You Are Browsing ‘Hacking and Secruity News’ Category

GameStop Corp.  is now saying  that they are  investigating reports that hackers may have siphoned credit card and customer data from its website  gamestop.com. So now if you need another reason to stay away from GameStop here is the best one yet.       “GameStop recently received notification from a third party that it believed payment card data from cards used on the GameStop.com website was being offered for sale on a website,” a company spokesman commented on the issue .   Sources think  that the compromised...

Do we need any more reasons not to trust our government, especially the CIA. Well thanks to Wiki Leaks we now have just one more reason not too and it is called Grasshopper According to the leaked information, Grasshopper framework allows the agency members to easily create custom malware. The Grasshopper framework will automatically put together the components sufficient for attacking a Windows machine, and once the target is selected the framework then puts together an installer that CIA agency members can use to install custom malware...

FBI Director James Comey offered up a little security tip: cover your webcam. This is no laughing matter, Comey said that nearly every computer in every government building has a webcam cover in order to prevent “unauthorized” people from spying on federal employees. “There’s some sensible things you should be doing, and that’s one of them. You go into any government office and we all have the little camera things that sit on top of the screen. They all have a little lid that closes down on them. You do that so that people who...

How to Hack Computer Monitors? (adsbygoogle = window.adsbygoogle || []).push({}); According to the researchers, an attacker first needs to gain physical access to the monitor’s USB or HDMI port which would then help the attacker access the firmware of the display. The duo said they discovered the hack by reverse-engineering a Dell U2410 monitor, though it was not an easy process, as it took over two years. In the process, the pair found out that Dell had not implemented any security measures with regard to the process...

(adsbygoogle = window.adsbygoogle || []).push({}); Recently a few white hat hackers are Integrity have been very busy hacking Uber. What they ran across is quite scary. Hackers can hack into Uber and track where you are going. To gather  information about Uber sub domains they need to do a  dns brute-force.  Possible to View Driver Waybill via Driver UUID Using the previous vulnerability they were able to test a new functionality called waybill. By crafting the request that the app sends, they then notice that it has a...

Posted on Apr 14 2016 - 11:50pm by TekGuru
#0

  Cyber Bombs (adsbygoogle = window.adsbygoogle || []).push({}); A few days ago, the US Pentagon has announced that the US Army has released “Cyber Bombs” on ISIS. What are this Bombs, is Cyber Attack is an effective strategy? What are Cyber Bombs? We don’t know what exactly are this are, but we have 3 educated guesses: Precise, Simple & Remote attacks. Precise – DDOS Attacks: “Precision DDOS” attacks, just like GBU Bombs, are probably a very accurate & advanced attacks on...

Did you install the latest update OS X 10.11.4? If yes, then you might vulnerable to a exploit that is so easy it can fit in one single tweet. Hacking an iphone has never been so easy. The exploit code shown below is as follows: ln -s /S*/*/E*/A*Li*/*/I* /dev/diskX;fsck_cs /dev/diskX 1>&-;touch /Li*/Ex*/;reboot The above code actually expands to: ln -s /System/Library/Extensions/AppleKextExcludeList.kext/Contents/Info.plist /dev/diskX fsck_cs /dev/diskX 1>&- touch /Library/Extensions/ Reboot (adsbygoogle...

(adsbygoogle = window.adsbygoogle || []).push({}); Hackers are at it again, this time they are targeting android phones. If you receive a random text messaging asking you to click on a link you do not recognize, it will be best that you do not do so. A norwegian security firm has recently  detected a nasty piece of malware that spreads via SMS and tricks users into downloading a malicious app.  This app gains administrator rights to the device; the malware is being called Mazar Android BOT and it spreads via SMS and MMS...

Most of us just hear hackers hacking into computers to do malicious activities. However,a hacker or hacker group is  now doing just the opposite. Recently  the Dridex Banking Torjan got compromised by some unknown white hat hacker or hacker group whom replaced the malicious links with Avira Antivirus Installers. Dridex malware – also known as Bugat and Cridex...

Posted on Jan 6 2016 - 3:22am by TekGuru
#1

A new Ransomware-as-a-service, that is written in JavaScript and is able to infect Mac, WIndows, and Linux. This new ransomware has been dubbed ransom32, and its the first one to infect all 3 OS. Ransom32 allows its operators to deploy the malware very quickly and easily. It is easy to use and comes with a dashboard that lets the operators designate custom Bitcoin...