Browsing category

Incidents

Operator of Online Payment Company Indicted for Stealing From Customers

Crook stole $22 million via online payments company. Gareth David Long, 37, a British man living in Las Vegas, USA, was indicted by a Nevada grand jury on 39 charges of wire fraud, money laundering, and aggravated identity theft. Long’s criminal activity started in 2008 when he founded V Internet Corp LLC, a third-party payments processing […]

Imgur’s Video to GIF Feature Abused to Send Spam and Shut Down the Service

Researchers earned $2,000 for his discovery. Imgur’s staff have closed a critical security issue that allowed attackers to use its service to send spam and even shut down some features of its service. Ukrainian security researcher Eugene Farfel (aesteral) brought the issue to Imgur’s attention via the company’s bug bounty program hosted on the HackerOne bug […]

This Chrome Extension is stealing bitcoins from users

BitcoinWisdom Ads Remover extension for Chrome is reportedly stealing bitcoins from users. Bitstamp, a bitcoin exchange portal based in Slovenia, has issued a warning to users of a Google Chrome extension which steals bitcoin while making a transfer. BitcoinWisdom Ads Remover Chrome extension available Chome webstore, flaunts itself as ad removerfrom the BitcoinWisdom.com, a website for consulting all […]

Typos stopped hackers stealing $1bn from Federal Reserve Bangladesh account

Hackers who allegedly infiltrated the Federal Reserve Bangladesh’s account were attempting to steal almost $1 billion, but typos thwarted the plan. This week the principal news agencies shared the news of the hack of the Bangladesh account at the Federal Reserve Bank of New York. The Bangladesh’s Finance Minister Abul Maal Abdul Muhith accused the U.S. Federal […]

The majority of CCTV cameras can be easily hacked

Your CCTV camera might make you feel physically safer, but after reading this article, it will sure make you feel virtually vulnerable. New research from cloud-based video surveillance company Cloudview suggests that the majority of CCTV systems can be hacked, providing an open door to cyber attackers. The report, entitled Is your CCTV system secure […]

One of the greatest art heists of our time was actually a data hack

The story behind the Nefertiti Hack just got a lot stranger. But is it a hoax? Last month, two artists grabbed headlines across the world by announcing that they had snuck a hacked Kinect Sensor into the Neues Museum in Berlin and done a guerrilla 3D scan of the bust of Queen Nefertiti, a precious artwork from […]

Phishers are creating YouTube channels to document their attacks

Phishing attacks have linked back to YouTube channels where phishers explain their attacks and promote their tools while looking for buyers. Symantec recently discovered a phishing site for Amazon.com which didn’t seem particularly noteworthy at first. However, looking at the HTML source revealed an interesting comment from the attacker. The following figure shows a “brag […]

Internet-Connected Trucks Can Be Tracked and Hacked, Researcher Finds

Insecure configurations expose car telematics to hacking. Industrial vehicles like trailer trucks, delivery vans, or buses that have an Internet connection, can be tracked, and even hacked, if they use insecure and improperly-configured TGUs (Telematics Gateway Units), security researcher Jose Carlos Norte claims. TGU devices, or telematics, are basically a portable 3G, 4G, GPRS, LTE, Edge, […]

Operation Transparent Tribe targets Indian diplomats and military

ProofPoint uncovered a new cyber espionage campaign dubbed Operation Transparent Tribe targeting Indian diplomatic and military entities. A new cyber espionage campaign dubbed Operation Transparent Tribe is targeting diplomats and military personnel in India. The researchers at Proofpoint who have uncovered the hacking campaign confirmed that threat actors used a number of hacking techniques to hit the […]

New attack steals secret crypto keys from Android and iOS phones

Researcher-devised exploit threatens Bitcoin wallets and other high-value assets. Researchers have devised an attack on Android and iOS devices that successfully steals cryptographic keys used to protect Bitcoin wallets, Apple Pay accounts, and other high-value assets. The exploit is what cryptographers call a non-invasive side-channel attack. It works against theElliptic Curve Digital Signature Algorithm, a crypto […]

US DoD invites a restricted number of hackers to Hack the Pentagon

Hack the Pentagon – DoD would invite outside hackers to test the cybersecurity of some public US Defense Department resources as part of a pilot initiative. Which is the best way to discover security vulnerabilities affecting a computer system? Ask a group of hackers to test it. This is the concept behind a bounty program, […]

33 percent of all HTTPS websites open to DROWN attack

Security experts presented the DROWN attack that exploits a new critical security vulnerability affecting the OpenSSL. Security experts have discovered a new critical security vulnerability affecting the OpenSSL, it has been estimated that more than 11 Million websites and e-mail services are open to cyber attacks. The new attack, dubbed DROWN (stands for Decrypting RSA with […]

Payroll data leaked for current, former Snapchat employees

Incident occurred after employee responded to e-mail phish scam. In a blog post on Sunday, Snapchat executives revealed that the payroll data of some current and former employees was exposed as the result of a scam e-mail sent to a human resources employee at the company. “The good news is that our servers were not breached, […]

Discover how many ways there were to hack your Apple TV

Apple has patched more than 60 vulnerabilities affecting the Apple TV, including flaws that can lead to arbitrary code execution and information disclosure. IoT devices are enlarging our attack surface, we are surrounded by devices that manage a huge quantity of information and that could be abused by hackers. Apple has patched more than 60 […]

Group Behind the Sony Hack Is More Dangerous Than Previously Thought

Researchers blow the lid on one of the most dangerous and well-organized cyber-espionage groups around. Only after four different cyber-security firms teamed up, did security analysts manage to understand how efficient, organized, vast, and powerful the group behind the Sony Pictures hack truly is. Working together, security experts from AlienVault, Kaspersky, Novetta, and Symantec, along […]

Anonymous hacked the France’s Ministry of Defense portal CIMD (Centre d’Identification des Materiels de la Defense)

Anonymous hacked the CIMD portal managed by the France’s Ministry of Defense to protest against French foreign arms trade operations. The Anonymous collective has hacked one of the websites managed by the France’s Ministry of Defense, the CIMD (Centre d’Identification des Materiels de la Defense). The hacktivists accessed the database and leaked it online to […]

HTTP GZIP Leaks Data on the General Location of Tor Websites

Some Tor servers may leak timezone info via gzipped files. Jose Carlos Norte, developer for the eyeOS virtual desktop project, has discovered an obscure setting in the HTTP GZIP compression format that may help authorities identify the timezone and general location of a Tor-based server. A long time ago, Web servers started supporting the compression of […]

Anonymous took down several government websites of Saudi Arabia

Anonymous launched a series of cyber attacks against government websites of Saudi Arabia to protest the execution of 47 people, including Mr. Sheikh Nimr Al Nimr. The Anonymous collective is conducting a hacking campaign against the Saudi Arabian Government to protest executions of 47 people. On January 2nd, the Government announced the executions on terrorism charges, among the […]

Man admits he stole nude celebrity pics from Apple and Gmail accounts

Phishing scheme gained illegal access to accounts storing 161 nude images. An Oregon man has admitted he tricked hundreds of people into divulging their Apple and Gmail passwords in a scheme that allowed him to steal nude images of more than a dozen victims, some of them celebrities. Andrew Helton, 29, of Portland, entered the plea […]

Comodo Internet Security opened your PC to attackers

Comodo Internet Security, in the default configuration, installs an application called GeekBuddy that also installs a VNC server enabled by default. The hackers of the Google Project Zero Team have found another serious security issue in the Comodo’s protection software, it is a VNC server enabled by default with a password easy to guess. It is […]