Browsing category

Data Security

Edward Snowden joins Twitter and follows NSA

Fugitive US intelligence contractor Edward Snowden has opened an account on the social network website Twitter. His opening tweet was: “Can you hear me now?” In his profile, Mr Snowden says he “used to work for the government. Now I work for the public”. He quickly gathered thousands of followers. So far, Mr Snowden, who […]

Pirate Bay co-founder Gottfrid Svartholm Warg—aka Anakata—exits prison

Pirate Bay is online and playing a game of cat and mouse with IP regulators. Pirate Bay co-founder Gottfrid Svartholm Warg was released from a Swedish prison Saturday, three years after he began serving time for a Danish hacking conspiracy and for Swedish copyright offenses connected to the file-sharing site, The Pirate Bay. Warg hasn’t made […]

Storing secret crypto keys in the Amazon cloud? New attack can steal them

Technique allows full recovery of 2048-bit RSA key stored in Amazon’s EC2 service. Piercing a key selling point of commercial cloud computing services, computer scientists have devised a hack that allows an attacker using Amazon’s EC2 platform to steal the secret cryptographic keys of other users. The proof-of-concept attack is significant because Amazon Web Services […]

New DDoS attack uses smartphone browsers to flood site with 4.5bn requests

Researchers have found that smartphone browsers can deliver a powerful flooding attack. Researchers suspect a mobile advertising network has been used to point hundreds of thousands of smartphone browsers at a website with the aim of knocking it offline. According to distributed denial-of-service protection service CloudFlare, one customer’s site recently came under fire from 4.5 […]

Rephone lets you hack a cellular radio into anything

Yesterday at the Maker Faire in New York, we had a chance to check out the Rephone, a clever little project that comprises a bunch of modules that let you cobble together your own tiny little cell phone. Actually, making a cute little cardboard-encased phone is the least interesting thing aboutt the Rephone kit. The […]

Whatsapp Hack that Allows User to Steal Conversation

Largest Chat app for Smartphones is now at Risk whatsapp hack that allow user to steal conversation, Israeli security firm Check Point discovered a critical vulnerability of WhatsApp Web that might put at risk the 200 million users of the service. Exploiting a flaw in the system of sending vCard, the attacker can easily execute arbitrary […]

New Attacks Recall Old Problems with Browser Cookies

In case didn’t know or need a reminder, browser cookies aren’t exactly impervious to attack. The DHS-sponsored CERT at the Software Engineering Institute at Carnegie Mellon University this week dropped an alert that warns users about the continued prevalence of a class of cookie vulnerabilities that puts users’ privacy and even financial well-being at risk. […]

How hackers can access iPhone contacts and photos without a password

Once again, fully patched iPhone lock screens can be bypassed with a few keystrokes. iPhone users have yet another screenlock bypass vulnerability to watch out for, according to a new video demonstration that shows how the bug can be exploited to gain unauthorized access to photos and contacts. The hack reportedly works on iOS version […]

Kovter Malware Now Lives Solely in the Windows Registry

Symantec’s researchers have discovered a new version of the Kovter trojan, which now mimics the Poweliks malware and is able to live on your computer’s registry, without needing to be stored on your hard drive. Kovter, first spotted in 2013, has been one of the most updated malware families around, constantly changing its MO, adapting […]

Lenovo Laptops and Computers Come with Pre-Installed Spyware

Lenovo has been caught, yet again, installing apps on its laptops and workstations without the user’s consent or knowledge, as Michael Horowitz from Computerworld reports. This is not the first time Lenovo has done this, as earlier this year, in February, security experts found that the company installed the Superfish Visual Discovery software on PCs, […]

An Introduction to Hardware Hacking: the RIPE Atlas probe

RIPE NCC is building the largest Internet measurement network ever made. RIPE Atlas employs a global network of probes that measure Internet connectivity and reachability, providing an unprecedented understanding of the state of the Internet in real time. RIPE provide anyone who is interested with a probe that can be connected to a network and […]

Exploit broker offers $1 million for reliable iOS 9 exploit

Here’s a treat for hackers and security researchers who don’t mind selling information about zero-day vulnerabilities to the highest bidder: Zerodium, the zero-day vulnerability and exploit acquisition firm recently launched by VUPEN founder Chaouki Bekrar, is offering a million dollars for “an exclusive, browser-based, and untethered jailbreak for the latest Apple iOS 9 operating system […]

Soon, you may not be able to delete WhatsApp messages for 90 days

Govt mulls a policy that requires users to save messages, and hand them over to law enforcement agencies, if asked. Deleting WhatsApp messages might become difficult in India in the days to come. The government is planning to bring a policy under which an individual will be required to store the plain texts of the […]

Bitcoinist Weekly News Re-Hash: BitPay Hack, California Bitcoin Bill Dies

After two weeks of sharp, last minute changes in the Bitcoin price, the markets caught a break this week, with the price remaining fairly stable throughout. Thus, it seems as if the speculators have finally settled down. This, combined with this week’s relatively slow news week, explains the sideways action that persisted throughout the week. […]

How malware finally infected Apple iOS apps: XCodeGhost

Hackers can’t easily get malware directly in iOS apps so they’re taking a different approach: Modifying the programming environment that Apple provides to make apps. Google’s open approach to Android apps have led to several malware issues over the past few years, while Apple users have remained relatively unscathed. Not any more. At least 39 […]

Hackers Hold Silicon Valley’s Hometown Newspapers Hostage

Sometime yesterday, 17 September, hackers took over the websites of Silicon Valley’s Embarcadero Media Group, publisher of the Palo Alto Weekly, theAlmanac, the Mountain View Voice, the Pleasanton Weekly, and Palo Alto Online. The group’s newspapers and websites are a key source of local news for Silicon Valley residents, and the Palo Alto Weekly is […]

Hack Brief: Malware Sneaks Into the Chinese iOS App Store

THE APPLE ECOSYSTEM is well known for very rarely letting any dodgy apps enter it because of the company’s stringent security checks. But recently, nearly two dozen malicious pieces of software managed to get hosted on the App Store, and subsequently downloaded by Chinese users. This is because attackers found an unorthodox route to exploit: […]

Remove Libraries, Network, Homegroup and other links from File Explorer

When you open File Explorer in Windows 10, the system’s default file browsing and management tool, you will notice immediately that it displays two panes in the main interface. The left pane lists mostly hardcoded links to system locations such as Libraries, This PC, Network, Homegroup, One Drive or Quick Access while the right the […]

3D printed TSA Travel Sentry keys really do open TSA locks

Last year, the Washington Post published a story on airport luggage handling that contained unobscured images of the “backdoor” keys of the Transportation Safety Administration, along with many other security agencies around the world, used to gain access to luggage secured with Travel Sentry locks. These locks are designed to allow travelers to secure their suitcases […]