What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Kaspersky.webp 2018-09-14 13:26:02 Magecart Threat Group Racks Up More Hack Victims (lien direct) The threat group has racked up a list of victims including Feedify, Groopdealz and British Airways. Hack Threat
CSO.webp 2018-09-13 09:15:00 IDG Contributor Network: Can you hack me now? (lien direct) “Can you hear me now?”With well over 200,000 cell towers up and running in the United States (and counting), the question posed by Verizon in a wildly successful 2011 ad campaign, has been answered in the affirmative for the overwhelming majority of the country. But in the wake of a new, super connected wireless world, some other questions have emerged:How secure is all that wireless coverage?What types of attack loopholes, if any, exist?Are the wireless carriers favoring supreme accessibility too greatly over commonsense security, which is essentially the same oversight made by the Internet's founding fathers many years ago? That oversight unknowingly paved the way for the current state of today's networking world, which is wrought with data breaches, device corruption, and system downtime… Let's not make that same mistake again. Hack
The_Hackers_News.webp 2018-09-12 06:48:00 Tesla Model S Hack Could Let Thieves Clone Key Fobs to Steal Cars (lien direct) Despite having proper security measures in place to protect the driving systems of its cars against cyber attacks, a team of security researchers discovered a way to remotely hack a Tesla Model S luxury sedans in less than two seconds. Yes, you heard that right. A team of researchers from the Computer Security and Industrial Cryptography (COSIC) group of the Department of Electrical Hack Tesla
The_Hackers_News.webp 2018-09-12 04:50:03 Beware! Unpatched Safari Browser Hack Lets Attackers Spoof URLs (lien direct) A security researcher has discovered a serious vulnerability that could allow attackers to spoof website addresses in the Microsoft Edge web browser for Windows and Apple Safari for iOS. While Microsoft fixed the address bar URL spoofing vulnerability last month as part of its monthly security updates, Safari is still unpatched, potentially leaving Apple users vulnerable to phishing attacks. Hack Vulnerability
CSO.webp 2018-09-11 07:32:00 (Déjà vu) British Airways hack was by same group that compromised Ticketmaster (lien direct) The British Airways hack boiled down to attackers using 22 lines of code for digital payment card skimming on the baggage claim page and resulted in 380,000 customers having their personal and payment information stolen between Aug. 21 and Sept. 5, 2018.RiskIQ head researcher Yonathan Klijnsma attributed the hack to the cybercriminal group dubbed Magecart – the same group of attackers responsible for the Ticketmaster UK breach.While apologizing for the customer data theft, British Airways' boss Alex Cruz told the BBC that hackers pulled off a “sophisticated, malicious criminal attack.” Despite technical details being all but nonexistent in British Airways' breach notification, experts say attackers used a “simple but highly targeted approach.” Hack
CSO.webp 2018-09-11 07:32:00 (Déjà vu) British Airways hack used digital skimmers by group that compromised Ticketmaster (lien direct) The British Airways hack boiled down to attackers using 22 lines of code for digital payment card skimming on the baggage claim page and resulted in 380,000 customers having their personal and payment information stolen between August 21 and September 5.RiskIQ head researcher Yonathan Klijnsma attributed the hack to the cybercriminal group dubbed Magecart – the same group of attackers responsible for the Ticketmaster UK breach.While apologizing for the customer data theft, British Airways' boss Alex Cruz told the BBC that hackers pulled off a “sophisticated, malicious criminal attack.” Despite technical details being all but nonexistent in British Airways' breach notification, experts say attackers used a “simple but highly targeted approach.” Hack
grahamcluley.webp 2018-09-10 20:11:03 Law firm launches £500 million group action over British Airways hack (lien direct) Law firm launches £500 million group action over British Airways hackWithin hours of British Airways admitting that it had suffered a serious security breach, with hackers accessing customer data and the full details of 380,000 payment cards, a British law firm announced that it was launching a £500m group action against the airline. Hack
ErrataRob.webp 2018-09-10 17:33:17 California\'s bad IoT law (lien direct) California has passed an IoT security bill, awaiting the government's signature/veto. It's a typically bad bill based on a superficial understanding of cybersecurity/hacking that will do little improve security, while doing a lot to impose costs and harm innovation.It's based on the misconception of adding security features. It's like dieting, where people insist you should eat more kale, which does little to address the problem you are pigging out on potato chips. The key to dieting is not eating more but eating less. The same is true of cybersecurity, where the point is not to add “security features” but to remove “insecure features”. For IoT devices, that means removing listening ports and cross-site/injection issues in web management. Adding features is typical “magic pill” or “silver bullet” thinking that we spend much of our time in infosec fighting against.We don't want arbitrary features like firewall and anti-virus added to these products. It'll just increase the attack surface making things worse. The one possible exception to this is “patchability”: some IoT devices can't be patched, and that is a problem. But even here, it's complicated. Even if IoT devices are patchable in theory there is no guarantee vendors will supply such patches, or worse, that users will apply them. Users overwhelmingly forget about devices once they are installed. These devices aren't like phones/laptops which notify users about patching.You might think a good solution to this is automated patching, but only if you ignore history. Many rate “NotPetya” as the worst, most costly, cyberattack ever. That was launched by subverting an automated patch. Most IoT devices exist behind firewalls, and are thus very difficult to hack. Automated patching gets beyond firewalls; it makes it much more likely mass infections will result from hackers targeting the vendor. The Mirai worm infected fewer than 200,000 devices. A hack of a tiny IoT vendor can gain control of more devices than that in one fell swoop.The bill does target one insecure feature that should be removed: hardcoded passwords. But they get the language wrong. A device doesn't have a single password, but many things that may or may not be called passwords. A typical IoT device has one system for creating accounts on the web management interface, a wholly separate authentication system for services like Telnet (based on /etc/passwd), and yet a wholly separate system for things like debugging interfaces. Just because a device does the proscribed thing of using a unique or user generated password in the user interface doesn't mean it doesn't also have a bug in Telnet.That was the problem with devices infected by Mirai. The description that these were hardcoded passwords is only a superficial understanding of the problem. The real problem was that there were different authentication systems in the web interface and in other services like Telnet. Most of the devices vulnerable to Mirai did the right thing on the web interfaces (meeting the language of this law) requiring the user to create new passwords before operating. They just did the wrong thing elsewhere.People aren't really paying attention to what happened with Mirai. They look at the 20 billion new IoT devices that are going to be connected to the Internet by 2020 and believe Mirai is just the tip of the iceberg. But it isn't. The IPv4 Internet has only 4 billion addresses, which are pretty much already used up. This means those 20 billion won't be exposed to the public Internet like Mirai devices, but hidden behind firewalls that translate addresses. Thus, rather than Mirai presaging the future, it represents the last gasp of the past that is unlikely to come again.This law is backwards looking rather than forward looking. Forward looking, by far the most important t Hack Threat Patching Guideline NotPetya Tesla
SecurityAffairs.webp 2018-09-10 14:22:02 GAO Report shed the lights on the failures behind the Equifax hack (lien direct) A new report from the U.S. Government Accountability Office (GAO) provides detailed information of the Equifax hack. The Equifax hack occurred in May 2017 when attackers exploited the CVE-2017-5638 Apache Struts vulnerability in the Jakarta Multipart parser upload function. The flaw allowed the attacker to make a maliciously crafted request to an Apache web server and gain access […] Hack Equifax
DarkReading.webp 2018-09-10 11:30:00 Russian National Extradited for 2014 JP Morgan Hack (lien direct) Andrei Tyurin was arrested for his involvement in a hacking campaign targeting US financial institutions, financial news publishers, brokerage firm, and other companies. Hack
itsecurityguru.webp 2018-09-10 11:22:00 A year after the Equifax hack exposed 145 million Americans\' personal information, the Trump administration hasn\'t announced any punishments (lien direct) A new report by congressional investigators details how hackers broke into Equifax last year in a breach that exposed the financial information of more than 145 million Americans. View full story ORIGINAL SOURCE: Business Insider Hack Equifax
BBC.webp 2018-09-10 11:21:03 Russian man charged over \'massive\' US hack attacks (lien direct) The Russian man was extradited from Georgia to face accusations of aiding attacks on US banks. Hack
itsecurityguru.webp 2018-09-10 11:13:04 Russian Charged in JPMorgan Chase Hack Extradited to US (lien direct) A Russian national who’s been accused of hacking into JPMorgan Chase’s network in 2014 and stealing details for more than 83 million customers has been extradited to the United States to face hacking, wire fraud and other charges. View full story ORIGINAL SOURCE: Data Breach Today Data Breach Hack
Blog.webp 2018-09-08 17:53:00 (Déjà vu) Hack the Box: Poison Walkthrough (lien direct) Hello everyone and welcome to yet another CTF challenge from hack the box, called 'Poison,' which is available online for those who want to increase their skill in penetration testing and black box testing. Poison is a retired vulnerable lab presented by Hack the Box for making online penetration testing practice suitable to your experience level;... Continue reading → Hack
TechWorm.webp 2018-09-07 18:26:02 North Korean hacker charged for WannaCry and Sony cyberattacks (lien direct) U.S. charges North Korean hacker for WannaCry, Sony cyber attacks The U.S. government on Thursday charged and sanctioned a North Korean hacker for the 2014 Sony hack and the 2017 WannaCry global ransomware cyberattack, U.S. officials said. The accused, Park Jin Hyok worked as part of a team of hackers, also known as the Lazarus […] Ransomware Hack Wannacry APT 38
ZDNet.webp 2018-09-07 18:17:01 US Government releases post-mortem report on Equifax hack (lien direct) Template has following fields pre-populated: Author, Buying Cycle, Blog, and Primary topic. Please adjust/add to secondary topics as appropriate for specific articles. Hack Equifax
Blog.webp 2018-09-07 17:59:05 MY TAKE: Can Hollywood\'s highly effective \'source-code\' security tools help make IoT safe? (lien direct) Over the past couple of decades, some amazing advances in locking down software code have quietly unfolded in, of all places, Hollywood. Related: HBO hack spurs cyber insurance market Makes sense, though. Digital media and entertainment giants like Netflix, Amazon, Hulu, HBO, ESPN, Sony, and Disney are obsessive about protecting their turf. These Tinsel Town […] Hack
itsecurityguru.webp 2018-09-07 10:58:05 North Korean hacker charged with cyber attack on NHS (lien direct) The US justice department has charged an alleged North Korean spy for helping to perpetrate cyber-attacks against the National Health Service that saw operations cancelled, ambulances diverted and patient records made unavailable following a worldwide hack in 2017 which affected computers in more than 150 countries. View Full Story ORIGINAL SOURCE: The Guardian Hack
SecurityAffairs.webp 2018-09-07 09:22:01 US charges North Korea agent over Sony Pictures hack and WannaCry (lien direct) The U.S. Department of Justice charged a North Korea agent over WannaCry and 2014 Sony Pictures Entertainment Hack. The U.S. Department of Justice announces charges against a North Korean government spy that was involved in the massive WannaCry ransomware attack and the 2014 Sony Pictures Entertainment hack. “the Justice Department charged on Thursday in a 174-page criminal complaint that detailed how […] Ransomware Hack Wannacry
Blog.webp 2018-09-07 06:05:02 (Déjà vu) Hack the /dev/random: K2 VM (boot2root Challenge) (lien direct) Hello friends! Today we are going to take another CTF challenge known as /dev/random: k2. The credit for making this vm machine goes to “Sagi-” and it is another boot2root challenge in which our goal is to get root to complete the challenge. You can download this VM here. We are given the credentials to... Continue reading → Hack
Blog.webp 2018-09-06 21:04:03 Opinion: The Corporate Lessons of Election Hacks (lien direct) Recent demonstrations of election hacks are about more than ballots. They also contain important lessons for enterprises,  Security Ledger Editor in Chief Paul Roberts argues in this opinion piece. (Note: this post first appeared on Hitachi Security Systems web site.) Did an 11 year old hack a state election website? Are voting machines easy prey...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/568344144/0/thesecurityledger -->» Hack
ZDNet.webp 2018-09-06 15:35:00 DOJ to charge North Korean officer for Sony hack and WannaCry ransomware (lien direct) After charging Chinese, Iranian, and Russian cyberspies, US preparies indictment against North Korean officer. Ransomware Hack Wannacry
SecurityWeek.webp 2018-09-06 14:28:05 Preventing the Other Kind of Hack Back (lien direct) There has been endless discussion among security professionals about the ethics, propriety, legality, and effectiveness of corporations “hacking back” against attackers. On the other hand, there is no hesitation on the part of attackers to hack back against threat intelligence researchers who are investigating them. Hack Threat
CSO.webp 2018-09-06 11:50:00 IDG Contributor Network: Why data loss prevention is a throwback technology (lien direct) Black Hat 2018 may be behind us, but the trends, conversations and news coming out of the show are still top of mind. The conference was buzzing with cutting-edge topics, from election hacking to “whack-a-mole” security (as dubbed by Parisa Tabriz, director of engineering at Google).For me, Black Hat is a time to connect with customers, prospects, partners, colleagues and friends to discuss the latest in insider threat management. Typically, during conference season, I come away with a few key takeaways (and free swag) that inform decisions I make for the strategy and management of the organization I run. This year proved to be no different.Self-driving cars, election hacking and more Black Hat is one of the top conferences for security professionals to learn about the latest technologies and vulnerabilities to be aware of in the coming year. From the surprising safety of self-driving cars, to new ways to hack into what many thought were secure systems, Black Hat is the spot for the latest innovations, hacking methods and more. Hack Threat
The_Hackers_News.webp 2018-09-06 10:31:03 U.S. to Charge North Korean Spy Over WannaCry and Sony Pictures Hack (lien direct) The U.S. Department of Justice is preparing to announce criminal charges against a North Korean government spy in connection with the 2017 global WannaCry ransomware attack and the 2014 Sony Pictures Entertainment hack. According to multiple government officials cited by the NY Times who are familiar with the indictment, the charges would be brought against Park Jin Hyok, who works for North Ransomware Hack Wannacry
no_ico.webp 2018-09-05 14:44:05 New Banking Trojan CamuBot Attempts To Hack Biometric Authentication (lien direct) IBM X-Force researchers have warned of a new malicious financial malware currently targeting Brazilian banks. The banking trojan, dubbed CamuBot, can in some cases hijack one-time passwords used for biometric authentication. Please find a comment below in response to this from OneSpan. Will LaSala, Director Security Solutions, Security Evangelist at OneSpan: “CamuBot is a unique and sophisticated overlay attack … The ISBuzz Post: This Post New Banking Trojan CamuBot Attempts To Hack Biometric Authentication Hack
Blog.webp 2018-09-04 15:11:02 (Déjà vu) Hack the Box: Stratosphere Walkthrough (lien direct) Hello friends!! Today we are going to solve another CTF challenge “Stratosphere” which is lab presented by Hack the Box and is available online for those who want to increase their skill in penetration testing and black box testing. Stratosphereis retired vulnerable lab presented by Hack the Box for making online penetration practices according to... Continue reading → Hack
SecurityWeek.webp 2018-09-04 12:06:00 Lawsuit Lays Bare Israel-made Hack Tools in Mideast, Mexico (lien direct) PARIS (AP) - One day late last year, Qatari newspaper editor Abdullah Al-Athbah came home, removed the SIM card from his iPhone 7 and smashed it to pieces with a hammer. Hack
ZDNet.webp 2018-09-04 00:29:02 Bitcoin Gold delisted from major cryptocurrency exchange after refusing to pay hack damages (lien direct) Cryptocurrency exchange Bittrex removes Bitcoin Gold trading options after BTG team refuses to pay $256,000 as reparations for May 2018 cyber-attacks Hack
Blog.webp 2018-09-02 14:50:02 NEW TECH: WhiteSource leverages automation to mitigate lurking open-source vulnerabilities (lien direct) Just like the best sourdough bread derives from a “mother” yeast that gets divided, passed around, and used over and over, open-source software applications get fashioned from a  “mother” library of code created and passed around by developers. Related: Equifax hack highlights open source attack vectors In today's world, quick innovations are a necessity, and software […] Hack Equifax
SecurityAffairs.webp 2018-09-02 13:33:04 John McAfee\'s Bitfi cryptocurrency wallet was hacked by a security duo (lien direct) A security duo composed of Saleem Rashid and Ryan Castellucci demonstrated that it is possible to hack the John McAfee's Bitfi cryptocurrency wallet. Today let’s discuss John McAfee's cryptocurrency wallet, the Bitfi wallet, defined by the popular cyber security expert “unhackable.” Unfortunately, nothing is unhackable, and the Bitfi wallet was already hacked two times. The Bitfi wallet is an Android-powered hardware device for […] Hack
CSO.webp 2018-09-02 09:00:00 (Déjà vu) Bitfi removes unhackable claim from crypto wallet (lien direct) I'm so surprised the unhackable Bitfi wallet was hacked - said no one ever. While this was not even the first time the $120 hardware wallet was hacked, it was enough for Bitfi to strike the “unhackable” claim from its website.Bitfi wallet backer and big mouthpiece John McAfee, however, still claims the cryptocurrency wallet is unhackable and went so far as to offer $20 million to one particular hacker if he can hack McAfee's wallet. BitFi offered $100,000 to anyone who could take the coins from its factory wallet. Hackers complained it was too little, and why should they have to buy the wallet. It increased to $250,000. No takers. I'm now offering $20 mil to one fraudulent hacker - @cybergibbons He refused. Hack
CSO.webp 2018-09-02 09:00:00 (Déjà vu) Bitfi removed unhackable claim yet McAfee offers hacker $20 million for wallet hack (lien direct) I'm so surprised the unhackable Bitfi wallet was hacked…said no one ever; while it was not even the first time the $120 hardware wallet was hacked, it was enough for Bitfi to strike the “unhackable” claim from its website. Bitfi wallet backer and big mouthpiece John McAfee, however, still claims the cryptocurrency wallet is unhackable and went so far as to offer $20 million to one hacker if he could hack McAfee's wallet. BitFi offered $100,000 to anyone who could take the coins from its factory wallet. Hackers complained it was too little, and why should they have to buy the wallet. It increased to $250,000. No takers. I'm now offering $20 mil to one fraudulent hacker - @cybergibbons He refused. Hack
AlienVault.webp 2018-08-30 13:00:00 Ethical Hacking: An Update (lien direct) How has the world of hacking changed over the past decade? More and more companies are hiring ethical hackers to hack systems and show vulnerabilities. Penetration testers try to access systems by any means possible, including through social engineering. Let’s look at what ethical hacking is, how it’s done, and how it will change in the future. Source Ethical Hacking Commonly known as “white hat” hackers, as opposed to black hat, ethical hackers are generally employed by a company to hack into the company’s systems and show them vulnerabilities. Some will help patch up the holes, while others simply expose what’s wrong and leave it to the company’s IT team. The word “hacker” carries a certain connotation and is usually negative. However, it’s best to think of them in “Old West” terms. The sheriff in the old west always wore a white hat and was the good guy. The outlaw wore a black hat. Hence, the terms white hat and black hat hacker; one aims to help while the other is malicious. In order to combat black hat hackers, white hat hackers have to think like black hat hackers. Some may have even started as black hat hackers, gained skills, and decided to use those skills for good. Unlike in previous years, where dealing with ethical hackers could be a grey area, white hat hackers are often certified as an ethical hacker. They can prove they are using their skills to benefit a company rather than trying to break into the company’s system and actually steal information. Penetration Testers Coincidentally, penetration testers do steal information. They can also steal physical computers, hard copies of information, and more. Pen testers are sometimes not limited to just computer systems. Instead, much like the mindset of a hacker mentioned above, they do whatever they can to access a system, such as using social engineering or email spoofing. They are often part of the “red team,” hired to find holes in security. Imagine, for instance, someone calling IT and claiming they forgot their password. The password is reset, and the employee leaves happy. The problem is that it wasn’t actually the employee but someone posing as them who now has access to the system. A member of the red team might be able to swipe a pass card, enabling them access to a server room. From there, they can directly connect to the server, accessing information. The sticky note Jan from accounting keeps on her computer monitor to remind her of her logins? Gone the next morning. Everyone from Hack Guideline
BBC.webp 2018-08-30 12:56:02 New York renamed \'Jewtropolis\' in map hack (lien direct) Snapchat's mapping software appears to have been hacked in what it calls an act of vandalism. Hack
BBC.webp 2018-08-30 12:54:00 Celebgate hacker jailed over Jennifer Lawrence hack (lien direct) Hollywood star Jennifer Lawrence was targeted in the hack, for which three others have already been jailed. Hack
Blog.webp 2018-08-28 03:06:03 Podcast Episode 110: Why Patching Struts isn\'t Enough and Hacking Electricity Demand with IoT? (lien direct) In this week's episode (#110): the second major flaw in Apache Struts 2 in as many years and has put the information security community on alert. But is this vulnerability as serious as the last, which resulted in the hack of the firm Equifax? We talk with an expert from the firm Synopsys.  And: we've heard a lot about the risk of cyber...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/566525656/0/thesecurityledger -->» Hack Vulnerability Patching Equifax
no_ico.webp 2018-08-27 23:30:04 Animoto Hack Exposes Personal Info (lien direct) Tech Crunch broke the news yesterday that Animoto, a cloud-based video maker service for social media sites, suffered a data breach in which hackers gained access to names, dates of birth, user email addresses, scrambled passwords and geolocations. Zohar Alon, CEO and Co-founder at Dome9: “Breaches in cloud environments are often the result of misconfigurations and poor … The ISBuzz Post: This Post Animoto Hack Exposes Personal Info Hack
Blog.webp 2018-08-26 17:22:04 (Déjà vu) Hack the Box: Celestial Walkthrough (lien direct) Hello friends!! Today we are going to solve another CTF challenge “Celestial” which is lab presented by Hack the Box and is available online for those who want to increase their skill in penetration testing and black box testing. Celestial is retired vulnerable lab presented by Hack the Box for making online penetration practices according to your... Continue reading → Hack
Blog.webp 2018-08-26 13:58:05 Hack the Android4: Walkthrough (CTF Challenge) (lien direct) Hello everyone and welcome to yet another CTF challenge walkthrough. This time we'll be putting our hands on Android4 which is made by Touhid Shaikh. You can find the link to download this vulnerable VM here (https://www.vulnhub.com/entry/android4-1,233/). The level of this vulnerable vm, that I would rate, is beginner. Steps involved: Port scanning and IP... Continue reading → Hack
SecurityAffairs.webp 2018-08-26 07:14:04 USBHarpoon a look-like charging cable that can hack into your computer (lien direct) A team of security experts has devised a rogue USB charging cable named USBHarpoon that can be used to compromise a computer in just a few seconds. The team was composed of Olaf Tan and Dennis Goh of RFID Research Group, Vincent Yiu of SYON Security, and the popular Kevin Mitnick. The USBHarpoon takes inspiration on the BadUSB project built by […] Hack
Blog.webp 2018-08-25 05:22:05 (Déjà vu) Hack the Box: Minion Walkthrough (lien direct) Hello friends!! Today we are going to solve another CTF challenge “Minion” which is available online for those who want to increase their skill in penetration testing and black box testing. Minion is retired vulnerable lab presented by Hack the Box for making online penetration practices according to your experience level; they have the collection of vulnerable... Continue reading → Hack
securityintelligence.webp 2018-08-24 11:45:03 Security Gamification Engineer Richard Moore Proves That Anyone Can Be a Hacker (lien direct) >Security gamification engineer Richard Moore designs cyberthreat scenarios to unlock the competitive spirit of cybersecurity professionals and demonstrate how easy it is for anyone to hack a system. Hack ★★★
DarkReading.webp 2018-08-24 11:00:00 T-Mobile Hit With Customer Information Hack (lien direct) Approximately 2 million users said to be affected. Hack
grahamcluley.webp 2018-08-23 11:08:02 Smashing Security #092: Hacky sack hack hack (lien direct) Smashing Security #092: Hacky sack hack hackIs your used car still connected to its old owner? Just how did Apple manage to identify the teenager hacker who stole 90GB of the firm's files? And why on earth would a firm of lawyers start producing pornographic videos? You'll be surprised by the answers! All this and much much more is discussed in the latest edition of the award-winning “Smashing Security” podcast hosted by computer security veterans Graham Cluley and Carole Theriault, joined this week by Paul Ducklin. Hack
zataz.webp 2018-08-18 00:40:02 hacky hack hack : Un ado de 16 ans pirate Apple (lien direct) hacky hack hack ! Apple confirme le passage d’un pirate informatique dans ses secrets. Il n’aurait cependant pas pu copier des données clients. Hacky hack hack – Aucune données clients n’ont été compromises. C’est ce qu’affirme Apple, ce vendredi, à la suite de la... Cet article hacky hack hack : Un ado de 16 ans pirate Apple est apparu en premier sur ZATAZ. Hack
no_ico.webp 2018-08-17 14:32:03 Instagram Hack (lien direct) Instagram has been hacked and users say their emails have been changed to .ru domains. Hackers were able to get in and change user's information such as usernames, profiles photos, passwords, and linked Facebook accounts among other things. Instagram has given instructions to users on how to restore their affected accounts and revoke access to … The ISBuzz Post: This Post Instagram Hack Hack
grahamcluley.webp 2018-08-17 13:06:01 SuperProf private tutor site massively fails password test, makes accounts super easy to hack (lien direct) Dunce thumbSuperprof, which claims to be “the world's largest tutoring network”, has made its newest members' passwords utterly predictable… leaving them wide open to hackers. Hack ★★★★
itsecurityguru.webp 2018-08-17 10:30:05 Apple files stored by teen in \'hacky hack hack\' folder (lien direct) A teenage boy from Australia has pleaded guilty to hacking into Apple’s network and downloading internal files, according to reports. The 16-year-old accessed 90 gigabytes worth of files, breaking into the system many times over the course of a year from his suburban home in Melbourne, reports The Age newspaper. View full story ORIGINAL SOURCE: BBC Hack Guideline
SecurityWeek.webp 2018-08-17 09:51:00 \'Hacky Hack Hack\': Australia Teen Breaches Apple\'s Secure Network (lien direct) A schoolboy who "dreamed" of working for Apple hacked the firm's computer systems, Australian media has reported, although the tech giant said Friday no customer data was compromised. Hack
Last update at: 2024-07-02 15:08:50
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter