What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
SecurityAffairs.webp 2020-02-17 11:15:57 IDF soldiers tricked into installing malicious apps by Hamas operatives posing as attractive women (lien direct) Israeli Force (IDF) announced it has thwarted an attempt by the Hamas militant group to hack soldiers' phones by posing as attractive women on social media. Israeli Defence Force (IDF) announced it has thwarted an attempt by the Hamas militant group to hack soldiers' mobile devices by posing as attractive women on social media and […] Hack
SecurityAffairs.webp 2020-02-17 06:07:10 (Déjà vu) Fox Kitten Campaign – Iranian hackers exploit 1-day VPN flaws in attacks (lien direct) Iranian hackers have been hacking VPN servers to plant backdoors in companies around the world Iran-linked attackers targeted Pulse Secure, Fortinet, Palo Alto Networks, and Citrix VPNs to hack into large companies as part of the Fox Kitten Campaign. During the last quarter of 2019, experts from security firm ClearSky uncovered a hacking campaign tracked […] Hack
Blog.webp 2020-02-17 06:06:58 Hack the Box: Writeup Walkthrough (lien direct) Today, we’re sharing another Hack Challenge Walkthrough box: Writeup and the machine is part of the retired lab, so you can connect to the machine using your HTB VPN and then start to solve the CTF. The level of the Lab is set : Beginner to intermediate. Task: Capture the user.txt and root.txt flags. Pentesting... Continue reading → Hack
ZDNet.webp 2020-02-16 20:53:00 Iranian hackers have been hacking VPN servers to plant backdoors in companies around the world (lien direct) Iranian hackers have targeted Pulse Secure, Fortinet, Palo Alto Networks, and Citrix VPNs to hack into large companies. Hack
ZDNet.webp 2020-02-16 01:39:27 IOTA cryptocurrency shuts down entire network after wallet hack (lien direct) Hackers exploit vulnerability in official IOTA wallet to steal millions Hack Vulnerability
MalwarebytesLabs.webp 2020-02-14 17:32:10 Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack (lien direct) We take a look at some of the most famous (or infamous) hacking scenes from TV and movies and the cybersecurity lessons, if any, we can learn from them. Categories: Awareness Tags: (Read more...) Hack Guideline ★★
SecurityAffairs.webp 2020-02-13 19:49:11 Three Italian universities hacked by LulzSec_ITA collective (lien direct) The popular Italian hacktivist collective LulzSec ITA claimed via Twitter to have hacked three Italian universities. The popular Italian hacktivist collective LulzSec ITA has announced via Twitter the hack of three Italian universities, highlighting the importance of the cybersecurity for our society. The hacktivists claim that once hacked the universities did not disclose the data […] Hack
TechWorm.webp 2020-02-13 15:53:22 Emotet Malware Can Now Spread Through Wi-Fi Networks (lien direct) Security researchers from Binary Defenses have recently discovered a new variant of the Emotet Trojan that can hack Wi-Fi networks that are within range of an infected system. Emotet, a kind of malware originally designed as a banking Trojan, can steal data such as user credentials stored on the browser, install other types of malware […] Malware Hack
grahamcluley.webp 2020-02-11 15:52:00 China denies it was behind the Equifax hack, as four men charged for data breach (lien direct) China has denied that it was behind the hack of Equifax in 2017, which saw the personal data of hundreds of millions of individuals stolen – including the names, birth dates and social security numbers for nearly half of all American citizens. Read more in my article on the Hot for Security blog. Data Breach Hack Equifax
01net.webp 2020-02-11 11:24:16 Les Etats-Unis inculpent des agents chinois pour l\'un des plus gros piratages de l\'histoire (lien direct) C'était en 2017 : une mystérieuse équipe de pirates mettait la main sur les données personnelles de 145 millions d'américains, à la suite du hack de l'agence de crédit Equifax. Les Etats-Unis viennent d'inculper quatre agents chinois dans cette affaire qui pourrait bien compliquer encore les relations diplomatiques entre Washington et Pékin. Hack Equifax
SecurityAffairs.webp 2020-02-11 08:12:37 The Altsbit exchange will exit in May following a hack (lien direct) The Italy-based cryptocurrency exchange Altsbit announced that it has suffered a security breach that led to the theft of its customer’s funds. Crypto-currency exchange Altsbit recently disclosed a security breach, the company claimed that hackers have stolen almost all its customers’ deposits.  The Italian cryptocurrency trading firm disclosed the incident on February 5, only a “small […] Hack
Chercheur.webp 2020-02-11 03:25:52 (Déjà vu) U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack (lien direct) The U.S. Justice Department today unsealed indictments against four Chinese officers of the People's Liberation Army (PLA) accused of perpetrating the 2017 hack against consumer credit bureau Equifax that led to the theft of personal data on nearly 150 million Americans. DOJ officials said the four men were responsible for carrying out the largest theft of sensitive personal information by state-sponsored hackers ever recorded.  Hack Equifax
WiredThreatLevel.webp 2020-02-10 17:52:32 How 4 Chinese Hackers Allegedly Took Down Equifax (lien direct) The Department of Justice has pinned the Equifax hack on China. Here's how they did it, according the indictment. Hack Equifax
BBC.webp 2020-02-10 17:00:03 Equifax: US charges four Chinese military officers over huge hack (lien direct) Nearly 150m Americans had personal data compromised in the hack of credit rating giant Equifax. Hack Equifax
ZDNet.webp 2020-02-10 15:19:00 DOJ charges four Chinese military hackers for Equifax hack (lien direct) DOJ said the hackers stole data on Americans and Equifax's intellectual property. Hack Equifax
ZDNet.webp 2020-02-10 12:46:58 Altsbit plans exit after hack leaves cryptocurrency exchange out of pocket (lien direct) Only a token amount of cryptocurrency was kept safe in cold wallets. Hack
no_ico.webp 2020-02-10 10:27:24 Expert Reaction On Translink Report Suspected IT Hack To The Police (lien direct) As reported by the BBC, bus and train operator Translink has reported a suspected hack of its internal IT systems to the police. The firm confirmed it has reported an “incident” to the Police Service of Northern Ireland (PSNI) after experiencing difficulties with its internal IT systems. Bus and train services have not been affected, a spokesperson … The ISBuzz Post: This Post Expert Reaction On Translink Report Suspected IT Hack To The Police Hack ★★★★
no_ico.webp 2020-02-10 10:10:27 Breaking Commentary: Phishing Emails Targeting Mobile Devices To Hack Banking Apps (lien direct) Reaching out to make sure you saw breaking news of a phishing campaign resurfacing the Android banking trojan dubbed Anubis, luring users through a fake Google Play update to gain access to mobile devices and steal sensitive financial information through hundreds of banking applications. Consumers are more vulnerable to fall victim to a phishing attack on their … The ISBuzz Post: This Post Breaking Commentary: Phishing Emails Targeting Mobile Devices To Hack Banking Apps Hack
itsecurityguru.webp 2020-02-10 10:09:30 Customers wanting answers on parcel delivery delays due to Toll transport hack (lien direct) Customers awaiting parcel deliveries from transport company Toll say they have been left in the dark about major delays caused by a cyber attack on the company’s IT systems. The company said the hacking occurred 11 days ago and had forced it to shut down “a number of systems across multiple sites and business units”, […] Hack
itsecurityguru.webp 2020-02-10 10:08:07 Cleaners used by cyber criminals to hack businesses (lien direct) Criminal gangs are planting “sleepers” in cleaning companies to allow them to physically access IT infrastructure, a senior cyber-crime police officer has warned. And businesses are being urged to bolster their physical security processes in the face of this growing threat. Source: European Cleaning Journal Hack
TechWorm.webp 2020-02-10 05:09:44 Critical Bluetooth Bug Hacks Android Devices [Here\'s How To Patch It] (lien direct) Unlike computers, smartphone operating systems are extremely secure, and it’s almost impossible to hack them. To further enhance security, Google releases monthly security patches for supported Android smartphones. Sadly, a Germany-based security firm ERNW has recently uncovered a critical bug in Android’s Bluetooth subsystem. This bug can be exploited to steal data and spread malware […] Malware Hack
bleepingcomputer.webp 2020-02-06 00:03:35 Bug in Philips Smart Light Allows Hopping to Devices on the Network (lien direct) Security researchers at Check Point discovered the issue and developed an attack that allowed them to hack into other devices on the same network as the vulnerable Philips Hue bulb. [...] Hack
TechWorm.webp 2020-02-04 15:17:35 Man Uses 99 Smartphones To Hack Google Maps And Create Fake \'Traffic Jam\' (lien direct) Google Maps, a web mapping service popularly used by people for route planning while traveling, was hacked by a man in Berlin to create a fake virtual traffic jam in the German capital. Simon Weckert, a Berlin-based performance artist and prankster, who published a video on his YouTube channel and his blog, is seen wheeling 99 smartphones […] Hack
grahamcluley.webp 2020-02-04 11:21:23 Man admits hacking Nintendo, leaking details of Switch games console (lien direct) Despite a previous brush with the law, Ryan Hernandez went on to hack and hack again. Read more in my article on the Hot for Security blog. Hack
no_ico.webp 2020-02-04 10:37:46 Cleaners Used To Hack Businesses (lien direct) Criminal gangs are planting “sleepers” in cleaning companies so that they can physically access IT infrastructure, the lead officer of the Yorkshire and Humber Regional Cyber Crime Unit told a recent SINET security event. He said that he was seeing a “much larger increase in physical breaches” as cybercrime groups diversify how they attack, as … The ISBuzz Post: This Post Cleaners Used To Hack Businesses Hack Guideline
NetworkWorld.webp 2020-02-04 09:24:00 The problem with mobile and app voting (lien direct) It's the day after the 2020 Iowa caucuses, and the Iowa Democratic Party has yet to announce the winner. The app that precinct leaders were supposed to use to report final tallies recorded inconsistent results. Party leaders blamed a "coding issue" within the app, not a hack or attack. Computerworld's Lucas Mearian joins Juliet to discuss the problem with mobile voting and how this snafu may affect the reputation of app voting in the future. Hack Guideline
SecurityAffairs.webp 2020-02-03 15:12:24 Police are warning crooks are using cleaners to compromise businesses (lien direct) Cybercriminals are planting so-called “sleepers” in cleaning companies so that they can physically access IT infrastructure and hack them. The alert was launched by a senior police officer, cyber criminals are planting so-called “sleepers” in cleaning companies so that they can gau physical access IT infrastructure and hack them. The police are urging organizations to […] Hack
grahamcluley.webp 2020-02-03 14:07:58 Did Everton sign Everton? Twitter hack blamed for soccer sign-up screwup (lien direct) If Everton Football Club’s Twitter account was really hacked to say it was signing Everton Soares then it needs to look at hardening its defence. If the hack occurred at all, of course. Hack
01net.webp 2020-02-03 12:44:43 Le pirate à l\'origine des fuites sur la Switch risque 25 ans de prison... mais pas à cause de son hack (lien direct) Pendant plus de trois ans, un jeune Américain de 21 ans a plusieurs fois piraté les serveurs de Nintendo. Il y a dérobé des informations sensibles, notamment concernant la Switch et ce, bien avant qu'elle ne soit officiellement lancée. Hack
grahamcluley.webp 2020-01-31 15:16:33 €13 million Maltese bank cyber-heist – six men arrested in UK (lien direct) The UK’s National Crime Agency (NCA) have arrested a total of six men as part of an investigation into the hack of a Maltese bank in February 2019. Hack
SecurityAffairs.webp 2020-01-30 13:56:29 Over 200K WordPress sites potentially exposed to hack due to Code Snippets flaw (lien direct) Over 200K WordPress sites are exposed to attacks due to a high severity cross-site request forgery (CSRF) bug in Code Snippets plugin. A high severity cross-site request forgery (CSRF) bug, tracked as CVE-2020-8417, in Code Snippets plugin could be exploited by attackers to take over WordPress sites running vulnerable versions of the Code Snippets plugin. The […] Hack
Pirate.webp 2020-01-29 09:27:23 Cameradar – Hack RTSP Video Surveillance CCTV Cameras (lien direct) Cameradar – Hack RTSP Video Surveillance CCTV CamerasCameradar is a Go-based tool to hack RTSP Video Surveillance CCTV Cameras, it can detect open RTSP hosts, detect device models and launch automated attacks. The main features of Cameradar are: Detect open RTSP hosts on any accessible target host Detect which device model is streaming Launch automated dictionary attacks to get their stream route (e.g.: /live.sdp) Launch automated dictionary attacks to get the username and password of the cameras Retrieve a complete and user-friendly report of the results Using Cameradar to Hack RTSP Video Cameras "-t, --targets": Set target. Read the rest of Cameradar – Hack RTSP Video Surveillance CCTV Cameras now! Only available at Darknet. Hack Tool
ErrataRob.webp 2020-01-28 16:53:00 There\'s no evidence the Saudis hacked Jeff Bezos\'s iPhone (lien direct) There's no evidence the Saudis hacked Jeff Bezos's iPhone.This is the conclusion of the all the independent experts who have reviewed the public report behind the U.N.'s accusations. That report failed to find evidence proving the theory, but instead simply found unknown things it couldn't explain, which it pretended was evidence.This is a common flaw in such forensics reports. When there's evidence, it's usually found and reported. When there's no evidence, investigators keep looking. Todays devices are complex, so if you keep looking, you always find anomalies you can't explain. There's only two results from such investigations: proof of bad things or anomalies that suggest bad things. There's never any proof that no bad things exist (at least, not in my experience).Bizarre and inexplicable behavior doesn't mean a hacker attack. Engineers trying to debug problems, and support technicians helping customers, find such behavior all the time. Pretty much every user of technology experiences this. Paranoid users often think there's a conspiracy against them when electronics behave strangely, but "behaving strangely" is perfectly normal.When you start with the theory that hackers are involved, then you have an explanation for the all that's unexplainable. It's all consistent with the theory, thus proving it. This is called "confirmation bias". It's the same thing that props up conspiracy theories like UFOs: space aliens can do anything, thus, anything unexplainable is proof of space aliens. Alternate explanations, like skunkworks testing a new jet, never seem as plausible.The investigators were hired to confirm bias. Their job wasn't to do an unbiased investigation of the phone, but instead, to find evidence confirming the suspicion that the Saudis hacked Bezos.Remember the story started in February of 2019 when the National Inquirer tried to extort Jeff Bezos with sexts between him and his paramour Lauren Sanchez. Bezos immediately accused the Saudis of being involved. Even after it was revealed that the sexts came from Michael Sanchez, the paramour's brother, Bezos's team double-downed on their accusations the Saudi's hacked Bezos's phone.The FTI report tells a story beginning with Saudi Crown Prince sending Bezos a message using WhatsApp containing a video. The story goes:The downloader that delivered the 4.22MB video was encrypted, delaying or preventing further study of the code delivered along with the video. It should be noted that the encrypted WhatsApp file sent from MBS' account was slightly larger than the video itself.This story is invalid. Such messages use end-to-end encryption, which means that while nobody in between can decrypt them (not even WhatsApp), anybody with possession of the ends can. That's how the technology is supposed to work. If Bezos loses/breaks his phone and needs to restore a backup onto a new phone, the backup needs to have the keys used to decrypt the WhatsApp messages.Thus, the forensics image taken by the investigators had the necessary keys to decrypt the video -- the investigators simply didn't know about them. In a previous blogpost I explain these magical WhatsApp keys and where to find them so that anybody, even you at home, can forensics their own iPhone, retrieve these keys, and decrypt their own videos. Hack Uber
ErrataRob.webp 2020-01-28 14:24:42 How to decrypt WhatsApp end-to-end media files (lien direct) At the center of the "Saudis hacked Bezos" story is a mysterious video file investigators couldn't decrypt, sent by Saudi Crown Prince MBS to Bezos via WhatsApp. In this blog post, I show how to decrypt it. Once decrypted, we'll either have a smoking gun proving the Saudi's guilt, or exoneration showing that nothing in the report implicated the Saudis. I show how everyone can replicate this on their own iPhones.The steps are simple:backup the phone to your computer (macOS or Windows), using one of many freely available tools, such as Apple's own iTunes appextract the database containing WhatsApp messages from that backup, using one of many freely available tools, or just hunt for the specific file yourselfgrab the .enc file and decryption key from that database, using one of many freely available SQL toolsdecrypt the video, using a tool I just created on GitHubEnd-to-end encrypted downloaderThe FTI report says that within hours of receiving a suspicious video that Bezos's iPhone began behaving strangely. The report says:...analysis revealed that the suspect video had been delivered via an encrypted downloader host on WhatsApp's media server. Due to WhatsApp's end-to-end encryption, the contents of the downloader cannot be practically determined. The phrase "encrypted downloader" is not a technical term but something the investigators invented. It sounds like a term we use in malware/viruses, where a first stage downloads later stages using encryption. But that's not what happened here.Instead, the file in question is simply the video itself, encrypted, with a few extra bytes due to encryption overhead (10 bytes of checksum at the start, up to 15 bytes of padding at the end).Now let's talk about "end-to-end encryption". This only means that those in middle can't decrypt the file, not even WhatsApp's servers. But those on the ends can -- and that's what we have here, one of the ends. Bezos can upgrade his old iPhone X to a new iPhone XS by backing up the old phone and restoring onto the new phone and still decrypt the video. That means the decryption key is somewhere in the backup.Specifically, the decryption key is in the file named 7c7fba66680ef796b916b067077cc246adacf01d in the backup, in the table named ZWAMDIAITEM, as the first protobuf field in the field named ZMEDIAKEY. These details are explained below.WhatsApp end-to-end encryption of videoLet's discuss how videos are transmitted using text messages.We'll start with SMS, the old messaging system built into the phone system that predates modern apps. It can only send short text messages of a few hundred bytes at a time. These messages are too small to hold a complete video many megabytes in size. They are sent through the phone system itself, not via the Internet.When you send a video via SMS what happens is that the video is uploaded to the phone company's servers via HTTP. Then, a text message is sent with a URL link to the video. When the recipient gets the message, their phone downloads the video from the URL. The text messages going through the phone system just contain the URL, an Internet connection is used to transfer the video.This happens transparently to the user. The user just sees the video and not the URL. They'll only notice a difference when using ancient 2G mobile phones that can get the SMS messages but which can't actually connect to the Internet.A similar thing happens with WhatsApp, only with encryption added.The sender first encryp Malware Hack Tool
no_ico.webp 2020-01-28 11:24:00 Zoom Updates Security As Eavesdrop Hack Discovered By Check Point Research (lien direct) Hackers could eavesdrop on scores of Zoom Meetings by generating and verifying Zoom Meeting IDs; Zoom rolls out a series of security changes to fix flaws  Check Point Research identified a major security flaw in Zoom, the popular video conferencing service used by over 60% of the Fortune 500.  Check Point's researchers were able to … The ISBuzz Post: This Post Zoom Updates Security As Eavesdrop Hack Discovered By Check Point Research Hack
BBC.webp 2020-01-28 10:13:19 Keeping your phone safe from prying eyes (lien direct) A hack which stops people going through your phone when you want to show them something. Hack
Blog.webp 2020-01-27 17:31:09 Hack the Box- Jarvis Walkthrough (lien direct) This article is a walkthrough for the retired machine “Jarvis” on Hack the Box. This machine has a static IP address of 10.10.10.143. Hack the Box is a website to test your hands-on penetration testing on intentionally vulnerable machines. Level: Easy Task: find user.txt and root.txt in the victim's machine. Penetration Methodology Scanning Open ports... Continue reading → Hack
SecurityAffairs.webp 2020-01-25 13:21:43 (Déjà vu) Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack (lien direct) Chinese hackers have exploited a zero-day vulnerability the Trend Micro OfficeScan antivirus in the recently disclosed hack of Mitsubishi Electric. According to ZDNet, the hackers involved in the attack against the Mitsubishi Electric have exploited a zero-day vulnerability in Trend Micro OfficeScan to infect company servers. This week, Mitsubishi Electric disclosed a security breach that might have […] Hack Vulnerability
Blog.webp 2020-01-25 06:42:34 Hack the Box Challenge: Bitlab Walkthrough (lien direct) In this article, we are going to crack the Gitlab Boot to Root Challenge and present a detailed walkthrough. The machine depicted in this Walkthrough is hosted on HackTheBox Website. Credit for making this machine goes to Frey & thek. As the Machine is live, we don't need to download it on our systems but... Continue reading → Hack
ZDNet.webp 2020-01-24 20:51:09 Trend Micro antivirus zero-day used in Mitsubishi Electric hack (lien direct) Hackers exploited a Trend Micro OfficeScan zero-day to plant malicious files on Mitsubishi Electric servers. Hack
AlienVault.webp 2020-01-23 14:00:00 Healthcare security: How can blockchain help? (lien direct) the word blockchain spelled in tiles This is part 2 of a blog on healthcare security. For more info, check out part 1. An independent guest blogger wrote this blog. When it comes to data security, there is no more important place than the healthcare industry. When people go to the doctor, they provide all of their most sensitive information, from their health issues to their phone number, to a doctor they trust. When a medical office or database is hacked or damaged, and that information is released, it can be catastrophic to everyone involved. Patient security is not only good practice, but it is also the law. Guidelines are in place to protect patient data, and it is up to health professionals and administrators to ensure that proper protections are made. Here are some best practices for now and advanced security platforms to look forward to in the future. The rise of blockchain technology While the possibility of losing business and patient data through a system breakdown or employee error is a serious concern, the potential for cybercrime is perhaps the bigger threat. As technology advances, so do the methods that hackers use to infiltrate our systems. The result is a combination of threats from computer viruses to phishing attacks, which trick employees into clicking a link or attachment that opens a door into their computer’s infrastructure. From there, a hacker can sell the personal info that they obtain on the black market or use it to extort money from the unsuspecting patient. Since criminals have the ability to hack into health systems, an extra layer of security is needed: enter the blockchain. Instead of having patient information listed on an excel spreadsheet or an unsecured platform, this type of technology has information that is encrypted and entered into a chain that cannot be changed, deleted, or tampered with. All new information is verified against a ledger of previous events and cannot be modified unless it is deemed accurate. In addition to creating better security, blockchain also creates additional transparency for those receiving care. Since a patient would be one of the owners of the blockchain, they are able to monitor when new data is added or changed within their records and have a say in the decision. Blockchain also prevents the leakage of data when emailing or shipping patient records to a new provider, as the new office would need only an access key to view and add their own content. While this is a relatively new technology, it could prove to be a necessary one in the future. Safeguarding medical data Regardless of how data can be lost, it is essential that your medical office is proactive instead of reactive when it comes to a potential breakdown. The first step should always be to create an extensive risk analysis that not only assumes potential risks but also lists a plan of action if the unthinkable were to occur Hack
ZDNet.webp 2020-01-22 21:23:00 A timeline of events surrounding the Bezos phone hack (lien direct) Bezos hack connected to Khashoggi murder and the Washington Post's subsequent media coverage. Hack
BBC.webp 2020-01-22 20:48:46 Jeff Bezos hack: UN experts demand probe of Saudi crown prince (lien direct) The UN experts' call comes amid reports Mohammed bin Salman's phone was used to hack the Amazon boss. Hack
WiredThreatLevel.webp 2020-01-22 17:19:43 Everything We Know About the Jeff Bezos Phone Hack (lien direct) A UN report links the attack on Jeff Bezos's iPhone X directly to Saudi Arabian crown prince Mohammed bin Salman. Hack
itsecurityguru.webp 2020-01-22 11:36:48 Jeff Bezos phone hack (lien direct) Mr Bezos’ phone was hacked after receiving a WhatsApp message in May 2018 that was sent from Mohammed bin Salman’s personal account, according to the Guardian. A message from a phone number used by the prince has been implicated in the data breach, according to reports. The kingdom’s US embassy said the stories were “absurd” and called […] Hack
SecurityAffairs.webp 2020-01-17 20:23:20 Hack the Army bug bounty program paid $275,000 in rewards (lien direct) Hack the Army bug bounty program results: 146 valid vulnerabilities were reported by white hat hackers and more than $275,000 were paid in rewards. The second Hack the Army bug bounty program ran between October 9 and November 15, 2019 through the HackerOne platform. The bug bounty program operated by the Defense Digital Service, along […] Hack
TechWorm.webp 2020-01-17 18:55:39 Hack A Tesla Model 3 And Get $1M And A Free Tesla Car As Rewards (lien direct) Tesla, the electric automotive company run by Elon Musk, will be offering $1 million and a free car as bug bounty rewards to hackers at the annual Pwn2Own hacking competition to be held in Vancouver in March this year. White hat hackers and security researchers can earn these rewards if they are able to completely […] Hack
NetworkWorld.webp 2020-01-15 03:00:00 3 easy ways to make your Windows network harder to hack (lien direct) Start the new year off by eliminating common paths for attackers to breach your network. Hack
grahamcluley.webp 2020-01-14 14:38:59 Boing Boing bounces back after hack attempted to infect users with fake Adobe Flash update (lien direct) The extremely popular Boing Boing blog was hacked by an unknown party who planted malicious code into the site’s WordPress theme. If you fear your computer may have been compromised you may be wise to run an up-to-date anti-virus program. Hack ★★★★★
WiredThreatLevel.webp 2020-01-10 18:48:09 Why Scientists Are Flying Drones Into Clouds of Whale Snot (lien direct) Researcher Iain Kerr was on a boat, covered in whale snot, when the idea hit him: Why not hack a drone to fly into whale snot instead? Hack
Last update at: 2024-06-29 05:07:37
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter