Facebook bounty hunter Laxman Muthiyah from India has recently discovered his third bug of this year in the widely popular social network website that just made a new record by touching 1 Billion users in a single day.
28.8.15
27.8.15
13.8.14
Snowden reveals automated NSA cyberwarfare program
The U.S. National Security Agency has a cyberwarfare program that hunts for foreign cyberattacks and is able to strike back without human intervention, according to NSA leaker Edward Snowden.
7.8.14
Stealthy malware 'Poweliks' resides only in system registry
A new malware program called Poweliks attempts to evade detection and analysis by running entirely from the system registry without creating files on disk, security researchers warn.
5.8.14
Researchers to name the most hackable cars at Black Hat
A report to be presented this week at the Black Hat USA conference in Las Vegas will detail which vehicles are most vulnerable to hacker attacks via a car's Bluetooth, telematics or on-board phone applications.
PF Chang's hack hit 33 restaurants for 8 months
The hack of credit-card-processing terminals at PF Chang's hit 33 of the company's locations across the U.S. and continued for around eight months, the company said Monday.
2.8.14
Attackers can easily create dangerous file-encrypting malware
A new program that encrypts files to extort money from users highlights that attackers don't need advanced programming skills to create dangerous and effective ransomware threats, especially when strong encryption technology is freely available.
CIA admits to spying on Senate committee
The Central Intelligence Agency on Thursday admitted that it improperly gained access to computers used by the Senate Intelligence Committee to prepare a report on a CIA detention and interrogation program.
Attackers exploit remote access tools to compromise retail systems
Malicious hackers are taking advantage of commonly used enterprise remote access tools to break into retail point-of-sale (POS) systems and plant malware on them, the U.S. Department of Homeland Security warned Thursday.
31.7.14
Android busted for carrying Fake ID
Google Android allows malware to masquerade as legit, trusted apps thanks to weaknesses in the way the operating system checks digital certificates of authenticity.
30.7.14
Canada accuses China of hacking into National Research Council
Canada has accused China of hacking into government servers and attempting to steal information.
BlackBerry plans to focus on security for the enterprise
Now that BlackBerry has fallen significantly behind Apple and Google in the race to offer features and third-party apps for its smartphones, the company is concentrating on providing devices that, it claims, have the strongest available security -- the killer feature for the enterprise.
At a company-sponsored symposium in New York Tuesday, BlackBerry executives made the case that the company's devices and services could offer levels of security for enterprises mobile devices that can not be replicated on Apple, Android or other mobile devices.
29.7.14
Hackers have stolen user data and demand money
Hackers have stolen user contact information, including email addresses and phone numbers, from the website of the European Central Bank and attempted to extort money from the institution.
The attackers exploited a vulnerability to access a database serving the ECB's public website, the institution announced Thursday on its website. No internal systems or market sensitive data were affected, the ECB said.
27.7.14
Russian government will pay for a way to ID Tor users
The Russian Ministry of Interior is willing to pay 3.9 million roubles which is around $111,000, for a method to identify users on the Tor network.
The Tor software anonymizes Internet traffic by encrypting it and passing it through several random relays in order to prevent potential network eavesdroppers from identifying the traffic's source and destination. The software was originally developed as a project of the U.S. Naval Research Laboratory, but is now being maintained by a nonprofit organization called The Tor Project.
Zero-Day Vulnerabilities Identified in Tails Operating System
The critical zero-day security flaws has been discovered in the privacy and security dedicated Linux-based operating system “Tails” that could be used by an attacker to unmask your identity.