What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
grahamcluley.webp 2018-08-23 11:08:02 Smashing Security #092: Hacky sack hack hack (lien direct) Smashing Security #092: Hacky sack hack hackIs your used car still connected to its old owner? Just how did Apple manage to identify the teenager hacker who stole 90GB of the firm's files? And why on earth would a firm of lawyers start producing pornographic videos? You'll be surprised by the answers! All this and much much more is discussed in the latest edition of the award-winning “Smashing Security” podcast hosted by computer security veterans Graham Cluley and Carole Theriault, joined this week by Paul Ducklin. Hack
zataz.webp 2018-08-18 00:40:02 hacky hack hack : Un ado de 16 ans pirate Apple (lien direct) hacky hack hack ! Apple confirme le passage d’un pirate informatique dans ses secrets. Il n’aurait cependant pas pu copier des données clients. Hacky hack hack – Aucune données clients n’ont été compromises. C’est ce qu’affirme Apple, ce vendredi, à la suite de la... Cet article hacky hack hack : Un ado de 16 ans pirate Apple est apparu en premier sur ZATAZ. Hack
no_ico.webp 2018-08-17 14:32:03 Instagram Hack (lien direct) Instagram has been hacked and users say their emails have been changed to .ru domains. Hackers were able to get in and change user's information such as usernames, profiles photos, passwords, and linked Facebook accounts among other things. Instagram has given instructions to users on how to restore their affected accounts and revoke access to … The ISBuzz Post: This Post Instagram Hack Hack
grahamcluley.webp 2018-08-17 13:06:01 SuperProf private tutor site massively fails password test, makes accounts super easy to hack (lien direct) Dunce thumbSuperprof, which claims to be “the world's largest tutoring network”, has made its newest members' passwords utterly predictable… leaving them wide open to hackers. Hack ★★★★
itsecurityguru.webp 2018-08-17 10:30:05 Apple files stored by teen in \'hacky hack hack\' folder (lien direct) A teenage boy from Australia has pleaded guilty to hacking into Apple’s network and downloading internal files, according to reports. The 16-year-old accessed 90 gigabytes worth of files, breaking into the system many times over the course of a year from his suburban home in Melbourne, reports The Age newspaper. View full story ORIGINAL SOURCE: BBC Hack Guideline
SecurityWeek.webp 2018-08-17 09:51:00 \'Hacky Hack Hack\': Australia Teen Breaches Apple\'s Secure Network (lien direct) A schoolboy who "dreamed" of working for Apple hacked the firm's computer systems, Australian media has reported, although the tech giant said Friday no customer data was compromised. Hack
ZDNet.webp 2018-08-17 08:49:00 \'Hacky hack hack\': Teen arrested for breaking into Apple\'s network (lien direct) Updated: The Apple fan allegedly managed to download roughly 90GB in corporate documents as well as access customer accounts. Hack
CSO.webp 2018-08-16 02:56:00 Hack mobile point-of-sale systems? Researchers count the ways (lien direct) Ever since the infamous and massive security breach at retailer Target nearly five years ago, more and more attention has focused on the potential flaws that can make payment systems vulnerable to digital attack.And now, with payments increasingly shifting to mobile platforms, it appears that the potential for hacking the mobile point-of-sale (mPOS) systems that make it possible for merchants to accept card and even cryptocurrency payments on-the-go is also shifting.[ Keep up with 8 hot cyber security trends (and 4 going cold). Give your career a boost with top security certifications: Who they're for, what they cost, and which you need. | Sign up for CSO newsletters. ] Presenting at the Black Hat USA information security conference last week in Las Vegas, prominent U.K. security researchers showcased recent research detailing the inherent vulnerabilities they discovered among four of the most popular mPOS systems operating in both the United States and Europe. In what is believed to be the most comprehensive review of mPOS security to-date, security researchers from London-based Positive Technologies plumbed the inner workings of the mobile payment infrastructure of seven mPOS readers offered by Square, SumUp, PayPal and iZettle and found a host of potential ways to hack these systems. Hack ★★
The_Hackers_News.webp 2018-08-15 12:00:05 Widespread Instagram Hack Locking Users Out of Their Accounts (lien direct) Instagram has been hit by a widespread hacking campaign that appears to stem from Russia and have affected hundreds of users over the past week, leaving them locked out of their accounts. A growing number of Instagram users are taking to social media, including Twitter and Reddit, to report a mysterious hack which involves locking them out of their account with their email addresses changed to Hack
ZDNet.webp 2018-08-15 07:17:05 Instagram hack is locking hundreds of users out of their accounts (lien direct) Recovery options are being changed to .ru addresses by an unknown threat actor. Hack Threat
CSO.webp 2018-08-15 03:00:00 Why you should consider crowdsourcing IT security services (lien direct) A crucial part of securing IT infrastructure, applications and services is asking independent white hat hackers to hack it. Hackers will try to break in regardless, so you might as well be part of the process to maximize the benefits. Unfortunately, not every company has the resources to hire a penetration testing team. [ Find out how to do penetration testing on the cheap ... and not so cheap. | Get the latest from CSO by signing up for our newsletters. ] Hack ★★
BBC.webp 2018-08-14 16:39:01 Instagram hack sees accounts replaced with film stills (lien direct) Affected account holders are seeing random film stills replacing their profile photos. Hack ★★★★★
Chercheur.webp 2018-08-13 00:28:01 FBI Warns of \'Unlimited\' ATM Cashout Blitz (lien direct) The Federal Bureau of Investigation (FBI) is warning banks that cybercriminals are preparing to carry out a highly choreographed, global fraud scheme known as an "ATM cash-out," in which crooks hack a bank or payment card processor and use cloned cards at cash machines around the world to fraudulently withdraw millions of dollars in just a few hours. Hack
WiredThreatLevel.webp 2018-08-12 20:00:00 A Clever Android Hack Takes Advantage of Sloppy Storage (lien direct) The so-called man in the disk attack uses Android's permissive external storage to wreak havoc on devices. Hack
Blog.webp 2018-08-12 16:35:03 Hack the ch4inrulz: 1.0.1 (CTF Challenge) (lien direct) Hello readers and welcome to another CTF challenge. This VM is made by Frank Tope as you'll see in the very homepage on the server's website (his resume). Nice touch, if I might add. Anyhow, you can download this VM from vulnhub here. The aim of this lab is to get root and read the... Continue reading → Hack
Blog.webp 2018-08-11 11:54:04 Hack the Wakanda: 1 (CTF Challenge) (lien direct) Hello friends! Today we are going to take another CTF challenge known as Wakanda and it is another capture the flag challenge provided for practice. So let's try to break through it. But before please note that you can download it from here. Security Level: Intermediate Flags: There are three flags (flag1.txt, flag2.txt, root.txt) Penetrating... Continue reading → Hack
TechWorm.webp 2018-08-11 11:09:04 How to Grow Your Followers on Instagram (lien direct) Instagram outgrew its first impression as a fun app for kids quite fast and has become a pretty serious tool for audience building, networking and content marketing for individuals and brands alike. It's quickly becoming one of the most popular sites for social networking on the planet with more than 200 million active users logging in every month and actively sharing over 60 million images, generating up to 1.6 billion likes daily. Engagement rates for the other social networks for brands are less than 0.1 percent but Instagram blows this all the way up, with an average extending up to an epic 58 times higher than on Facebook. Whether you're a huge brand seeking to get more new followers or still at the developing stages seeking to create prospective customers base out of target audiences, the following are 3 of the most powerful tips you can employ to become an Instagram unicorn.   Invest in a Complete and Curated Instagram Aesthetic Profile If you wish to get more followers today, you need to pay closer attention to what your Instagram feed looks like. Your Instagram business profile is the first opportunity you get to make an amazing first impression and entice people to hit the follow button. By creating a consistent brand story through your Instagram profile and aesthetic, you can transform the casual visitors into engaged and devoted followers. Therefore, you can start using Instagram bot it assists to get more authentic followers. The fact that Instagram is becoming a go-to for consumers to turn to when searching for brands means that your profile will soon become your new homepage. Thus, there's the need to put in as much effort into the visuals and copies on the profile that's put on the homepage of your website. Instagram profiles are a reflection of owners' brands, products or services and should be attractive enough to encourage visitors to become followers. Focus on the Stories Highlights and an eye-catching bio to make your page aesthetically appealing. Hack Instagram Stories for More Exposure For Instagram Stories, 2018 will definitely be a huge year, and because organic reach is dropping for regular posts, stories are fast becoming a key approach to engaging with followers and staying on top of the game. Did you know you can gain more followers with Instagram Stories? Yes, Instagram stories appear on the explore page, which implies that even people who don't follow you can easily find and view your stories. Who knows? If they fall in love with what they see, they might just give you a follow. This is just another reason why you need to have an active story running on your Instagram feed at all times. Other than appearing in Instagram's explore page, your story may also appear in stories for other hashtags and locations. Most Instagram hashtags and geo-locations have their own stories but this is an underutilized feature that you can seize. If you have to post a great piece of content or something interesting on your story, it can attract the attention of Instagram users and turn casual viewers into your new Instagram followers. Get Featured Off of Instagram One of the most effective ways to attract Instagram followers today promoting your account but not through the Instagram app. Instead of struggling to test all ways to hack the algorithm to optimize your content, spend more time on promoting your profile in other areas online. Of course, you will be going back to the basics of PR with this strategy but it's actually practically workable. When people hear you online, they are more likely to look you up on Instagram even before they Google you. Get featured in the press, guest posting on someone else or doing a podcast interview and see what it does to your Instagram following. This you can achieve by pitching your ideas to other Instagram accounts, podcasts and blogs that you're sure your target market would read. Always say yes to giving a quote for an article or doing an interview even if it's simply a small publication – they might potentially have an audience that's much more Hack Tool
SecurityAffairs.webp 2018-08-11 06:46:03 Experts explained how to hack macs in enterprises through MDM (lien direct) Researchers demonstrated how a sophisticated threat actor can hack a brand new Apple Mac computer in enterprise environments through MDM. A security duo composed by Jesse Endahl, CPO and CSO at macOS management firm Fleetsmith, and Max Bélanger, staff engineer at Dropbox, demonstrated at the Black Hat security conference how a persistent attacker could compromise […] Hack Threat
Blog.webp 2018-08-11 06:44:00 (Déjà vu) Hack the WinterMute: 1 (CTF Challenge) (lien direct) Hello friends! Today we are going to take another CTF challenge known as Wintermute (Part 1) and it is another boot2root challenge provided for practice. So let's try to break through it. But before please note that you can download it from here https://www.vulnhub.com/entry/wintermute-1,239/ Security Level: Intermediate Author Note: There are 2 important things to... Continue reading → Hack
DarkReading.webp 2018-08-09 21:45:00 IoT Malware Discovered Trying to Attack Satellite Systems of Airplanes, Ships (lien direct) Researcher Ruben Santamarta shared the details of his successful hack of an in-flight airplane Wi-Fi network - and other findings - at Black Hat USA today. Malware Hack
TechWorm.webp 2018-08-09 17:37:04 Wifi password hacking: Easily Hack WiFi Password Using New WPA/WPA2 flaw (lien direct) Learn how to hack Wi-Fi password of modern routers Wifi password hacking has become popular as people are always in search of the free internet. But due to the advancement of technology, cracking passwords have become a difficult task to do. The reason is due to the implementation of WPA/WPA2 (wifi protected access) protocols. They made […] Hack
WiredThreatLevel.webp 2018-08-09 16:30:00 A New Pacemaker Hack Puts Malware Directly On the Device (lien direct) Researchers at the Black Hat security conference will demonstrate a new pacemaker-hacking technique that can add or withhold shocks at will. Malware Hack
CSO.webp 2018-08-09 13:16:00 IDG Contributor Network: Here I am, hack me (lien direct) Those of us in healthcare are reeling from the recent ransomware attack at LabCorp. The company, one of the largest medical testing companies in the world, confirmed that a known group of bad actors penetrated their network late on a Friday night via an exposed RDP port, and infected more than 30,000 systems with SamSam ransomware. LabCorp deserves some kudos, given reports that they had the attack contained in less than 50 minutes, which is quite amazing, if true. Kudos notwithstanding, however, why did they allow their network to be penetrated in the first place? Ransomware Hack
BBC.webp 2018-08-09 08:14:04 Medical hack poses pacemaker risk (lien direct) Researchers disclose an unfixed vulnerability that threatens medical devices. Hack Vulnerability
ErrataRob.webp 2018-08-08 20:09:17 That XKCD on voting machine software is wrong (lien direct) The latest XKCD comic on voting machine software is wrong, profoundly so. It's the sort of thing that appeals to our prejudices, but mistakes the details.Accidents vs. attackThe biggest flaw is that the comic confuses accidents vs. intentional attack. Airplanes and elevators are designed to avoid accidental failures. If that's the measure, then voting machine software is fine and perfectly trustworthy. Such machines are no more likely to accidentally record a wrong vote than the paper voting systems they replaced -- indeed less likely. The reason we have electronic voting machines in the first place was due to the "hanging chad" problem in the Bush v. Gore election of the year 2000. After that election, a wave of new, software-based, voting machines replaced the older inaccurate paper machines.The question is whether software voting machines can be attacked. Well, if that's the measure, then airplanes aren't safe at all. Security against human attack consists of the entire infrastructure outside the plane, such as TSA forcing us to take off our shoes, to trade restrictions to prevent the proliferation of Stinger missiles.Confusing the two, accidents vs. attack, is used here because it makes the reader feel superior. We get to mock and feel superior to those stupid software engineers for not living up to what's essentially a fictional standard of reliability.To repeat: software is better than the mechanical machines they replaced, which is why there are so many software-based machines in the United States. The issue isn't normal accuracy, but their robustness against a different standard, against attack -- a standard which airplanes and elevators suck at.The problems are as much hardware as softwareLast year at the DEF CON hacking conference they had an "Election Hacking Village" where they hacked a number of electronic voting machines. Most of those "hacks" were against the hardware, such as soldering on a JTAG device or accessing USB ports. Other errors have been voting machines being sold on eBay whose data wasn't wiped, allowing voter records to be recovered.What we want to see is hardware designed more like an iPhone, where the FBI can't decrypt a phone even when they really really want to. This requires special chips, such as secure enclaves, signed boot loaders, and so on. Only once we get the hardware right can we complain about the software being deficient.To be fair, software problems were also found at DEF CON, like an exploit over WiFi. Though, a lot of problems are questionable whether the fault lies in the software design or the hardware design, fixable in either one. The situation is better described as the entire design being flawed, from the "requirements",  to the high-level system "architecture", and lastly to the actual "software" code.It's lack of accountability/fail-safesWe imagine the threat is that votes can be changed in the voting machine, but it's more profound than that. The problem is that votes can be changed invisibly. The first change experts want to see is adding a paper trail, rather than fixing bugs.Consider "recounts". With many of today's electronic voting machines, this is meaningless, with nothing to recount. The machine produces a number, and we have nothing else to test against whether that number is correct or fa Hack Threat
DarkReading.webp 2018-08-08 20:00:00 Researchers Release Free TRITON/TRISIS Malware Detection Tools (lien direct) Team of experts recreates the TRITON/TRISIS attack to better understand the epic hack of an energy plant that ultimately failed. Malware Hack
Blog.webp 2018-08-08 16:50:03 Hack the LAMPSecurity: CTF 7 (CTF Challenge) (lien direct) Hello friends! Today we are going to take another CTF challenge known as LAMPSecurity CTF7 and it is another boot2root challenge provided for practice and its security level is for the beginners. So let's try to break through it. But before please note that you can download it from here https://www.vulnhub.com/entry/lampsecurity-ctf7,86/ Penetrating Methodologies Network Scanning... Continue reading → Hack
The_Hackers_News.webp 2018-08-08 03:33:05 Snapchat Hack - Hacker Leaked Snapchat Source Code On GitHub (lien direct) The source code of the popular social media app Snapchat was recently surfaced online after a hacker leaked and posted it on the Microsoft-owned code repository GitHub. A GitHub account under the name Khaled Alshehri with the handle i5xx, who claimed to be from Pakistan, created a GitHub repository called Source-Snapchat with a description "Source Code for SnapChat," publishing the code of Hack
TechRepublic.webp 2018-08-07 15:12:01 New method makes cracking WPA/WPA2 Wi-Fi network passwords easier and faster (lien direct) Major password-cracking tool, Hashcat, found a simpler way to hack your WPA/WPA2 enabled Wi-Fi networks. Here's what businesses need to know. Hack
The_Hackers_News.webp 2018-08-07 11:57:05 How to Hack WiFi Password Easily Using New Attack On WPA/WPA2 (lien direct) Looking for how to hack WiFi password OR WiFi hacking software? Well, a security researcher has revealed a new WiFi hacking technique that makes it easier for hackers to crack WiFi passwords of most modern routers. Discovered by the lead developer of the popular password-cracking tool Hashcat, Jens 'Atom' Steube, the new WiFi hack works explicitly against WPA/WPA2 wireless network protocols Hack Tool Guideline
no_ico.webp 2018-08-06 13:00:03 Clarksons Data Breach (lien direct) Following the recent news regarding British shipping company, Clarksons, revealing that a data breach it suffered last year stemmed from a hack on a “single and isolated user account”, Joseph Carson, Chief Security Scientist at Thycotic offers the following comment. Joseph Carson, Chief Security Scientist at Thycotic: “Many organisations have failed to implement privileged access security and in … The ISBuzz Post: This Post Clarksons Data Breach Data Breach Hack
Blog.webp 2018-08-06 10:25:00 (Déjà vu) Hack the Box: Holiday Walkthrough (lien direct) Hello friends!! Today we are going to solve another CTF challenge “Holiday” which is available online for those who want to increase their skill in penetration testing and black box testing. Holiday is retired vulnerable lab presented by Hack the Box for making online penetration practices according to your experience level; they have the collection of vulnerable... Continue reading → Hack
Blog.webp 2018-08-06 09:08:03 (Déjà vu) Hack the Box: Silo Walkthrough (lien direct) Hello friends!! Today we are going to solve another CTF challenge “Silo” which is available online for those who want to increase their skill in penetration testing and black box testing. Silo is retired vulnerable lab presented by Hack the Box for making online penetration practices according to your experience level; they have the collection of vulnerable... Continue reading → Hack
Blog.webp 2018-08-05 20:14:02 (Déjà vu) Hack the Lampião: 1 (CTF Challenge) (lien direct) Hello friends!! Today we are going to solve another CTF challenge “Lampião: 1”. This VM is developed by Tiago Tavares, which is a standard Boot-to-Root challenge. Our goal is to get into the root directory and see the congratulatory message. Level: Easy Task: To Find The Final Flag. Let's Breach!! The target holds 192.168.1.105 as... Continue reading → Hack
Blog.webp 2018-08-05 15:42:03 Hack the Bulldog:2 (CTF Challenge) (lien direct) Hello friends!! Today we are going to solve another CTF challenge “Bulldog 2”. This VM is developed by Nick Frichette, which is a standard Boot-to-Root challenge. Our goal is to get into the root directory and see the congratulatory message. Level: Intermediate Task: To Find The Final Flag. Steps involved: Post scanning to discover open... Continue reading → Hack
SecurityAffairs.webp 2018-08-03 14:05:04 CVE-2018-14773 Symfony Flaw expose Drupal websites to hack (lien direct) A vulnerability in the Symfony HttpFoundation component tracked as CVE-2018-14773, could be exploited by attackers to take full control of the affected Drupal websites. Maintainers at Drupal addressed the security bypass vulnerability by releasing a new version of the popular content management system, the version 8.5.6. “The Drupal project uses the Symfony library. The Symfony […] Hack Vulnerability
Blog.webp 2018-08-03 11:42:03 (Déjà vu) Hack the Box: Bart Walkthrough (lien direct) Hello friends!! Today we are going to solve another CTF challenge “Bart” which is available online for those who want to increase their skill in penetration testing and black box testing. Bart is retired vulnerable lab presented by Hack the Box for making online penetration practices according to your experience level; they have the collection of vulnerable... Continue reading → Hack
grahamcluley.webp 2018-08-02 14:19:00 Reddit hacked - but don\'t give up on 2FA just yet (lien direct) Reddit hacked - but don't give up on 2FA just yetYes, SMS-based 2FA can be intercepted by someone determined to hack into your account. But it's also better than not having any multi-factor authentication in place at all. Read more in my article on the Hot for Security blog. Hack
SecurityWeek.webp 2018-08-02 12:38:02 Attackers Circumvent Two Factor Authentication Protections to Hack Reddit (lien direct) Popular Community Site Reddit Breached Through Continued Use of NIST-Deprecated SMS Two Factor Authentication (2FA) Hack
itsecurityguru.webp 2018-08-02 10:05:03 Reddit\'s hack response causes concern (lien direct) Social media site Reddit has suffered a data breach, but has refused to disclose its scale. The site said it discovered in June that hackers compromised several employees’ accounts to gain access to databases and logs. View Full Story ORIGINAL SOURCE: BBC Hack
bleepingcomputer.webp 2018-08-01 19:30:01 G Suite Can Now Alert You of Government-Backed Attacks (lien direct) Google announced today that administrators of G Suite accounts can now enable and configure a special alert when a government-backed cyber-espionage group is trying to hack into one of their company's user accounts. [...] Hack
Blog.webp 2018-08-01 03:05:01 Hack the Box: Valentine Walkthrough (lien direct) Hello friends! Today we are going to solve the CTF challenge “Valentine” which is a vulnerable lab presented by Hack the Box for making online penetration practices according to your experience level; they have a very good collection of vulnerable labs as challenges from beginners to Expert level. Difficulty Level: Medium Task: find user.txt and root.txt file on victim's machine. Steps involved:... Continue reading → Hack
itsecurityguru.webp 2018-07-31 14:16:01 How hack on 10,000 WordPress sites was used to launch an epic malvertising campaign (lien direct) Security researchers at Check Point have lifted the lid on the infrastructure and methods of an enormous “malvertising” and banking trojan campaign. The operation delivered malicious adverts to millions worldwide, slinging all manner of nasties including crypto-miners, ransomware and banking trojans. View Full Story ORIGINAL SOURCE: The Register Ransomware Hack
bleepingcomputer.webp 2018-07-31 11:55:01 Shipping Firm Avoids Customer Data Dump in Last Year\'s Hack & Ransom Incident (lien direct) UK-based shipping company Clarkson PLC (or Clarksons) has revealed more details about a security breach that took place last year, and during which hackers threatened to release some of the company's data online if it didn't pay a ransom demand. [...] Hack
ZDNet.webp 2018-07-31 10:00:00 HP will give you $10,000 to hack your printer (lien direct) Researchers can earn up to $10,000 for issues which allow attackers to target you through your printer. Hack
grahamcluley.webp 2018-07-31 08:54:02 Dixons Carphone admits hack far bigger than originally thought (lien direct) Dixons thumbCompany now says approximately 10 million personal records could have been accessed in security breach. Hack
ESET.webp 2018-07-31 08:28:05 Inmates hack tablets for free credits prison (lien direct) >The nature of the vulnerability hasn't been disclosed, but is said to have already been identified and fixed Hack Vulnerability
Blog.webp 2018-07-30 06:34:00 (Déjà vu) Hack the Box: Aragog Walkthrough (lien direct) Hello Friends!! Today we are going to solve another CTF Challenge “Aragog”. This VM is also developed by Hack the Box, Aragog is a Retired Lab and there are multiple ways to breach into this VM. Level: Medium Task: Find the user.txt and root.txt in the vulnerable Lab. Let's Begin!! As these labs are only... Continue reading → Hack
bleepingcomputer.webp 2018-07-30 00:15:00 KickICO Platform Loses $7.7 Million in Recent Hack (lien direct) On Friday, ICO platform KickICO acknowledged a security breach during which an unknown attacker (or attackers) stole over 70 million KICK tokens ($7.7 million at the time of the hack) from the platform's wallets. [...] Hack
Blog.webp 2018-07-29 05:13:02 Hack the Jarbas: 1 (CTF Challenge) (lien direct) Hello readers. We'd recently tried our hands on the vulnerable VM called Jarbas on vulnhub. It is developed to look like a 90s Portuguese search engine. It is made by Tiago Tavares. You can download the lab from here. The objective of this challenge is to get root shell. Difficulty Level: Easy Steps involved: Method... Continue reading → Hack
Last update at: 2024-07-08 07:07:19
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter