Browsing tag

hack

Netflix Hacked? Netflix accounts reactivated and user’s credit cards charged

There are reports of charges to users who had canceled their accounts for months. Hackers have exploited Netflix’s data retention policies to reactivate canceled customer subscriptions and steal their accounts according to cyber security awareness experts. Former subscribers mention that their accounts were reactivated and their bank accounts were charged, this after months of having […]

Hackers Stole 7.5TB Of Secret Data From Russia’s Intelligence Agency

It appears that the hackers got hacked this time! According to BBC Russia, hackers have managed to steal data from Russia’s Federal Security Service (FSB). The attackers managed to steal about 7.5 terabytes of data from a major FSB contractor, thus exposing the secret projects the agency was working on to de-anonymize Tor browsing, scrape […]

NASA Lab Hacked Using A $25 Raspberry Pi Computer

Raspberry Pi is a teeny-tiny device that can be tinkered with to gain deceptively high capabilities. This has been proved by a recent report which confirmed that a NASA lab was hacked using a Raspberry Pi. The breach occurred in April 2018 where NASA’s Jet Propulsion Laboratory (JPL) was hacked and 500MB of data from […]

Hackers Threaten To Release Stolen Data Related to 9/11 Attacks

In an announcement posted on Pastebin, the hacker group TheDarkOverlord told that it has been successful in breaching law firms that handle cases related to 9/11 attacks. The group has threatened to release (archived Tweet link) the secret files that provide answers to 9/11 “conspiracies.” A spokesperson from Hiscox Syndicates, one of the firms overlooking the […]

Hack the Air Force 3.0 – New vulnerability bounty program

This is the third computer error-reporting rewards program launched by the US Armed forces The United States Air Force launched its third vulnerability bounty program earlier this week, called ‘Hack the Air Force 3.0’, in collaboration with HackerOne, report specialists in digital forensics at the Institute International cyber security. “The Air Force appreciates the interest […]

How to hack with WebEx

A flaw in WebEx allows you to access the complete scheme of a company. Some time ago, Karl Fosaaen, an expert in digital forensics published a very interesting research on federated services and Skype for Companies. One of the attack vectors was to be able to access the address books of other companies and send […]

Newegg Inc. Suffers Hack, Credit Card Data Stolen

Newegg Inc., the leading online electronics retailer, has suffered a massive hack, with credit card data being stolen in large numbers. It was an attack by the Magecart group that had caused the data breach, involving stealing of credit card data used for customer payments for over a month. In fact, with this attack, newegg.com […]

How to hack a doorbell

A group of entrepreneurs hacked the doorbell of their office using services such as Slack, MessageBird and Now Mollie is a technology company dedicated to payment processing; currently serving more than 50K customers and each day have more employees. When the company reached 80 employees last April, some of its activities were transferred to a new […]

Black Hat 2018: A Pacemaker Hack That Can Stop The Heart

Hackers from all over the world flocked to the Black Hat 2018 security conference that was held in Las Vegas this week. There, two researchers revealed a pacemaker hack that makes it possible for attackers to remotely install malicious updates. It causes the device to malfunction by delivering additional shocks or denying it which can […]

Several WiFi devices could be affected by new WPA/WPA2 attack

WPA/WPA2 protocols are potentially affected by the new hack Enterprise network security researchers have recently discovered a new attack on WiFi (WPA/WPA2) protected access protocols, security standards aimed to make wireless network connection safer. Experts accidentally discovered the attack when testing the new WPA3 security standard, recently announced. What makes this different from the previous attacks against WPA […]

New Ways to Hack Amazon Alexa and Google Home Assistants

A joint work of Chinese and American information security professionals found a new method to attack smart personal assistants like Amazon Alexa and Google Home, whom they called “squatting voice”. The experts detailed the technique in a recently published research paper, along with another method of attack called voice masking. Malicious actors try to trick […]

Hack Google Inbox with a new Spoofing vulnerability

Almost a year ago, on May 4, 2017, information security researcher privately discovered and reported a spoofing vulnerability of the recipient in Google Inbox. The expert noticed that the composition box always hid the email addresses of named recipients without providing a way to inspect the actual email address, and discovered how to abuse this […]

Hackers Could hack Cisco WebEx with a malicious Flash file

Cisco has issued a critical patch to fix a serious vulnerability (CVE-2018-0112) in its WebEx software that could be exploited by remote attackers to execute arbitrary code on target machines via weaponized Flash files; information security experts said that you must install the patch as soon as possible. The vulnerability affects both client and server versions of […]

How to hack active directory with Icebreaker?

Icebreaker Automates network attacks against Active Directory to deliver you plaintext credentials when you’re inside the network but outside of the Active Directory environment. Cyber security researchers explain that Icebreaker perform 5 different network attacks for plaintext credentials as well as hashes. Autocracks hashes found with JohnTheRipper and a custom 1 million password wordlist specifically for Active […]

How to hack using PARAT- Remote Access Trojan (RAT)?

According to cyber security specialist; a Remote Access Trojan (RAT) is a type of malware that controls a system via a remote network connection as if by physical access. While desktop sharing and remote administration have many legal uses, RAT is usually associated with criminal or malicious activity. A RAT is installed without the victim’s knowledge and […]

​Linux and Intel slowly hack their way to a Spectre patch

Fixing the chip security holes Meltdown and Spectre will take a long, long time, but Linus Torvalds and Intel developers are slowly moving to answers for Linux. Spectre and Meltdown are major design flaws in modern CPUs. While they’re present in almost all recent processors, because Intel chips are so widely used, Intel is taking […]

Intel Chips Vulnerable To Hack

One of the biggest names in IT industry, Intel, has verified a report stating that some microprocessors have been built containing flaws in their design, leaving them vulnerable to hacking . According to reports, every computer that contains microprocessors of Intel from the last decade seems to be affected due to a ‘bug’ that enables […]

Hackers Use Triton to Hack Into Power Station Security Systems

Recently, Triconex Industries was put at risk when hackers attempted to hack into its security systems, trying to control things. These attacks have a pattern. They are made on gas and oil industries. When traced, several hack attempts were made in various industries but the first attack was reported in the Middle East, experts are […]

HOW TO PROTECT YOURSELF AFTER THE NEXT BIG CORPORATE HACK

AT THIS POINT, it’s safe to assume that everyone’s been affected by one megabreach or another. But when the next Equifax debacle happens, know that there’s plenty you can do to help dampen the fallout. When a big company that has your personal information—like passwords or credit card numbers—gets hacked, it means, in a way, that […]