What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
The_Hackers_News.webp 2017-03-24 03:22:47 Google Chrome to Distrust Symantec SSLs for Mis-issuing 30,000 EV Certificates (lien direct) Google announced its plans to punish Symantec by gradually distrusting its SSL certificates after the company was caught improperly issuing 30,000 Extended Validation (EV) certificates over the past few years. The Extended Validation (EV) status of all certificates issued by Symantec-owned certificate authorities will no longer be recognized by the Chrome browser for at least a year until
The_Hackers_News.webp 2017-03-24 01:22:29 US Senate Just Voted to Let ISPs Sell Your Web Browsing Data Without Permission (lien direct) The ISPs can now sell certain sensitive data like your browsing history without permission, thanks to the US Senate. The US Senate on Wednesday voted, with 50 Republicans for it and 48 Democrats against, to roll back a set of broadband privacy regulations passed by the Federal Communication Commission (FCC) last year when it was under Democratic leadership. In October, the Federal Guideline
The_Hackers_News.webp 2017-03-23 14:45:52 Wikileaks Reveals How CIA Was Hacking Your iPhones And MacBooks (lien direct) As part of its "Vault 7" series, Wikileaks - the popular whistle-blowing platform - has just released another batch of classified documents focused on exploits and hacking techniques the Central Intelligence Agency (CIA) designed to target Apple MacOS and iOS devices. Dubbed "Dark Matter," the leak uncovers macOS vulnerabilities and attack vectors developed by a special division of the CIA
The_Hackers_News.webp 2017-03-23 02:00:11 Russian Hacker Pleads Guilty to Developing and Distributing Citadel Trojan (lien direct) A Russian man accused of developing and distributing the Citadel Banking Trojan, which infected nearly 11 Million computers globally and caused over $500 Million in losses, has finally pleaded guilty to charges of computer fraud. Mark Vartanyan, 29, who was very well known as "Kolypto," pleaded guilty in an Atlanta courtroom on Monday to charges related to computer fraud and is now Guideline
The_Hackers_News.webp 2017-03-22 12:38:26 Hackers Using Fake Cellphone Towers to Spread Android Banking Trojan (lien direct) Chinese Hackers have taken Smishing attack to the next level, using rogue cell phone towers to distribute Android banking malware via spoofed SMS messages. SMiShing - phishing attacks sent via SMS - is a type of attack wherein fraudsters use number spoofing attack to send convincing bogus messages to trick mobile users into downloading a malware app onto their smartphones or lures victims
The_Hackers_News.webp 2017-03-22 03:49:20 Hackers Threaten to Remotely Wipe 300 Million iPhones Unless Apple Pays Ransom (lien direct) If you use iCloud to sync your Apple devices, your private data may be at risk of getting exposed or deleted by April 7th. It has been found that a mischievous group of hackers claiming to have access to over 300 million iCloud accounts is threatening Apple to remotely wipe data from those millions of Apple devices unless Apple pays it $75,000 in crypto-currency or $100,000 worth of iTunes
The_Hackers_News.webp 2017-03-22 01:17:07 Unpatchable \'DoubleAgent\' Attack Can Hijack All Windows Versions - Even Your Antivirus! (lien direct) A team of security researchers from Cybellum, an Israeli zero-day prevention firm, has discovered a new Windows vulnerability that could allow hackers to take full control of your computer. Dubbed DoubleAgent, the new injecting code technique works on all versions of Microsoft Windows operating systems, starting from Windows XP to the latest release of Windows 10. What's worse? DoubleAgent
The_Hackers_News.webp 2017-03-21 03:38:36 Searching for Leaked Celebrity Photos? Don\'t Blindly Click that Fappening Link! (lien direct) Are you curiously googling or searching torrents for nude photos or videos of Emma Watson, Amanda Seyfried, Rose McGowan, or any other celebrities leaked in The Fappenning 2.0? If yes, then beware, you should not click any link promising Fappenning celebrity photos. Cybercriminals often take advantage of news headlines in order to trap victims and trick them into following links that may
The_Hackers_News.webp 2017-03-20 10:48:41 Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password (lien direct) You may be aware of the fact that a local Windows user with system rights and permissions can reset the password for other users, but did you know that a local user can also hijack other users' session, including domain admin/system user, without knowing their passwords? Alexander Korznikov, an Israeli security researcher, has recently demonstrated that a local privileged user can even hijack
The_Hackers_News.webp 2017-03-20 05:19:28 Microsoft Started Blocking Windows 7/8.1 Updates For PCs Running New Processors (lien direct) You might have heard the latest news about Microsoft blocking new security patches and updates for Windows 7 and Windows 8.1 users running the latest processors from Intel, AMD, Qualcomm, and others. Don't panic, this new policy doesn't mean that all Windows 7 and 8.1 users will not be able to receive latest updates in general because Microsoft has promised to support Windows 7 until 2020,
The_Hackers_News.webp 2017-03-20 01:20:05 Disable TELNET! Cisco finds 0-Day in CIA Dump affecting over 300 Network Switch Models (lien direct) Cisco is warning of a new critical zero-day IOS / IOS XE vulnerability that affects more than 300 of its switch models. The company identified this highest level of vulnerability in its product while analyzing "Vault 7" - a roughly 8,761 documents and files leaked by Wikileaks last week, claiming to detail hacking tools and tactics of the Central Intelligence Agency (CIA). The vulnerability
The_Hackers_News.webp 2017-03-18 02:52:43 WikiLeaks Won\'t Disclose CIA Exploits To Companies Until Certain Demands Are Met (lien direct) It's been over a week since Wikileaks promised to hand over more information on hacking tools and tactics of the Central Intelligence Agency (CIA) to the affected tech companies, following a leak of a roughly 8,761 documents that Wikileaks claimed belonged to CIA hacking units. "We have decided to work with them, to give them some exclusive access to some of the technical details we have, so
The_Hackers_News.webp 2017-03-17 01:47:15 Sony Is Working On Mobile-to-Mobile Wireless Charging Technology (lien direct) So you are in a party with your friends, and your phone is running low on battery. Oops! The ideal solution is to charge your phone using a charger or a power bank, but not everyone carries power banks or chargers with them all the time, especially in a party. What if you can charge your phone wirelessly using another phone when it runs out of battery? Isn't that great? Well, thanks to Sony,
The_Hackers_News.webp 2017-03-16 08:54:33 Linux Kernel Gets Patch For Years-Old Serious Vulnerability (lien direct) Another dangerous vulnerability has been discovered in Linux kernel that dates back to 2009 and affects a large number of Linux distros, including Red Hat, Debian, Fedora, OpenSUSE, and Ubuntu. The latest Linux kernel flaw (CVE-2017-2636), which existed in the Linux kernel for the past seven years, allows a local unprivileged user to gain root privileges on affected systems or cause a denial
The_Hackers_News.webp 2017-03-16 03:10:32 Yahoo! Hack! How It Took Just One-Click to Execute Biggest Data Breach in History (lien direct) In the digital world, it just takes one click to get the keys to the kingdom. Do you know spear-phishing was the only secret weapon behind the biggest data breach in the history? It's true, as one of the Yahoo employees fell victim to a simple phishing attack and clicked one wrong link that let the hackers gain a foothold in the company's internal networks. You may be familiar with phishing Yahoo
The_Hackers_News.webp 2017-03-16 00:58:25 It\'s Fappening Again! Private Photos of Emma Watson and Others Leaked Online (lien direct) Are you clicking nude selfies? That is fine and not any criminal act, but this act can land you in trouble - here's how! Almost three years after a wave of private photographs of celebrities leaked online, "The Fappening 2.0" appears to be underway with the circulation of alleged naked pictures of female celebrities, including Emma Watson and Amanda Seyfried on Reddit and 4chan. Back in 2014,
The_Hackers_News.webp 2017-03-15 12:13:59 US Charges Two Russian Spies & Two Hackers For Hacking 500 Million Yahoo Accounts (lien direct) The 2014 Yahoo hack disclosed late last year that compromised over 500 million Yahoo user accounts was believed to be carried out by a state-sponsored hacking group. Now, two Russian intelligence officers and two criminal hackers have been charged by the US government in connection with the 2014 Yahoo hack that compromised about 500 million Yahoo user accounts, the Department of Justice Yahoo
The_Hackers_News.webp 2017-03-15 08:46:57 How One Photo Could Have Hacked Your WhatsApp and Telegram Accounts (lien direct) Next time when someone sends you a photo of a cute cat or a hot chick on WhatsApp or Telegram then be careful before you click on the image to view - it might hack your account within seconds. A new security vulnerability has recently been patched by two popular end-to-end encrypted messaging services - WhatsApp and Telegram - that could have allowed hackers to completely take over user
The_Hackers_News.webp 2017-03-15 05:16:51 Hundreds of High-Profile Twitter Accounts Hacked through 3rd-Party App (lien direct) In a large-scale Twitter hack, thousands of Twitter accounts from media outlets to celebrities, including the European Parliament, Forbes, BlockChain, Amnesty International, UNICEF, Nike Spain and numerous other individuals and organizations, were compromised early Wednesday. The compromised Twitter accounts is pushing a disturbing spam message written in Turkish comparing the Dutch to the Nazis
The_Hackers_News.webp 2017-03-15 01:27:24 Microsoft Finally Releases Security Patches For Publicly-Disclosed Critical Flaws (lien direct) After last month's postponement, Microsoft's Patch Tuesday is back with a massive release of fixes that includes patches for security vulnerabilities in Windows and associated software disclosed and exploited since January's patch release. Meanwhile, Adobe has also pushed out security updates for its products, releasing patches for at least seven security vulnerabilities in its Flash Player
The_Hackers_News.webp 2017-03-14 02:31:48 Google Kicks Out Largest Android Adware Family From The Play Store (lien direct) With the rise in the mobile market, Adware has become one of the most prevalent mobile threats in the world. Adware has traditionally been used to aggressively push ads like banners or pop-ups on mobile screens to make money. The troublesome part is that Adware is now becoming trojanized and more sophisticated, as it aggressively collects personal data from the mobile device it's installed on
The_Hackers_News.webp 2017-03-13 10:21:24 Scientists Store One Bit of Data on a Single Atom - Future of Data Storage (lien direct) Imagine a pocket-sized hard drive capable of storing the entire list of 35 Million Songs? This isn't yet practical, but IBM has just taken a big step towards improving computing technology: IBM researchers just discovered a way to store data on a single atom. Data storage is undergoing dramatic evolution, recently researchers successfully stored digital data - an entire operating system, a
The_Hackers_News.webp 2017-03-11 08:07:30 Get 8-Course Online Hacking Training Package For Just $39 (lien direct) Due to recent highly publicized hacks and high-profile data breaches, ethical hackers are in huge demand and being hired by almost every industry to help them keep their networks protected. So, it comes as no surprise that ethical hackers, penetration testers, and information security analysts are one of the most well-paid employees in the IT workforce today. There's a growing number of jobs
The_Hackers_News.webp 2017-03-11 07:07:32 Beware! Pre-Installed Android Malware Found On 36 High-end Smartphones (lien direct) Bought a brand new Android Smartphone? Do not expect it to be a clean slate. At least 36 high-end smartphone models belonging to popular manufacturing companies such as Samsung, LG, Xiaomi, Asus, Nexus, Oppo, and Lenovo, which are being distributed by two unidentified companies have been found pre-loaded with malware programs. These malware infected devices were identified after a Check
The_Hackers_News.webp 2017-03-10 08:24:45 7 Things That Happened After WikiLeaks Dumped The CIA Hacking Files (lien direct) This week WikiLeaks published "Vault 7" - a roughly 8,761 documents and files claiming to detail surveillance tools and tactics of the Central Intelligence Agency (CIA). The leak outlined a broad range of flaws in smartphones and other devices that the agency uses to intercept communications and spy on its targets, making even China and Germany worried about the CIA's ability to hack all
The_Hackers_News.webp 2017-03-10 03:29:56 How Dutch Police Decrypted BlackBerry PGP Messages For Criminal Investigation (lien direct) The Dutch police have managed to decrypt a number of PGP-encrypted messages sent by criminals using their custom security-focused PGP BlackBerry phones and identified several criminals in an ongoing investigation. PGP, or Pretty Good Privacy, an open source end-to-end encryption standard that can be used to cryptographically sign emails, files, documents, or entire disk partitions in order to
The_Hackers_News.webp 2017-03-09 04:03:10 New Apache Struts Zero-Day Vulnerability Being Exploited in the Wild (lien direct) Security researchers have discovered a Zero-Day vulnerability in the popular Apache Struts web application framework, which is being actively exploited in the wild. Apache Struts is a free, open-source, Model-View-Controller (MVC) framework for creating elegant, modern Java web applications, which supports REST, AJAX, and JSON. In a blog post published Monday, Cisco's Threat intelligence
The_Hackers_News.webp 2017-03-09 03:10:54 Secure Messaging App \'Confide\' Used by White House Staffers Found Vulnerable (lien direct) The secure messaging app used by staffers in the White House and on Capitol Hill is not as secure as the company claims. Confide, the secure messaging app reportedly employed by President Donald Trump's aides to speak to each other in secret, promises "military-grade end-to-end encryption" to its users and claims that nobody can intercept and read chats that disappear after they are read.
The_Hackers_News.webp 2017-03-08 10:38:57 10 Things You Need To Know About \'Wikileaks CIA Leak\' (lien direct) Yesterday WikiLeaks published thousands of documents revealing top CIA hacking secrets, including the agency's ability to break into iPhones, Android phones, smart TVs, and Microsoft, Mac and Linux operating systems. It dubbed the first release as Vault 7. Vault 7 is just the first part of leak series “Year Zero” that WikiLeaks will be releasing in coming days. Vault 7 is all about a covert
The_Hackers_News.webp 2017-03-08 06:15:41 Proposed Bill Would Legally Allow Cyber Crime Victims to Hack Back (lien direct) Is it wrong to hack back in order to counter hacking attack when you have become a victim? - this has been a long time debate. While many countries, including the United States, consider hacking back practices as illegal, many security firms and experts believe it as "a terrible idea" and officially "cautions" victims against it, even if they use it as a part of an active defense strategy.
The_Hackers_News.webp 2017-03-07 10:30:39 WikiLeaks Exposed CIA\'s Hacking Tools And Capabilities Details (lien direct) WikiLeaks has published a massive trove of confidential documents in what appear to be the biggest ever leak involving the US Central Intelligence Agency (CIA). WikiLeaks announced series Year Zero, under which the whistleblower organization will reveal details of the CIA's global covert hacking program. As part of Year Zero, Wikileaks published its first archive, dubbed Vault 7, which
The_Hackers_News.webp 2017-03-07 05:10:03 Secdo Automates End-to-End Incident Response with Preemptive IR (lien direct) As vast volumes of digital data are created, consumed and shared by companies, customers, employees, patients, financial institutions, governments and so many other bodies, information protection becomes a growing risk for everyone. Who wants to see personal customer purchasing data flying into the hands of strangers? What company can tolerate the pilfering of its intellectual property by
The_Hackers_News.webp 2017-03-07 00:57:58 StoneDrill Disk Wiping Malware Found Targeting European Industries (lien direct) A new disk wiping malware has been uncovered targeting a petroleum company in Europe, which is quite similar to the mysterious disk wiper malware Shamoon that wiped data from 35,000 computers at Saudi Arabia's national oil company in 2012. Disk wiping malware has the ability to cripple any organization by permanently wiping out data from all hard drive and external storage on a targeted
The_Hackers_News.webp 2017-03-06 09:39:14 Database of 1.4 Billion Records leaked from World\'s Biggest Spam Networks (lien direct) A database of 1.4 billion email addresses combined with real names, IP addresses, and often physical address has been exposed in what appears to be one the largest data breach of this year. What's worrisome? There are high chances that you, or at least someone you know, is affected by this latest data breach. Security researcher Chris Vickery of MacKeeper and Steve Ragan of
The_Hackers_News.webp 2017-03-06 08:50:33 Hacker Selling Over 1 Million Decrypted Gmail and Yahoo Passwords On Dark Web (lien direct) Hardly a day goes without headlines about any significant data breach. In past year, billions of accounts from popular sites and services, including LinkedIn, Tumblr, MySpace, Last.FM, Yahoo!, VK.com were exposed on the Internet. Now, according to the recent news, login credentials and other personal data linked to more than one Million Yahoo and Gmail accounts are reportedly being offered Yahoo
The_Hackers_News.webp 2017-03-06 02:03:07 New Fileless Malware Uses DNS Queries To Receive PowerShell Commands (lien direct) It is no secret that cybercriminals are becoming dramatically more adept, innovative, and stealthy with each passing day. While new forms of cybercrime are on the rise, traditional activities seem to be shifting towards more clandestine techniques that involve the exploitation of standard system tools and protocols, which are not always monitored. The latest example of such attack is
The_Hackers_News.webp 2017-03-04 09:44:14 Scientists Store an Operating System, a Movie and a Computer Virus on DNA (lien direct) Do you know - 1 Gram of DNA Can Store 1,000,000,000 Terabyte of Data for 1000+ Years. Just last year, Microsoft purchased 10 Million strands of synthetic DNA from San Francisco DNA synthesis startup called Twist Bioscience and collaborated with researchers from the University of Washington to focus on using DNA as a data storage medium. However, in the latest experiments, a pair of researchers
The_Hackers_News.webp 2017-03-03 10:19:28 Google Increases Bug Bounty Payouts by 50% and Microsoft Just Doubles It! (lien direct) Well, there's some good news for hackers and bug bounty hunters! Both tech giants Google and Microsoft have raised the value of the payouts they offer security researchers, white hat hackers and bug hunters who find high severity flaws in their products. While Microsoft has just doubled its top reward from $15,000 to $30,000, Google has raised its high reward from $20,000 to $31,337, which
The_Hackers_News.webp 2017-03-02 23:37:25 How A Simple Command Typo Took Down Amazon S3 and Big Chunk of the Internet (lien direct) The major internet outage across the United States earlier this week was not due to any virus or malware or state-sponsored cyber attack, rather it was the result of a simple TYPO. Amazon on Thursday admitted that an incorrectly typed command during a routine debugging of the company's billing system caused the 5-hour-long outage of some Amazon Web Services (AWS) servers on Tuesday. The
The_Hackers_News.webp 2017-03-02 11:52:04 Trump\'s New FCC Chairman Allows ISPs Sell Your Private Data Without Your Consent (lien direct) Bad News for privacy concerned people! It will be once again easier for Internet Service Providers (ISPs) to sell your personal data for marketing or advertisement purposes without taking your permission. Last October, the United States Federal Communications Commission (FCC) passed a set of privacy rules on ISPs that restrict them from sharing your online data with third parties without
The_Hackers_News.webp 2017-03-02 03:48:43 Google Employees Help Thousands Of Open Source Projects Patch Critical \'Mad Gadget Bug\' (lien direct) Last year Google employees took an initiative to help thousands of Open Source Projects patch a critical remote code execution vulnerability in a widely used Apache Commons Collections (ACC) library. Dubbed Operation Rosehub, the initiative was volunteered by some 50 Google employees, who utilized 20 percent of their work time to patch thousands of open source projects on Github, those were
The_Hackers_News.webp 2017-03-02 00:17:31 Yahoo Reveals 32 Million Accounts Were Hacked Using \'Cookie Forging Attack\' (lien direct) Yahoo has just revealed that around 32 million user accounts were accessed by hackers in the last two years using a sophisticated cookie forging attack without any password. These compromised accounts are in addition to the Yahoo accounts affected by the two massive data breaches that the company disclosed in last few months. The former tech giant said that in a regulatory filing Wednesday Yahoo
The_Hackers_News.webp 2017-03-01 05:10:59 Dridex Banking Trojan Gains \'AtomBombing\' Code Injection Ability to Evade Detection (lien direct) Security researchers have discovered a new variant of Dridex – one of the most nefarious banking Trojans actively targeting financial sector – with a new, sophisticated code injection technique and evasive capabilities called "AtomBombing." On Tuesday, researchers with IBM X-Force disclosed new research, exposing the new Dridex version 4, which is the latest version of the infamous financial
The_Hackers_News.webp 2017-03-01 03:50:07 9 Popular Password Manager Apps Found Leaking Your Secrets (lien direct) Is anything safe? It's 2017, and the likely answer is NO. Making sure your passwords are secure is one of the first line of defense – for your computer, email, and information – against hacking attempts, and Password Managers are the one recommended by many security experts to keep all your passwords secure in one place. Password Managers are software that creates complex passwords, stores
The_Hackers_News.webp 2017-03-01 03:08:17 THN Deal: Complete Linux Certification Training (Save 97%) (lien direct) If you are also searching for the answers to what skills are needed for a job in cyber security, you should know that this varies widely based upon the responsibilities of a particular role, the type of company you want to work with, and especially on it's IT architect. However, Linux is the most required skills in information technology and cyber security, as Linux are everywhere! Whether
The_Hackers_News.webp 2017-02-28 06:13:19 70+ Cyber Security Micro-Courses and Certifications To Boost Your IT Career (lien direct) With the evolving hacking events around us, cyber-security skills are in high demand across all organizations and industries, because a shortage of skilled cyber security practitioners could leave an organization vulnerable to cyber attacks. But knowledge alone is not sufficient, 'certification as eligibility' also matters, which shows employers that you are serious about your career and
The_Hackers_News.webp 2017-02-28 06:06:04 Critical Flaw in ESET Antivirus Exposes Mac Users to Remote Hacking (lien direct) What could be more exciting for hackers than exploiting a vulnerability in a widely used software without having to struggle too much? One such easy-to-exploit, but critical vulnerability has been discovered in ESET's antivirus software that could allow any unauthenticated attackers to remotely execute arbitrary code with root privileges on a Mac system. The critical security flaw, tracked
The_Hackers_News.webp 2017-02-28 00:59:10 Internet-Connected Teddy Bear Exposed Over 2 Million Voice Messages; Data Held for Ransom (lien direct) Every parent should think twice before handing out Internet-connected toys or smart toys to their children, as these creepy toys pose a different sort of danger: privacy and data security risks for kids who play with them. This same incident was happened over a year ago when Hong Kong toymaker VTech was hacked, which exposed personal details, including snaps of parents and children and chat
The_Hackers_News.webp 2017-02-25 04:22:04 Google Does It Again: Discloses Unpatched Microsoft Edge and IE Vulnerability (lien direct) This month has yet been kind of interesting for cyber security researchers, with Google successfully cracked SHA1 and the discovery of Cloudbleed bug in Cloudflare that caused the leakage of sensitive information across sites hosted behind Cloudflare. Besides this, Google last week disclosed an unpatched vulnerability in Windows Graphics Device Interface (GDI) library, which affects
The_Hackers_News.webp 2017-02-24 06:27:08 Hacker Shows How Easy It Is To Hack People While Walking Around in Public (lien direct) Wi-Fi enabled devices - widely known as the Internet of Things (IoT) - are populating offices and homes in greater and greater numbers. From smartphones to connected printers and even coffee makers, most of these IoT devices have good intentions and can connect to your company's network without a problem. However, as the Internet of Things (IoT) devices are growing at a great pace, they
Last update at: 2024-08-01 16:18:29
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter