Browsing category

Data Security

NYPD Admits To Using Cell Phone Spy Tool More Than 1000 Times Since 2008

The New York Police Department has admitted to using controversial cell phone spying systems known as Stingrays—which can be used to track the location and intercept personal communications of nearby cellphone users. In a report from the New York Civil Liberties Union, the NYPD confirmed using the Stingray more than 1,000 times between 2008 and […]

IBM Researchers Hack Into A Smart Building To Highlight The Backdoors Created For Hackers

This smart building was hacked by IBM researchers to show hacking risks associated with Internet of Things. IBM security researchers are warning that building automation systems used to power so-called “smart buildings” pose a security risk to companies. According to Gartner, devices in smart homes and smart commercial buildings represented 45 percent of total connected […]

Gmail to warn you if your friends aren’t using secure e-mail

Messages coming to or from non-encrypted sources will be flagged by Google. Google has confirmed a number of changes to Gmail with the arrival of two new features that will let you know if the people you’re corresponding with aren’t hip with TLS encryption. The alterations are fairly subtle: when you receive a message from, […]

IRS website attack nets e-filing credentials for 101,000 taxpayers

Breach comes a year after a previous hack compromised 300,000 people. The US Internal Revenue Service was the target of a malware attack that netted electronic tax-return credentials for 101,000 social security numbers, the agency disclosed Tuesday. Identity thieves made the haul by using taxpayers’ personal data that was stolen from a source outside the IRS, […]

10 Famous Bug Bounty Hunters of All Time

If you are following HackRead you must be aware of what is bug bounty and how it works but did you know who are the most famous Bug Bounty Hunters? Bug Bounty Programs are programs whereby an individual is rewarded by the company or website concerned after they have pointed out a bug in such website. […]

Hearthstone add-ons, cheating tools come with data-stealing malware

Attackers have disguised information-stealing and Bitcoin malware as third-party add-ons and cheats for Blizzard’s online card game. Hearthstone, a free-to-play card game based on World of Warcraft, has been indirectly targeted by malware authors. These attackers have created third-party programs that supposedly benefit Hearthstone players, but in reality can compromise their computers with malicious software. […]

How to Hack the Power Grid Through Home Air Conditioners

TENERIFE, SPAIN—THERE ARE many ways we know of to cause a blackout. You could hack industrial equipment to spin a generator out of control. You couldhijack operator machines and remotely open breakers. Or you could launch a sniper assault on substations and shoot out transformers. Now researchers have found another way to take down the […]

Vigilante Hackers Fight Lizard Squad For Control Of 150,000 Home Routers

Home routers with little to no security are far too common. They’re dangerous from a number of perspectives: as peeping holes for spying on people’s daily web use, for filtering stolen files and for launching distributed denial of service (DDoS) attacks, where the power of combined compromised machines is used to flood target websites with traffic, thereby knocking them […]

Oxford School District Victim of hacker’s “Crypto-Ransomware”

Oxford, Miss. (TLV)—Sunday, Feb 7, The Oxford School District was attacked by an “unknown hacker” using “crypto-ransomware.” OSD has shut down all servers and is currently working to resume regular operation. Crypto-ransomware is a type of malware that restricts you from using some or all of your computer until a price is paid in a […]

Steam Uses Out-of-Date Chromium Browser with Security Feature Disabled

Steam’s built-in browser runs in a no-sandbox mode. The latest version of the Steam gaming client is employing an outdated Web browser that puts users at risk due to unpatched vulnerabilities while also disabling a key security feature. After Google Project Zero security researcher Tavis Ormandy disclosed that two antivirus companies were deploying customized Chromium versions […]

Hackers leaked DHS staff records, 200GB of files are in their hands

A hacker accessed an employee’s email account at the Department of Justice and stole 200GB of files including records of 9,000 DHS staffers and 20,000 FBI employees. Yesterday, the data related a Department of Homeland Security (DHS) staff directory were leaked online, a Twitter account shared the link to an archive containing 9,355 names. The responsible […]

Hacking Microsoft SQL Server Without a Password

During a recent penetration test, I was performing some packet captures and noticed  some unencrypted Microsoft SQL Server (MSSQL) traffic.  The syntax was unmistakable.  At first I thought this might be a way to capture some authentication credentials.  However, MSSQL encrypts login traffic which meant I would have to crack the encryption to get credentials.  If […]

Brazilian companies receive more than 40,000 spam emails in infostealer campaign

Spam campaign targets Portuguese-speaking firms in Brazil and other regions to deliver malware and steal sensitive data. Symantec has observed an ongoing spam campaign targeting Brazil-based companies and other firms that use Portuguese-language computers around the globe. The attackers behind the campaign appear to be interested in obtaining access to email accounts to ultimately steal […]

Julian Assange’s 3.5-Year Detainment in Embassy Ruled Unlawful

THREE AND A half years after he sought temporary asylum in the Ecuadorean embassy in London only to find himself a captive instead, a UN group has ruled that UK and Swedish authorities unlawfully detained WikiLeaks founder Julian Assange in violation of their international human rights obligations. The UN Working Group on Arbitrary Detention said […]

Australian NSW Government Department of Resources and Energy under attack. Is it Chinese cyber espionage?

According to the NSW Government Department of Resources and Energy Chinese hackers have launched a malware-based attack on its network in December. The Australian NSW Government Department of Resources and Energy revealed that in December 2015 unknown hackers targeted its systems. In the same period, the organization was launching a number of important projects, including […]

Dell Adds Boot Scanner to Protect Users Against Bootkit Malware

Dell and Cylance join the fight against bootkits. Dell has announced a partnership with Cylance, which will add a new security layer for its line of motherboards, a BIOS integrity verification mechanism aimed at detecting corrupted boot images. Dell is just the latest company that has realized the threat that comes from bootkit malware, one of […]

Hack Like a Pro: Digital Forensics for the Aspiring Hacker

In this tutorial, we will explore where and what the forensic investigator can find information about the activities of the suspect in their web browser. It’s important to note that this information will vary by operating system and browser. Here we will look briefly at Internet Explorer and go into a bit more depth on […]

Someone (Mostly) 3-D Printed a Working Semi-Automatic Gun

FOR THE LAST three years, the evolution of firearms has been playing out all over again in plastic form: Deadly, working guns that anyone can generate with a download and a few clicks on a 3-D printer have mutated from mere individual components to a single shot pistol to a reusable rifle. Now the 3-D […]