Just 24 Hours! Teen Hacker Jailbreaks Apple iPhone 7
Short Bytes: Not even a month has passed since the release of the Apple iPhone 7 and the iOS 10. And, a 19-year-old hacker, known as qwertyoruiop, has managed toRead More →
Short Bytes: Not even a month has passed since the release of the Apple iPhone 7 and the iOS 10. And, a 19-year-old hacker, known as qwertyoruiop, has managed toRead More →
Why is it critical to stop ransomware at the gateway layer? Because email is the top entry point used by prevalent ransomware families. Based on our analysis, 71% of known ransomware familiesRead More →
Ian Mellul used Gmail (exposed in Adobe breach) to plan travel for First Lady, Biden.On September 21, a dump of an e-mail account belonging to a White House contractor wasRead More →
A U.S. investigation into a leak of hacking tools used by the National Security Agency is focusing on a theory that one of its operatives carelessly left them available onRead More →
Researchers have found a new strain of document-based macro malware that evades discovery by lying dormant when it detects a security researcher’s test environment. The malware, according to researcher CalebRead More →
Short Bytes: A recent study has suggested that people are inclined towards popping any random USB stick into their computers without a second thought. Interestingly, the Aussie hackers are exploitingRead More →
Following an investigation by Pen Test Partners, British Telecom (BT) has released a firmware upgrade for their popular range of Wi-Fi extenders. The investigation uncovered vulnerabilities within the firmware whenRead More →
Supposedly hacked data surfaced on underground website for sale in August. In August, a dealer in stolen data who goes by the online moniker “Peace”—the person or persons who previously soldRead More →
Malware is infesting a growing number of IoT devices, but their owners may be completely unaware of it. Malware targeting the Internet of Things (IoT) has come of age andRead More →
A Check Point report suggests organisations’ security hasn’t kept pace to meet a ninefold rise in malicious software. An exponential rise in malware means employees are at their highest-ever riskRead More →
Last week, KrebsOnSecurity detailed how BackConnect Inc. — a company that defends victims against large-scale distributed denial-of-service (DDoS) attacks — admitted to hijacking hundreds of Internet addresses from a EuropeanRead More →
Hacking SQL servers is fun. Early this year, I blogged about hacking SQL servers without a password. I used Ettercap to perform a man-in-the-middle attack between a Microsoft SQL serverRead More →
Terbium Labs’ software can now be used to detect when data belonging to companies is being flogged in the underground. Terbium Labs has announced the release of Dark Web dataRead More →
The website for Just For Men, a company that sells various products for men as its name implies, was serving malware to its visitors. Our automated systems detected the drive-byRead More →
InfoArmor has identified a special tool used by cybercriminals to distribute malware by packaging it with the most popular torrent files on the Internet. The bad actors have analyzed trendsRead More →
In the past, we’ve seen superuser rights exploit advertising applications such as Leech, Guerrilla, Ztorg. This use of root privileges is not typical, however, for banking malware attacks, because moneyRead More →
FBI says it’s impossible but Cambridge computer security expert proves them wrong. Passcodes on iPhones can be hacked using store-bought electronic components worth less than $100 (£77), according to oneRead More →
A start-up alerts organizations when their sensitive information pops up for sale online. When police officers respond to a theft or a mugging, they’ll usually ask for the serial numbersRead More →
Hackers are increasingly targeting healthcare institutions with malware because of their poor cyber-security posture, reliance on legacy IT systems, third-party services and the need to access information as soon asRead More →
With several months of in-depth research on Tesla Cars, we have discovered multiple security vulnerabilities and successfully implemented remote, aka none physical contact, control on Tesla Model S in bothRead More →