What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
TechWorm.webp 2022-07-28 10:17:24 Microsoft: Windows, Adobe Zero-Day Used To Hack Windows Users (lien direct) >The Microsoft Threat Intelligence Center (MSTIC) and the Microsoft Security Response Center (MSRC) on Wednesday claimed that they found an Austrian-based private-sector offensive actor (PSOA) exploiting multiple Windows and Adobe 0-day exploits in “limited and targeted attacks” against European and Central American customers. For the unversed, PSOAs are private companies that manufacture and sell cyberweapons […] Hack Threat
TechWorm.webp 2022-07-19 15:03:20 SATAn Hack Uses SATA Cable As An Antenna To Steal Data (lien direct) >Security researchers at the Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Israel have published a paper illustrating how a hacker can steal data and sensitive information from an “air-gapped system” through a Serial ATA (SATA) cable and transfer it from a compromised PC on to a nearby receiver. For those […] Hack
TechWorm.webp 2022-07-14 14:30:46 Bandai Namco Confirms Hack And Data At Risk Of Being Leaked (lien direct) >Bandai Namco, the Japanese video game publisher of many popular games such as Elden Ring, Dark Souls, Pac-Man, Tekken and more, on Wednesday confirmed that they suffered a cyberattack earlier this month and warned that some of their customers’ confidential data may have been stolen. The confirmation of the breach by Bandai Namco comes after […] Hack
TechWorm.webp 2022-06-25 17:14:05 Harmony Blockchain Bridge Loses $100 Million In Crypto Hack (lien direct) >U.S. based firm Harmony, the crypto start-up behind Horizon Blockchain Bridge, on Friday announced that $100 million worth of digital tokens were stolen from one of its key products. For the unversed, Horizon Blockchain Bridge allows users to transfer their crypto assets including tokens, stablecoins, and NFTs, between Ethereum, Binance Smart Chain, and the Harmony blockchain. The company said that on June 23, 2022, […] Hack
TechWorm.webp 2020-07-25 05:22:55 CarryMinati\'s YouTube Channel Hacked To Stream Bitcoin Scam (lien direct) Popular Indian roaster and streamer on YouTube, Ajey Nagar, aka CarryMinati is the latest victim of the ongoing BitCoin hack scandal. The hack happened on the second channel of CarryMinati, which goes by the name of CarryisLive, where he streams himself playing video games, often with other YouTubers and celebrities. Just a week ago in […] Hack Uber
TechWorm.webp 2020-06-03 13:58:18 Hackers Hack Minnesota Senate Computers, Access Password Files (lien direct) Hackers on Tuesday morning targeted the Minnesota Senate's website that forced it to go offline for the major part of the day, reports Star Tribune. During the breach, the hackers were able to access a file of passwords used by the senators and staff.  In an email written to the senators and staff, Secretary of […] Hack
TechWorm.webp 2020-06-03 06:01:10 Anonymous Hack Chicago Police Radios To Play NWA\'s \'Fuck Tha Police\' During Protests (lien direct) Anonymous, the infamous hacktivist group, reportedly hijacked into Chicago Police Department's radio scanners to play NWA's 'Fuck Tha Police' over the weekend, claim online reports. On May 30, the Anonymous group had announced their return showing solidarity with the protestors criticizing the Minneapolis Police Department in the wake of the death of George Floyd last […] Hack
TechWorm.webp 2020-05-19 07:47:55 Nintendo Sues Stores Selling New \'Team-Xecuter\' Switch Hack (lien direct) Nintendo, who is well-known for its infamous fight against game piracy, has filed two lawsuits in U.S. courts targeting several online websites selling Switch hacks and mods linked to Team-Xecuter and causing “tremendous harm” to the company.  Nintendo of America has filed two lawsuits last Friday, one in Ohio and one in Seattle. The Ohio […] Hack ★★★
TechWorm.webp 2020-05-04 12:21:16 Hacker leaks 15 million records from Tokopedia, Payment Info Secure: Reports (lien direct) Personal information of 91 million users of Tokopedia, an Indonesian technology company specializing in e-commerce, are being sold on the Darknet for $5,000, which were stolen in a hack attempt by an unknown hacker.   “We found that there had been an attempt to steal data from Tokopedia users. However, Tokopedia ensures that crucial information such […] Hack
TechWorm.webp 2020-04-25 13:54:15 Nintendo Confirms At Least 160,000 Switch Accounts Were Hacked (lien direct) Nintendo on Friday morning confirmed that at least 160,000 user accounts were breached in a hack earlier this month after several users complained about their accounts getting hacked. According to Nintendo, 160,000 user accounts that use a Nintendo Network ID (NNID) to login to their Nintendo Account may have been affected by the breach. The […] Hack ★★★★
TechWorm.webp 2020-03-07 11:37:40 17-Yr-Old RCE Flaw Can Hack Several Linux Systems  (lien direct) The US-CERT has issued a security advisory warning users of a 17-year-old critical Remote Code Execution (RCE) vulnerability that affects PPP (Point to Point Protocol Daemon) daemon software implemented in almost all Linux based operating systems.  The flaw, dubbed as CVE-2020-8597 with a 9.3 CVE score, was discovered by an IOActive security researcher, Ilja Van […] Hack Vulnerability
TechWorm.webp 2020-03-03 14:56:36 Hackers Can Hijack Siri, Google Assistant Using Ultrasonic Waves (lien direct) A group of security researchers have discovered a new method to hack smartphone voice assistants, including those used by Siri and Google by sending voice commands via ultrasonic waves.   Dubbed as SurfingAttack, this attack allows a hacker to control Apple’s Siri and Google Assistant by sending inaudible vibrations through a tabletop from 30 feet away without the phone owner's […] Hack
TechWorm.webp 2020-02-13 15:53:22 Emotet Malware Can Now Spread Through Wi-Fi Networks (lien direct) Security researchers from Binary Defenses have recently discovered a new variant of the Emotet Trojan that can hack Wi-Fi networks that are within range of an infected system. Emotet, a kind of malware originally designed as a banking Trojan, can steal data such as user credentials stored on the browser, install other types of malware […] Malware Hack
TechWorm.webp 2020-02-10 05:09:44 Critical Bluetooth Bug Hacks Android Devices [Here\'s How To Patch It] (lien direct) Unlike computers, smartphone operating systems are extremely secure, and it’s almost impossible to hack them. To further enhance security, Google releases monthly security patches for supported Android smartphones. Sadly, a Germany-based security firm ERNW has recently uncovered a critical bug in Android’s Bluetooth subsystem. This bug can be exploited to steal data and spread malware […] Malware Hack
TechWorm.webp 2020-02-04 15:17:35 Man Uses 99 Smartphones To Hack Google Maps And Create Fake \'Traffic Jam\' (lien direct) Google Maps, a web mapping service popularly used by people for route planning while traveling, was hacked by a man in Berlin to create a fake virtual traffic jam in the German capital. Simon Weckert, a Berlin-based performance artist and prankster, who published a video on his YouTube channel and his blog, is seen wheeling 99 smartphones […] Hack
TechWorm.webp 2020-01-17 18:55:39 Hack A Tesla Model 3 And Get $1M And A Free Tesla Car As Rewards (lien direct) Tesla, the electric automotive company run by Elon Musk, will be offering $1 million and a free car as bug bounty rewards to hackers at the annual Pwn2Own hacking competition to be held in Vancouver in March this year. White hat hackers and security researchers can earn these rewards if they are able to completely […] Hack
TechWorm.webp 2020-01-06 18:05:40 Iranian Hackers Hack And Deface U.S. Government Agency Website (lien direct) A hacking group that claims to be working for the Iranian government hacked and defaced a U.S. government agency website on January 4, 2020. The hackers posted a doctored image of a bloodied Donald Trump being punched in the face by an Iranian Revolutionary Guard alongside pro-Iranian messages. “Hacked by Iran Cyber Security Group Hackers. This […] Hack
TechWorm.webp 2019-11-06 20:25:25 Alexa, Google Assistant And Siri Vulnerable To Laser Hack Attacks (lien direct) A group of researchers have discovered a security flaw that allows hackers to hack smart home speakers by pointing a specially crafted laser beam at their microphones and injecting them with voice commands. What is interesting is that the same vulnerability can be used to compromise any computer that includes a microphone, as well as […] Hack Vulnerability
TechWorm.webp 2019-11-02 03:49:56 Top Government officials across 20 countries targets of WhatsApp hacking (lien direct) Smartphones of senior government officials, journalists, human activists, and military officers across 20 U.S. allied countries were targeted earlier this year with an Israeli spyware that used WhatsApp to take over users’ phones, said sources familiar with an internal investigation of Facebook-owned instant messaging platform. Some of the victims of the spyware hack belong to […] Hack
TechWorm.webp 2019-09-09 11:18:05 Apple responds to Google\'s statement on iOS security vulnerabilities (lien direct) Google's Report On iPhone Exploit Was Exaggerated, Says Apple Last week, Google in a blog post had announced that its Threat Analysis Group (TAG) and Project Zero had discovered a series of iOS exploit chains in the wild that were designed to hack iPhones over a period of at least two years. They were being used […] Hack Threat
TechWorm.webp 2019-09-03 04:38:01 Malicious websites have been quietly hacking iPhones for years, says Google (lien direct) Google reveals malicious websites were secretly used to hack into iPhones for years Security researchers at Google have discovered a series of hacked websites that were delivering malware designed to hack iPhones over a period of at least two years. These websites, which were visited thousands of times a week, were being used to extensively […] Malware Hack
TechWorm.webp 2019-08-24 05:07:04 Microsoft is offering up to $30,000 to hack Chromium-based Edge browser (lien direct) Researchers Can Earn Up To $30,000 With Microsoft's New Chromium Edge Browser Bounty Program Microsoft has launched a new Insider Bounty Program for its beta version of its new Chromium-based Edge browser that will reward researchers up to $30,000 for finding vulnerabilities that are unique to Edge. “We're excited to expand our bounty programs today to […] Hack
TechWorm.webp 2019-08-18 20:51:03 Kaspersky Antivirus Injected Unique ID That Allowed Tracking Its Users Online (lien direct) A security flaw in Kaspersky antivirus leaves millions of users exposed to online hack A security journalist Ronald Eikenberg at German computer magazine C'T revealed that a flaw in Kaspersky antivirus software allowed third parties to spy on its millions of users for years – even in the browser's Incognito Mode or when you use […] Hack
TechWorm.webp 2019-08-08 17:26:00 KDE Linux Desktops are vulnerable to hack just by downloading Malicious files (lien direct) Researcher discloses an unpatched KDE vulnerability that can run malicious code on a user’s system A security researcher has published a proof-of-concept (POC) code on Twitter for a zero-day vulnerability in the KDE software framework that is yet to be fixed. The security expert, Dominik Penner aka “@zer0pwn” who discovered the problem said that the […] Hack Vulnerability
TechWorm.webp 2019-07-30 16:05:01 Capital One Data Breach: 100 million customers exposed in massive hack (lien direct) 100 million customers personal data exposed in Capital One data breach Capital One, the Virginia-based bank with a popular credit card business, on Monday, announced that a hacker gained access to more than 100 million of its customer accounts and credit card applications resulting in a massive data breach. According to the company and the […] Data Breach Hack
TechWorm.webp 2019-07-28 08:53:00 Your Android smartphone can be hacked just by playing a malicious video (lien direct) Beware! Just opening a video on Android can hack your smartphone More than one billion devices running versions between Android 7.0 Nougat and Android 9.0 Pie are facing a critical remote code execution (RCE) vulnerability, reports The Hacker News. The critical RCE flaw ( CVE-2019-2107 ) in question resides in the Android Media framework that is used for […] Hack
TechWorm.webp 2019-07-28 08:45:00 Developer brings Touch Bar alive on MacBook Pro running Windows 10 (lien direct) This developer has made MacBook Pro's Touch Bar compatible with Windows 10 A clever hack by a third-party developer has brought MacBook Pro's Touch Bar functionality alive when running under Windows 10 via Bootcamp. The Touch Bar on Windows 10 allows you to easily access the Start menu, search, Cortana and also switch between apps […] Hack
TechWorm.webp 2019-07-20 15:49:03 Israeli firm can steal your private data from Apple, Google, Facebook and Amazon (lien direct) Apple, Google, Facebook, and Amazon are vulnerable to malware from an Israeli firm Israel-based cybersecurity company, NSO Group has developed a surveillance tool that can obtain user data from Apple, Google, Facebook, Amazon and Microsoft servers, according to The Financial Times. NSO Group, whose software product was used to hack Facebook-owned WhatsApp Messenger in May, […] Malware Hack Tool
TechWorm.webp 2019-06-22 12:32:04 Hackers can hack your PC by exploiting critical vulnerability in VLC media player (lien direct) VideoLAN releases a security update for vulnerable VLC Media player VLC media player has been discovered with two high-risk security flaws on software versions 3.0.6 and earlier that can allow attackers to load specially crafted video files in the vulnerable system to execute the arbitrary code. For those unaware, VLC media player is one of […] Hack Vulnerability
TechWorm.webp 2019-06-11 12:39:02 Beware Linux users! Vulnerability in Vim or Neovim Editor could compromise your Linux (lien direct) CVE-2019-12735: Opening a specially crafted file in Vim or Neovim Editor could hack your Linux system Security expert Armin Razmjou recently detected a high-risk arbitrary OS command execution vulnerability (CVE-2019-12735) in Vim and Neovim. For those unaware, Vim and Neovim are two most popular and powerful command-line text editing applications that come pre-installed in most of […] Hack Vulnerability
TechWorm.webp 2019-02-07 11:26:03 Hackers can hack an Android smartphone just by looking at a PNG image (lien direct) Vulnerability in PNG file can allow hackers to hack Android smartphones Beware, while opening a harmless-looking image downloaded from the internet, emails, social media apps, or messaging apps, as it could compromise your smartphone. Google has discovered three new critical vulnerabilities that allow hackers to hack an Android smartphone just by looking at a PNG […] Hack
TechWorm.webp 2018-12-04 19:04:02 Hackers steal data of 100 million Quora users (lien direct) Quora hack exposes data of about 100 million users Quora, the question-and-answer sharing website, announced yesterday that data of about 100 million of its users was compromised as a result of unauthorized access to one of their systems by a “malicious third party”. “We recently became aware that some user data was compromised due to unauthorized […] Hack
TechWorm.webp 2018-11-23 12:51:01 Hack Facebook or Instagram accounts and get paid up to $40,000 (lien direct) Facebook to pay up to $40,000 for finding ways to hack Facebook or Instagram accounts Facebook has been going through a rough patch this year after suffering two severe security breaches that affected millions of its users. While every year, Facebook pays millions of dollars to researchers and bug hunters to find security holes in […] Hack
TechWorm.webp 2018-10-14 12:23:01 Hackers accessed 29 million user accounts, says Facebook (lien direct) Facebook confirms 29 million users' data accessed by hackers: How to check if your account has been hacked Last month, Facebook was hit by the worst-security breach where the hackers accessed personal information of millions of users. Back then, Facebook had said that the hack had exposed data of approximately 50 million users. However, the […] Hack
TechWorm.webp 2018-10-02 18:47:05 iPhone Passcode Bypass Hack Exposes Contacts And Photos (lien direct) Flaw in Apple's iOS 12 allows an attacker to access contacts and photos in iPhone XS model A passcode bypass vulnerability has been discovered in Apple's new iOS version 12 that could allow an attacker to access photos and contact details on a locked iPhone XS as well as other Apple devices. Jose Rodriguez, a […] Hack Vulnerability
TechWorm.webp 2018-09-07 18:26:02 North Korean hacker charged for WannaCry and Sony cyberattacks (lien direct) U.S. charges North Korean hacker for WannaCry, Sony cyber attacks The U.S. government on Thursday charged and sanctioned a North Korean hacker for the 2014 Sony hack and the 2017 WannaCry global ransomware cyberattack, U.S. officials said. The accused, Park Jin Hyok worked as part of a team of hackers, also known as the Lazarus […] Ransomware Hack Wannacry APT 38
TechWorm.webp 2018-08-11 11:09:04 How to Grow Your Followers on Instagram (lien direct) Instagram outgrew its first impression as a fun app for kids quite fast and has become a pretty serious tool for audience building, networking and content marketing for individuals and brands alike. It's quickly becoming one of the most popular sites for social networking on the planet with more than 200 million active users logging in every month and actively sharing over 60 million images, generating up to 1.6 billion likes daily. Engagement rates for the other social networks for brands are less than 0.1 percent but Instagram blows this all the way up, with an average extending up to an epic 58 times higher than on Facebook. Whether you're a huge brand seeking to get more new followers or still at the developing stages seeking to create prospective customers base out of target audiences, the following are 3 of the most powerful tips you can employ to become an Instagram unicorn.   Invest in a Complete and Curated Instagram Aesthetic Profile If you wish to get more followers today, you need to pay closer attention to what your Instagram feed looks like. Your Instagram business profile is the first opportunity you get to make an amazing first impression and entice people to hit the follow button. By creating a consistent brand story through your Instagram profile and aesthetic, you can transform the casual visitors into engaged and devoted followers. Therefore, you can start using Instagram bot it assists to get more authentic followers. The fact that Instagram is becoming a go-to for consumers to turn to when searching for brands means that your profile will soon become your new homepage. Thus, there's the need to put in as much effort into the visuals and copies on the profile that's put on the homepage of your website. Instagram profiles are a reflection of owners' brands, products or services and should be attractive enough to encourage visitors to become followers. Focus on the Stories Highlights and an eye-catching bio to make your page aesthetically appealing. Hack Instagram Stories for More Exposure For Instagram Stories, 2018 will definitely be a huge year, and because organic reach is dropping for regular posts, stories are fast becoming a key approach to engaging with followers and staying on top of the game. Did you know you can gain more followers with Instagram Stories? Yes, Instagram stories appear on the explore page, which implies that even people who don't follow you can easily find and view your stories. Who knows? If they fall in love with what they see, they might just give you a follow. This is just another reason why you need to have an active story running on your Instagram feed at all times. Other than appearing in Instagram's explore page, your story may also appear in stories for other hashtags and locations. Most Instagram hashtags and geo-locations have their own stories but this is an underutilized feature that you can seize. If you have to post a great piece of content or something interesting on your story, it can attract the attention of Instagram users and turn casual viewers into your new Instagram followers. Get Featured Off of Instagram One of the most effective ways to attract Instagram followers today promoting your account but not through the Instagram app. Instead of struggling to test all ways to hack the algorithm to optimize your content, spend more time on promoting your profile in other areas online. Of course, you will be going back to the basics of PR with this strategy but it's actually practically workable. When people hear you online, they are more likely to look you up on Instagram even before they Google you. Get featured in the press, guest posting on someone else or doing a podcast interview and see what it does to your Instagram following. This you can achieve by pitching your ideas to other Instagram accounts, podcasts and blogs that you're sure your target market would read. Always say yes to giving a quote for an article or doing an interview even if it's simply a small publication – they might potentially have an audience that's much more Hack Tool
TechWorm.webp 2018-08-09 17:37:04 Wifi password hacking: Easily Hack WiFi Password Using New WPA/WPA2 flaw (lien direct) Learn how to hack Wi-Fi password of modern routers Wifi password hacking has become popular as people are always in search of the free internet. But due to the advancement of technology, cracking passwords have become a difficult task to do. The reason is due to the implementation of WPA/WPA2 (wifi protected access) protocols. They made […] Hack
Last update at: 2024-05-05 22:08:04
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter