Re-Booted Hell Hacking Forum on Dark Web Hacks Car Breathalyzers Manufactures

It has now been proven that almost anyone and any company can get hacked including the firm that manufactures car breathalyzers. A hacker dubbed as ROR[RG] reportedly hacked into LMG Holdings’ data and dumped some of its internal documents on Dark Web. The hacker acts as the moderator of the newly re-booted Hell hacking forum. Among […]

STEAL YOUR WI-FI KEY FROM YOUR DOORBELL? IOT WTF!

The Ring is a Wi-Fi doorbell that connects to your home Wi-Fi. It’s a really cool device that allows you to answer callers from your mobile phone, even when you’re not home. It’s one of the few IoT devices we’ve looked at that we might even use ourselves. It acts as a CCTV camera, automatically […]

Anonymous Takes Down Nissan’s Website Against Illegal Whale Hunting In Japan

Short Bytes: With changing times, the international community has banned the whale hunting practice. However, it’s a common knowledge that Japanese people call whale meat their “nostalgia food” as it connects them to their culture and heritage. As a protest against Japan’s stance on whale hunting, Anonymous hacking collective has taken down Nissan’s website to put […]

Shoddy Ransomware Destroys User’s Files

A ransomware strain based on the open source Hidden Tear ransomware is infecting users, encrypting their files and losing the encryption key along the way, rendering all files unrecoverable. Last August, Turkish security group Otku Sen open-sourced on GitHub the code of a home-made ransomware they’ve created for educational purposes. This particular ransomware was named […]

Kingston’s DataTraveler 2000 Provides Undisputed Security and Encryption

A new USB device series has been launched by Kingston aiming to provide secure and tamper-proof thumb drive to IT professionals while on the go. Kingston DataTraveler 2000 has been created for offering top-notch security to crucially important files that require transportation from one place to another or for preventing unauthorized employees from checking out […]

8 Most Awesome Hacks Conducted By Anonymous Hackers

According to researchers, Anonymous hacktivists group is relatively much bigger than you anticipated and become quite popular among people all over the world. News about their existence first became public on social media, with members shown flaunting Guy Fawkes masks. It was all quite fitting, with the group calling themselves Anonymous and wearing such masks in all […]

Teen Who Hacked CIA Email Is Back to Prank US Spy Chief

One of the “teenage hackers” who broke into the CIA director’s AOL email account last year hasn’t given up targeting government intelligence officials. His latest victim is the Director of National Intelligence James Clapper, Motherboard has learned. A group of hackers calling themselves “Crackas With Attitude” or CWA made headlines in October, hacking into CIA […]

Google hacker criticized TrendMicro for critical flaws

A hacker with Google Project Zero research team, publicly disclosed critical vulnerabilities in the TrendMicro Antivirus. Tavis Ormandy, a researcher with Google’s Project Zero vulnerability research team, publicly disclosedcritical vulnerabilities in TrendMicro Antivirus that could be exploited to execute malicious code on the targeted system. Ormandy took only about 30 seconds to find the first […]

Black Hat SEO Campaign Leverages SQL Injections to Boost Search Rankings

A new type of black hat SEO campaign has been uncovered in the last few months by Akamai’s experts, who have observed that an attacker is using SQL injection flaws to deface websites with hidden content, specifically aimed at improving his website’s SEO ranking. The campaign has targeted around 3,800 different websites, hosted on 348 […]

SSH Backdoor Identified in Fortinet Firewalls

Fortinet’s FortiOS operating system, deployed on the company’s FortiGate firewall networking equipment includes an SSH backdoor on versions from the 4.x series up to and including 4.3.16, and the 5.x series up to and including version 5.0.7. This vulnerability is not a deja vu of the Juniper incident and seems to be a completely different […]

New Anonymous Communication Network PrivaTegrity Launched

PrivaTegrity communication network provides secure communication platform and Anonymity — Maybe better than Tor. A new anonymous communication network by the name of PrivaTegrity has been launched by renowned encryption specialist David Chaum. The network achieves same connection speed as Tor but provides better protection against cryptanalysis techniques. According to the encryption specialist, PrivaTegrity addresses as […]

Why Are We Calling Ubuntu 16.04 LTS The Best Ubuntu Release In Years?

Short Bytes: Making our readers aware about the best privacy practices by providing the latest security news has been fossBytes’ top priority. In this article, we are examining Canonical’s decision to disable the controversial online search of Ubuntu. Canonical has finally listened to privacy advocates and decided to release Ubuntu 16.04 LTS with better privacy […]

Experts warn Neutrino and RIG exploit kit activity spike

Security experts at Heimdal Security are warning a spike in cyber attacks leveraging the popular Neutrino and RIG exploit kit. Cyber criminals always exploit new opportunities and users’ bad habits, now crooks behind the recent campaigns relying on Neutrino and RIG exploit kits are ramping up attacks against users that haven’s patched their Adobe Flash software. “It […]

A Flaw on eBay’s Site Allowed Hackers To Steal User’s Passwords

A critical bug on eBay’s website opened the door for malicious hackers to create fake login pages to steal passwords and harvest credentials. An independent security researcher found the flaw in early December, and reported it to eBay on December 11. After an initial response asking for more information the following day, eBay stopped responding […]

Say “Cyber” again—Ars cringes through CSI: Cyber

CBS endangered cyber-procedural: Plane hacking! Software defined radio! White noise! OMG!. There are lots of cringeworthy technology moments on television, especially when the words “hacking” and “cyber” are introduced into the plot. But of all the broadcast and cable networks, CBS is the biggest purveyor of techno-idiocy, proving again and again that none of the producers […]

Smartwatches Can Be Used to Spy on Your Card’s PIN Code

Wearable devices can be used as motion-based keyloggers. French student and software engineer, Tony Beltramelli, has published his master thesis called Deep-Spying: Spying using Smartwatch and Deep Learning, in which he presents a new attack method that allows attackers to extract sensitive information like credit card or phone access PIN codes from motion sensors in wearable […]