What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
SecurityAffairs.webp 2019-09-03 21:42:02 USBAnywhere BMC flaws expose Supermicro servers to hack (lien direct) USBAnywhere – Tens of thousands of enterprise servers powered by Supermicro motherboards can remotely be compromised by virtually plugging in USB devices. Tens of thousands of servers worldwide powered by Supermicro motherboards are affected by a vulnerability that would allow an attacker to remotely take over them. Researchers at firmware security firm Eclypsium discovered multiple vulnerabilities […] Hack Vulnerability
no_ico.webp 2019-09-03 13:04:03 Jack Dorsey Twitter Hack – How Can SIM Swap Be Stopped? (lien direct) On Friday afternoon Jack Dorsey's Twitter account was hacked – later identified as a SIM swap attack. With this type of fraud a hacker either convinces or bribes a carrier employee to switch the number associated with a SIM card to another device, at which point they can intercept any two-factor authentication codes sent by … The ISBuzz Post: This Post Jack Dorsey Twitter Hack – How Can SIM Swap Be Stopped? Hack
TechWorm.webp 2019-09-03 04:38:01 Malicious websites have been quietly hacking iPhones for years, says Google (lien direct) Google reveals malicious websites were secretly used to hack into iPhones for years Security researchers at Google have discovered a series of hacked websites that were delivering malware designed to hack iPhones over a period of at least two years. These websites, which were visited thousands of times a week, were being used to extensively […] Malware Hack
SecurityAffairs.webp 2019-08-31 14:48:03 FIN6 recently expanded operations to target eCommerce sites (lien direct) The financially-motivated hacking group FIN6 is switching tactics, passing from PoS attacks to the hack of e-commerce websites. According to researchers at IBM X-Force Incident Response and Intelligence Services (IRIS), the financially-motivated hacking group FIN6 is switching tactics, passing from PoS attacks to the hack of e-commerce websites. FIN6 group has been active since 2015, […] Hack
SecurityAffairs.webp 2019-08-31 08:43:00 (Déjà vu) Twitter account of Jack Dorsey, Twitter CEO and co-founder, has been hacked (lien direct) Hackers compromised the Twitter account of Jack Dorsey, CEO at Twitter, and published and retweeted offensive and racist messages. No one is secure online, news of the day is that hackers compromised the Twitter account of Jack Dorsey, CEO at Twitter and co-founder, and published and retweeted offensive and racist tweets. The hack tool place […] Hack Tool
no_ico.webp 2019-08-30 16:41:00 Google Finds \'Indiscriminate iPhone Attack Lasting Years\' (lien direct) Security researchers at Google have found evidence of a “sustained effort” to hack iPhones over a period of at least two years.The attack was said to be carried out using websites which would discreetly implant malicious software to gather contacts, images and other data. Google's analysis suggested the booby-trapped websites were said to have been … The ISBuzz Post: This Post Google Finds ‘Indiscriminate iPhone Attack Lasting Years’ Hack
SecurityWeek.webp 2019-08-30 14:56:00 iOS Vulnerabilities Allowed Attackers to Remotely Hack iPhones for Years (lien direct) Google on Thursday published detailed information on five iOS exploit chains, one of which has been used to remotely hack iPhones for at least two years.  Hack
SecurityAffairs.webp 2019-08-30 11:59:02 Google revealed how watering hole attacks compromised iPhone devices earlier this year (lien direct) Google researchers discovered that iPhone devices could be hacked by tricking owners into visiting specially crafted websites. Researchers at Google Project Zero discovered that it was possible to hack iPhone devices by visiting specially crafted websites. Earlier this year, Google Threat Analysis Group (TAG) experts uncovered an iPhone hacking campaign, initially, they spotted a limited […] Hack Threat
SecurityAffairs.webp 2019-08-29 21:09:05 Capital One Hacker indicted on federal charges for Wire Fraud and Computer Data Theft (lien direct) Paige Thompson, the alleged hacker behind the Capital One hack and attacks on 30 other organizations has been indicted on wire fraud and computer fraud. Paige Thompson, a transgender woman, suspected to be the hacker behind the Capital One hack and attacks on 30 other organizations has been indicted on wire fraud and computer fraud. In […] Hack
SecurityWeek.webp 2019-08-29 07:11:05 Bug Hunters Invited to Hack Facebook Devices at Pwn2Own Tokyo 2019 (lien direct) Trend Micro's Zero Day Initiative (ZDI) on Wednesday announced the prizes, rules and targets for Pwn2Own Tokyo 2019, which is set to take place on November 6-7 alongside the PacSec conference in Tokyo, Japan. This year's event targets 17 devices and over $750,000 in cash and prizes are being offered to researchers who can hack them. Hack
BBC.webp 2019-08-27 16:27:03 Nato: Cyber-attack on one nation is attack on all (lien direct) The military alliance says a serious hack attack would trigger a defence from all 29 members. Hack
SecurityAffairs.webp 2019-08-27 06:17:01 White hat hacker demonstrated how to hack a million Instagram accounts (lien direct) A researcher was awarded $10,000 by Facebook for the discovery of a critical vulnerability that could have been exploited to hack Instagram accounts. The white-hat hacker Laxman Muthiyah has discovered a critical vulnerability that could have been exploited to hack Instagram accounts. The process affected Instagram's password recovery process for mobile devices that leverages on […] Hack Vulnerability
SecurityAffairs.webp 2019-08-26 16:49:05 (Déjà vu) Binance says that leaked KYC Data are from third-party vendor. (lien direct) The Binance cryptocurrency exchange revealed that leaked users’ KYC data were obtained by hackers from a third-party vendor. In July, the hack of the Binance cryptocurrency exchange made the headlines, hackers stole$41 Million worth of Bitcoin (over 7,000 bitcoins) from Binance. Binance is one of the world's largest cryptocurrency exchanges, its founder and CEO Changpeng Zhao confirmed that the hackers […] Hack
SecurityWeek.webp 2019-08-26 15:22:04 Hacker Finds Instagram Account Takeover Flaw Worth $10,000 (lien direct) A researcher says he has received $10,000 from Facebook after finding another critical vulnerability that could have been exploited to hack Instagram accounts. Hack Vulnerability
CSO.webp 2019-08-26 10:38:00 Capital One hack shows difficulty of defending against irrational cybercriminals (lien direct) Software engineer Paige Thompson was arrested in late July for an unprecedented hack into a cloud server containing the personal data of over 100 million people who had filed credit card applications with leading financial institution Capital One. Thompson, who at the time of her arrest ran a hosting company called Netcrave Communications, had held a series of engineering jobs, including a stint at Amazon Web Services (AWS) in 2015 and 2016, where she presumably gained the skills to exploit a vulnerability in an application firewall on Capital One's AWS server. Hack Vulnerability Guideline
TechWorm.webp 2019-08-24 05:07:04 Microsoft is offering up to $30,000 to hack Chromium-based Edge browser (lien direct) Researchers Can Earn Up To $30,000 With Microsoft's New Chromium Edge Browser Bounty Program Microsoft has launched a new Insider Bounty Program for its beta version of its new Chromium-based Edge browser that will reward researchers up to $30,000 for finding vulnerabilities that are unique to Edge. “We're excited to expand our bounty programs today to […] Hack
SecurityWeek.webp 2019-08-23 17:36:00 US Wants Woman Accused in Capital One Hack to Stay Locked Up (lien direct) A woman accused of hacking Capital One and at least 30 other organizations is a flight risk, a threat and should be kept locked up until her trial, U.S. prosecutors said in court documents filed ahead of a Friday detention hearing in Seattle. Hack Threat
AlienVault.webp 2019-08-21 13:00:00 Cyberbullying and cybersecurity: how are they connected? (lien direct) guy who looks like he might be a cyberbully Image Source: Pixabay Cyberbullying and cybersecurity incidents and breaches are two common problems in the modern, internet-driven world. The fact that they are both related to the internet is not the only connection they have, however. The two are actually intimately connected issues on multiple levels. It may seem like an odd notion. After all, cyberbullying typically involves using technology to harass a person (often overtly), while cybersecurity involves preventing hackers and identity thieves from accessing information and then simply getting away without being caught. While the two have similarities in that they both involve malicious actors online, the motives are quite different. However, the points of connection between these two topics are worth exploring. Defining cyberbullying and cybersecurity When comparing terms like these, it can be helpful to lay out a definition for each in order to make sure everyone is on the same page. Cyberbullying is, simply put, bullying a person through technological outlets, such as social media or texting. Cybersecurity is the protection of sensitive data (and therefore people) using specific measures. Cyberbullying The modern world now knows that bullying can go beyond simple physical abuse; it can take place digitally as well. Cyberbullying can involve intimidating, deceiving, harassing, humiliating, and even directly impersonating a person. Since it takes place online, it also isn’t restricted to places like school or social gatherings. Due to the ubiquitous nature of the internet, cyberbullying can follow victims throughout every aspect of their lives. It also typically involves the common issue of cyberstalking. While it may be cute or entertaining to learn about a new friend or potential partner by following their goings-ons on Facebook, the issue of cyberstalking in a cyberbullying context is serious and is one of the key things that connect it to cybersecurity. From various levels of emotional abuse to stalking and even physical violence in extreme cases — such as that of Shana Grice in 2016, cyberbullying has a well-documented track record as a malicious and dangerous practice. Cybersecurity While cybersecurity is a broad topic, it’s worth taking the time to highlight some of the more specific areas of the practice that directly relate to the issue of cyberbullying. Identity theft is the poster child of cybercrime, and it’s a threat that’s used in cyberbullying often. In addition to defrauding an individual by accessing or opening new lines of credit in their name, cybercriminals may impersonate an individual for other motives. For instance, if a cyberbully is stalking someone else, they may hack into their user account on a game, an email address, or social media account in order to impersonate them. This allows them to get information from their victim’s friends and family or harass them. Another way a cyberbully can be a cybersecurity threat is by using malware to hack Data Breach Malware Hack Threat
WiredThreatLevel.webp 2019-08-20 16:00:00 A Huge Ransomware Attack Messes With Texas (lien direct) A coordinated strike against 23 local governments is called the largest such hack from a single source. Ransomware Hack
no_ico.webp 2019-08-19 15:30:03 (Déjà vu) The Most Common Hack Is Also The Most Successful. Here\'s How To Fight It. (lien direct) Despite what movies might show, most hacks don't involve frantic typing or brute-force attacks. In fact, Verizon’s “2017 Data Breach Investigations” report revealed that 90 percent of successful hacks aren't hacks at all: They’re social engineering. Simply put, social engineering is about manipulating people rather than computers. Modern hackers have discovered that it is easier … The ISBuzz Post: This Post The Most Common Hack Is Also The Most Successful. Here’s How To Fight It. Data Breach Hack
AlienVault.webp 2019-08-19 13:00:00 What is r00tz Asylum? (lien direct) At Black Hat 2019 I had the pleasure to meet some AT&T colleagues who are now my new InfoSec buddies! I met Marc Kolaks and Don Tripp from the Office of the CSO at the AT&T Cybersecurity booth. They told me about the weekend event they volunteering for at Defcon. So, being nosy I had to hear all about it and get some pics from the event (couldn’t attend myself due to date conflict with Diana Initiative.) First some cute kid pics! cute little boy with man at r00tzcute very young girl at r00tz defcon R00tz started back in 2011; originally called Defcon Kids.  It is an event designed specifically for kids to introduce them to “White Hat” security.  It includes hands on events, talks, and contests that are specifically geared for a younger crowd, including lock picking, soldering stations, capture the flag contests, technical talks and more.  One of the keys to the success of the event is that all these activities are specifically designed for and targeted for a young audience and include an Honor Code.  Some of the key aspects of the Honor Code include the following values: Only do good Always do your best Constantly improve Innovate Think long-term Be positive Visualize it Inspire others Go big & have fun! In general, the kids are encouraged to explore, to innovate and to learn.  The “rules” that govern R00TZ participation include: Only hack things you own Don’t hack anything you rely on Respect the rights of others Know the law, the possible risk, and the consequences for breaking it Find a safe playground AT&T participation: past and present AT&T has participated in the r00tz event for the last few years.  We’ve grown from being only a financial sponsor into actively participating. Patrick McCanna & Marc Kolaks were the key individuals to get ATT involved.  Patrick provided the contacts, and Marc arranged for the sponsorship. They saw a fantastic opportunity for AT&T to make a positive impact in the otherwise nefarious realm of hacking. One of the major contributions that AT&T provides to the r00tz event is the “Junk Yard”  This event provides piles of old electronic equipment ranging from cell phones to routers to typewriters. The kids are provided with hand tools, and eye protection (this year some AT&T Cybersecurity sunglasses were provided), and are allowed / encouraged to dis-assemble all this equipment simply to “see what’s inside”. kids at r00tz wearing AT&T sunglasses for eye protection In addition to the Junk Yard we’ve created various hands on activities ranging from penetration testing demonstrations to a customized version of the Hacker Games and Link buster in order to teach security “best practices” in a fun environment. Along with the “games” we also hosted MIT’s SCRATCH programming environment to allow the kids to experience computer programming on a fun an easy to understand platform. Another addition to this year’s event included providing information to parents on AT&T’s ASPIRE program and information on STEM (Science, Technology, Engineering & Math) opportunities for th Hack
TechWorm.webp 2019-08-18 20:51:03 Kaspersky Antivirus Injected Unique ID That Allowed Tracking Its Users Online (lien direct) A security flaw in Kaspersky antivirus leaves millions of users exposed to online hack A security journalist Ronald Eikenberg at German computer magazine C'T revealed that a flaw in Kaspersky antivirus software allowed third parties to spy on its millions of users for years – even in the browser's Incognito Mode or when you use […] Hack
SecurityWeek.webp 2019-08-16 19:12:01 Iowa Grocery Chain Investigating Possible Hack of Payment Processing Systems (lien direct) A West Des Moines, Iowa-based grocery chain that also operates restaurants, fuel-pumps and drive-thru coffee shops is warning its customers about a security incident involving some of its payment card systems.  Hack
grahamcluley.webp 2019-08-16 09:48:05 European Central Bank confirms website hack and data breach (lien direct) The European Central Bank (ECB), the central bank of the 19 European countries which have adopted the euro, has shut down a compromised website after it discovered that hackers had planted malware that stole information from newsletter subscribers. Data Breach Malware Hack
grahamcluley.webp 2019-08-15 15:07:03 “NULL” vanity plate hack to dodge parking tickets backfires to the tune of $12,000 (lien direct) A US security researcher called Droogie thought he’d come up with the perfect wheeze to avoid being fined by the Department of Motor Vehicles (DMV) – he bought a personalised license plate which we believed would mess with the DMV’s database. The name on Droogie’s vanity plate? “NULL” Hack
SecurityAffairs.webp 2019-08-12 14:24:00 Watch out, your StockX account details may be available in crime forums (lien direct) Researchers discovered a dump containing 6,840,339 records associated with StockX user accounts that surfaced in the cybercrime underground. Last week media reported the hack of StockX, the fashion and sneaker trading platform. A threat actor stole details of 6 million users, the stolen data includes user names, email addresses, addresses, shoe size, purchase history, and encrypted passwords (salted […] Hack Threat
SecurityWeek.webp 2019-08-12 13:21:00 Researchers Demonstrate Ransomware Attack on DSLR Camera (lien direct) Camera ransomware Researchers at cybersecurity firm Check Point have demonstrated that malicious actors could hack a DSLR camera and infect it with a piece of ransomware. Ransomware Hack
bleepingcomputer.webp 2019-08-11 21:37:05 Database from StockX Hack Sold Online, Check If You\'re Included (lien direct) A database reportedly containing 6,840,339 unique user accounts from the recent StockX data breach is being sold and distributed online. Bad actors have stated that they have already begun to decrypt the passwords and it is expected for this information to be used in future attacks. [...] Data Breach Hack
ZDNet.webp 2019-08-10 21:27:00 Clever attack uses SQLite databases to hack other apps, malware servers (lien direct) Tainted SQLite database can run malicious code inside other apps, such as web apps or Apple's iMessage. Malware Hack
WiredThreatLevel.webp 2019-08-09 12:00:00 Sorry, But We Can\'t Just Hack Our Way Out of Climate Doom (lien direct) We have to suck carbon out of the atmosphere. That alone won't fix the mess we've made. Hack
TechWorm.webp 2019-08-08 17:26:00 KDE Linux Desktops are vulnerable to hack just by downloading Malicious files (lien direct) Researcher discloses an unpatched KDE vulnerability that can run malicious code on a user’s system A security researcher has published a proof-of-concept (POC) code on Twitter for a zero-day vulnerability in the KDE software framework that is yet to be fixed. The security expert, Dominik Penner aka “@zer0pwn” who discovered the problem said that the […] Hack Vulnerability
TechRepublic.webp 2019-08-07 14:14:03 How the Air Force used a bug bounty program to hack its own cloud server (lien direct) The Air Force paid out $123,000 to researchers who found vulnerabilities in the organization's move to the cloud. Here's why. Hack
securityintelligence.webp 2019-08-07 04:05:02 Package Delivery! Cybercriminals at Your Doorstep (lien direct) >Reading Time: 6 minutes IBM X-Force Red investigated how cybercriminals might seek to exploit package deliveries to hack into corporate or personal home networks right from the office mailroom or from someone's front door. Hack
SecurityAffairs.webp 2019-08-06 08:11:02 QualPwn Bugs in Qualcomm chips could allow hacking Android Over the Air (lien direct) Researchers discovered two serious flaws, QualPwn bugs, in Qualcomm’s Snapdragon SoC WLAN firmware that could be exploited to hack Android device over the air. Security experts at Tencent Blade, the security elite unit at Tencent, have discovered two severe vulnerabilities, QualPwn bugs, that could “allow attackers to compromise the Android Kernel over-the-air. “QualPwn is a […] Hack
SecurityAffairs.webp 2019-08-06 07:04:02 Russia-linked STRONTIUM APT targets IoT devices to hack corporate networks (lien direct) The STRONTIUM Russia-linked APT group is compromising common IoT devices to gain access to several corporate networks. Researchers at Microsoft observed the Russia-linked APT group STRONTIUM abusing IoT devices to gain access to several corporate networks. The STRONTIUM APT group (aka APT28, Fancy Bear, Pawn Storm, Sofacy Group, and Sednit) has been active since at least 2007 and it has […] Hack APT 28
bleepingcomputer.webp 2019-08-05 12:30:01 StockX Hack Exposes Personal Information of Customers (lien direct) Over the weekend, StockX announced that their sneaker and streetwear buying platform had been hacked and an unauthorized user was able to gain access to customer data. This hack was what led to the password reset emails being sent out to all customers last week. [...] Hack
bleepingcomputer.webp 2019-08-05 12:00:00 Microsoft Invites Researchers to Hack Their Azure Security Lab (lien direct) Microsoft launched today the Azure Security Lab, a sandbox-like environment designed to enable security professionals to test Azure security without actually endangering the company's customers. [...] Hack
ErrataRob.webp 2019-08-04 18:52:45 Securing devices for DEFCON (lien direct) There's been much debate whether you should get burner devices for hacking conventions like DEF CON (phones or laptops). A better discussion would be to list those things you should do to secure yourself before going, just in case.These are the things I worry about:backup before you goupdate before you gocorrectly locking your devices with full disk encryptioncorrectly configuring WiFiBluetooth devicesMobile phone vs. StingraysUSBBackupTraveling means a higher chance of losing your device. In my review of crime statistics, theft seems less of a threat than whatever city you are coming from. My guess is that while thieves may want to target tourists, the police want to even more the target gangs of thieves, to protect the cash cow that is the tourist industry. But you are still more likely to accidentally leave a phone in a taxi or have your laptop crushed in the overhead bin. If you haven't recently backed up your device, now would be an extra useful time to do this.Anything I want backed up on my laptop is already in Microsoft's OneDrive, so I don't pay attention to this. However, I have a lot of pictures on my iPhone that I don't have in iCloud, so I copy those off before I go.UpdateLike most of you, I put off updates unless they are really important, updating every few months rather than every month. Now is a great time to make sure you have the latest updates.Backup before you update, but then, I already mentioned that above.Full disk encryptionThis is enabled by default on phones, but not the default for laptops. It means that if you lose your device, adversaries can't read any data from it.You are at risk if you have a simple unlock code, like a predicable pattern or a 4-digit code. The longer and less predictable your unlock code, the more secure you are.I use iPhone's "face id" on my phone so that people looking over my shoulder can't figure out my passcode when I need to unlock the phone. However, because this enables the police to easily unlock my phone, by putting it in front of my face, I also remember how to quickly disable face id (by holding the buttons on both sides for 2 seconds).As for laptops, it's usually easy to enable full disk encryption. However there are some gotchas. Microsoft requires a TPM for its BitLocker full disk encryption, which your laptop might not support. I don't know why all laptops don't just have TPMs, but they don't. You may be able to use some tricks to get around this. There are also third party full disk encryption products that use simple passwords.If you don't have a TPM, then hackers can brute-force crack your password, trying billions per second. This applies to my MacBook Air, which is the 2017 model before Apple started adding their "T2" chip to all their laptops. Therefore, I need a strong login password.I deal with this on my MacBook by having two accounts. When I power on the device, I log into an account using a long/complicated password. I then switch to an account with a simpler account for going in/out of sleep mode. This second account can't be used to decrypt the drive.On Linux, my password to decrypt the drive is similarly long, while the user account password is pretty short.I ignore the "evil maid" threat, because my devices are always with me rather than in Hack Threat Guideline
SecurityAffairs.webp 2019-08-03 20:06:01 DRAGONBLOOD flaws allow hacking WPA3 protected WiFi passwords (lien direct) Dragonblood researchers found two new weaknesses in WPA3 protocol that could be exploited to hack WPA3 protected WiFi passwords. passwords. A group of researchers known as Dragonblood (Mathy Vanhoef and Eyal Ronen)devised new methods to hack WPA3 protected WiFi passwords by exploiting two new vulnerabilities dubbed Dragonblood flaws. We first met this team of experts […] Hack
The_Hackers_News.webp 2019-08-03 02:23:04 Researchers Discover New Ways to Hack WPA3 Protected WiFi Passwords (lien direct) The same team of cybersecurity researchers who discovered several severe vulnerabilities, collectively dubbed as Dragonblood, in the newly launched WPA3 WiFi security standard few months ago has now uncovered two more flaws that could allow attackers to hack WiFi passwords. WPA, or WiFi Protected Access, is a WiFi security standard that has been designed to authenticate wireless devices using Hack
Chercheur.webp 2019-08-02 21:30:03 What We Can Learn from the Capital One Hack (lien direct) On Monday, a former Amazon employee was arrested and charged with stealing more than 100 million consumer applications for credit from Capital One. Since then, many have speculated the breach was perhaps the result of a previously unknown "zero-day" flaw, or an "insider" attack in which the accused took advantage of access surreptitiously obtained from her former employer. But new information indicates the methods she deployed have been well understood for years. Hack
no_ico.webp 2019-08-02 11:22:03 DHS Warns Small Airplanes Vulnerable To Flight Data Manipulation Attacks (lien direct) It has been reported the United States Department of Homeland Security’s (DHS) has issued an alert for the same, warning owners of small aircraft to be on guard against a vulnerability that could enable attackers to easily hack the plane’s CAN bus and take control of key navigation systems. The vulnerability, discovered by a cybersecurity researcher at Rapid 7, resides in … The ISBuzz Post: This Post DHS Warns Small Airplanes Vulnerable To Flight Data Manipulation Attacks Hack Vulnerability
SecurityAffairs.webp 2019-07-31 19:43:02 DHS warns of cyber attacks against small airplanes (lien direct) A few hours ago, I have written about an interesting analysis of the possible hack of avionics systems, not DHS warns of cyber attacks against small airplanes. Today we introduced an interesting report published by researchers at Rapid7 about the hacking of avionics systems via CAN bus, now the DHS issues an alert to warn […] Hack
SecurityAffairs.webp 2019-07-31 14:16:01 Hacking avionics systems through the CAN bus (lien direct) An expert analyzed the level of security of avionics systems used in small airplanes, and the results are disconcerting. Patrick Kiley, a senior security consultant at Rapid7 conducted an investigation into the security of avionics systems inside small airplanes. The results are disconcerting it is quite easy to hack a small plane. Kiley, which is […] Hack
ZDNet.webp 2019-07-30 17:47:00 Telegram rolls out fix for voicemail hack used against Brazilian politicians (lien direct) Hackers won't be able to hijack accounts using the "voicemail hack" if account owners enable two-step verification (2SV/2FA). Hack
TechWorm.webp 2019-07-30 16:05:01 Capital One Data Breach: 100 million customers exposed in massive hack (lien direct) 100 million customers personal data exposed in Capital One data breach Capital One, the Virginia-based bank with a popular credit card business, on Monday, announced that a hacker gained access to more than 100 million of its customer accounts and credit card applications resulting in a massive data breach. According to the company and the […] Data Breach Hack
SecurityAffairs.webp 2019-07-30 13:23:05 Google Project Zero hackers disclose details and PoCs for 4 iOS RCE flaws (lien direct) Security experts at Google disclosed details and proof-of-concept exploit codes for 4 out of 5 security vulnerabilities in Apple iOS. Researchers at Google disclosed details and proof-of-concept exploit codes for 4 out of 5 security vulnerabilities in Apple iOS that could be exploited by attackers to hack Apple devices by sending a specially-crafted message over […] Hack
The_State_of_Security.webp 2019-07-30 09:30:05 Woman arrested after Capital One hack spills personal info on 106 million credit card applicants (lien direct) The FBI has arrested a 33-year-old software engineer in Seattle as part of an investigation into a massive data breach at financial services company Capital One. Data Breach Hack
bleepingcomputer.webp 2019-07-30 08:08:01 Researchers Hack Surveillance Systems to Show Fake Video Feed (lien direct) Security researchers analyzing the security flaws present in IoT devices used in smart buildings were able to replace the real video feeds with arbitrary footage. [...] Hack
BBC.webp 2019-07-30 07:40:04 How to get visitors on to your home wi-fi easily (lien direct) The tech hack that means visitors to your home will never have to ask for your wi-fi login again. Hack
Last update at: 2024-06-28 15:07:58
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter