hai, 15 tháng 6, 2015

How To Encrypt Your USB Drive to Protect Data

The USB flash drives or memory sticks are an excellent way to store and carry data and applications for access on any system you come across. With storage spaces already reaching 256 gigabytes, nowadays USB drives are often larger than past's hard drives.
Thanks to increased storage capacity and low prices, you can easily store all your personal data on a tiny, easy-to-carry, USB memory stick.

Thứ Sáu, 12 tháng 6, 2015

IT Security – Do it the hard or easy way!





Whether you are a one-stop-shop IT guy or a network admin on a large IT team you owe it to yourself to learn about Security Information and Event Management (SIEM) technology.



Why? SIEM lets you correlate between events recorded in different logs for related systems. This is significant because attackers often exploit multiple vulnerabilities on separate but connected systems.



For a

Do You also want to Hack Facebook Account of your Girlfriend?





We at The Hacker News get a lot of requests via emails and messages from people who want to hack into someone else’s Facebook account or Gmail account or break into somebody’s network.



However, 80 to 90 percent requests we receive every day are from people who want to hack into their girlfriend, boyfriend, wife, or husband’s Facebook account in order to read their private conversations and

Thứ Năm, 11 tháng 6, 2015

I keep 200+ Browser Tabs Open, and My Computer Runs Absolutely Fine. Here’s My Secret.





I don't know about your part, but I make heavy use of tabs. I currently have 200+ tabs open in my Google Chrome Web browser. And sometimes the number is even more.



For me it's a daily thing, as I regularly open new tabs because of my habit of reading lots of stuff online, including cyber security updates, hacking news, knowledgeable articles of various categories, new recipes to cook

Thứ Tư, 10 tháng 6, 2015

Why We Love Android M (And You Should, Too!)





Google has recently announced its latest version of the mobile operating system called Android M at its official Google I/O 2015 developer event May 28 in San Francisco.



We don’t know exactly what is the 'M' stands for just yet. My guess is it could be Marzipan or maybe Milky Way. Let me know what you guys think, so write me your guesses down below in the comments.



Android M is not

Thứ Hai, 8 tháng 6, 2015

Apple Mac OS X 10.11 'El Capitan' Update unveiled at WWDC 2015





After Google made its Android users happy by unveiling new features in Google I/O developer conference last month, it’s now time for Apple fans…WWDC 2015 event is upon us.



Apple’s Worldwide Developers Conference is going on in San Francisco and the company has many new surprises for its users. One of them is the new operating system for Macs, which Apple unveiled on stage on Monday.



Python for Security Professionals: Free IT Security Training





Python is an excellent programming language that has rapidly become popular among Hackers, Reverse engineers, software testers, Forensic analyst and Penetration testers.



Python is a simple object-oriented and minimalistic language that is easy to learn for novice programmers as well as experienced developers. Most Python programs run on all major operating systems including Windows, Linux

Thứ Bảy, 6 tháng 6, 2015

Is China Behind the Massive Data Theft of 4 Million U.S. Officials?





The US federal agency has notified its 4 Million current and former government employees that their private data has been compromised in a massive data breach.



Hackers managed to break into US government computer systems in the Office of Personnel Management (OPM) and steal records of Millions of employees, making it one of the largest known breaches of information ever on federal workers.

Beware! Facebook UnfriendAlert Software Steals Your Account Password





Today everybody wants to know — Who visited my Facebook profile?, Who unfriended me from the Facebook Friend list?, Who saw my Facebook posts?, and many other features that isn't provided by Facebook by default.



So most Facebook users try to find out a software and fall victim to one that promises to accomplish their desired task. Hackers make use of this weakness and often design

Thứ Sáu, 5 tháng 6, 2015

How Apple Pay Can Be Hacked to Steal Your Credit Card Details

Today anywhere you go, you will come across Free or Public WiFi hotspots -- it makes our travel easier when we stuck without a data connection.
Isn’t it?
But, I think you’ll agree with me when I say:
This Free WiFi hotspot service could bring you in trouble, as it could be a bait set up by hackers or cyber criminals to get access to devices that connects to the free network.
This is why mobile

Hijacking WhatsApp Account in Seconds Using This Simple Trick





The hugely popular smartphone messaging service WhatsApp, acquired by Facebook for over $20 billion last year, has reportedly been found to be prone to hijacking without unlocking or knowing your device password, making its hundreds of Millions of users vulnerable to, not just hackers, but also non-technical people.



This trick lets anyone surrounds you to get effectively control over your

Thứ Tư, 3 tháng 6, 2015

The Pirate Bay Co-Founder Released From Swedish Prison





Fredrik Neij, the third and the last founder of the infamous file-sharing website The Pirate Bay, was released on Monday from a Swedish prison.



Neij, who goes by the online moniker "TiAMO", was arrested by Thai immigration authorities at the end of November 2014 while he was trying to cross the border illegally from Laos to Thailand and then extradited to a prison in Skänninge, Sweden.



This Simple Message Can Crash Skype Badly and Forces Re-Installation





Just last week iPhone and iPad users were dealing with an iOS text bug that caused the app to crash and iPhones to reboot, now a similar bug has been found that takes out Skype — the popular video chat and messaging service.



Yes, Microsoft-owned Skype VoIP client is also affected by a bug that crashes almost every single version of the Skype client on both desktops and mobile phones with a

Microsoft Plans to Add Secure Shell (SSH) to Windows





Until now Unix and Linux system administrators have to download a third-party SSH client software like Putty on their Windows machines to securely manage their machines and servers remotely through Secure Shell protocol or Shell Session (better known as SSH).



This might have always been an awkward feature of Windows platform, as it lacks both – a native SSH client software for connecting

Thứ Ba, 2 tháng 6, 2015

Apple Mac OSX Zero-Day Bug Allows Hackers to Install RootKit Malware





A zero-day software vulnerability discovered deep in the firmware of many Apple computers could allows an attacker to modify the system’s BIOS and install a rootkit, potentially gaining complete control of the victim’s Mac.



The critical vulnerability, discovered by well-known OS X security researcher Pedro Vilaca, affects Mac computers shipped before mid-2014 that are allowed to go into

Thứ Hai, 1 tháng 6, 2015

New Facebook feature Encourages users to use PGP for Encrypted Communications





In this era of Global surveillance, we all are worried about the privacy of our communication and sensitive data. There is no guarantee that our data is not being snooped on, but there is a solution — PGP (Pretty Good Privacy).



PGP (Pretty Good Privacy) is more than 20 years old technology but is yet not widely adopted.



PGP is an open source end-to-end encryption standard to encrypt

How to Hack a Computer Using Just An Image





Next time when someone sends you a photo of a cute cat or a hot chick than be careful before you click on the image to view — it might hack your machine.



Yes, the normal looking images could hack your computers — thanks to a technique discovered by security researcher Saumil Shah from India.



Dubbed "Stegosploit," the technique lets hackers hide malicious code inside the pixels of an

This MicroSD Card Has Entire Secure Computer Inside It





As Millions of Hackers, Spammers and Scammers are after your sensitive online data, you can't really expect your passwords to stay secure forever, even if you are using long passwords.



Most of us might be worried about losing our passwords as we keep signing up for online services.



However, Google is equally concerned about your online security and wants to help you protect your most

Thứ Bảy, 30 tháng 5, 2015

How to Fix iPhone Crash Text Message Bug





We reported you about a new bug in the core component of iOS and OS X that causes the device's Messages app to crash and iPhones to reboot if it receives a certain string of characters, Arabic characters, via text message.



Many have since fallen victims to this specially crafted sequence of Unicode bug. It is believed that when this malicious string of characters is sent in a text message,