The Hacker News | Biggest Information Security Channel

17-Year-Old Found Bugs in WhatsApp Web and Mobile App

17-Year-Old Found Bugs in WhatsApp Web and Mobile App

Last week, the most popular mobile messaging application WhatsApp finally arrived on the web — d...
Ultra-secure Blackphone Vulnerability lets Hackers Decrypt Texts

Ultra-secure Blackphone Vulnerability lets Hackers Decrypt Texts

The makers of ultra secure BlackPhone titled by Silent Circle as, " world’s first Smartpho...
Critical GHOST vulnerability affects most Linux Systems

Critical GHOST vulnerability affects most Linux Systems

A highly critical vulnerability has been unearthed in the GNU C Library (glibc) , a widely used ...
Apple OS X Yosemite 10.10.2 Update to Patch years-old Thunderstrike vulnerability

Apple OS X Yosemite 10.10.2 Update to Patch years-old Thunderstrike vulnerability

Apple is preparing to release the second update to OS X Yosemite in the coming days to its cust...
Android Wi-Fi Direct Vulnerability Lets Hackers to Kick your Devices OFF

Android Wi-Fi Direct Vulnerability Lets Hackers to Kick your Devices OFF

Security researchers from Core Security has reportedly found a Denial of Service ( DoS ) attack...
Hackers can Spoof AT&T Phone Messages to steal your Information

Hackers can Spoof AT&T Phone Messages to steal your Information

Bad news for AT&T customers! You all are vulnerable to phishing scams – thanks to AT&T&#...
Google Apps Flaw Allowed Hacker to Hijack Account and Disable Two-factor Authentication

Google Apps Flaw Allowed Hacker to Hijack Account and Disable Two-factor Authentication

A critical cross-site scripting ( XSS ) vulnerability in the Google Apps administrator console ...
Oracle releases 169 Updates, Including 19 Patches for JAVA Vulnerabilities

Oracle releases 169 Updates, Including 19 Patches for JAVA Vulnerabilities

Get Ready to update your Java program as Oracle has released its massive patch package for mult...
Two Million Cars Using Wireless Insurance Dongle Vulnerable to Hacking

Two Million Cars Using Wireless Insurance Dongle Vulnerable to Hacking

2015 will be a year more smarter than 2014 with smarter mobile devices, smarter home appliances, and...
GoDaddy Vulnerability Allows Domain Hijacking

GoDaddy Vulnerability Allows Domain Hijacking

An Internet domain registrar and web hosting company GoDaddy has patched a Cross-Site Request Fo...
Verizon FiOS app vulnerability Exposes 5 MILLION Customers' Email Addresses

Verizon FiOS app vulnerability Exposes 5 MILLION Customers' Email Addresses

A critical vulnerability discovered in Verizon 's FiOS mobile application allowed an attack...
Google vs. Microsoft — Google reveals Third unpatched Zero-Day Vulnerability in Windows

Google vs. Microsoft — Google reveals Third unpatched Zero-Day Vulnerability in Windows

Microsoft has heavily criticized Google and its 90-days security disclosure policy after the fir...
Instagram Patches flaw that Makes Private Photos Visible

Instagram Patches flaw that Makes Private Photos Visible

Your Instagram is not as Private as You Think. Millions of private Instagram photos may have be...
Got a Smartphone with Android 4.3 or earlier? No WebView Vulnerability Patch for You

Got a Smartphone with Android 4.3 or earlier? No WebView Vulnerability Patch for You

Owning a smartphone running Android 4.3 Jelly Bean or an earlier versions of Android operating...
Google Discloses Another Unpatched Windows 8.1 Vulnerability

Google Discloses Another Unpatched Windows 8.1 Vulnerability

Google has once again released the details of a new privilege escalation bug in Microsoft's ...
Corel Software DLL Hijacking Vulnerability Allows Hackers to Execute Malicious Code

Corel Software DLL Hijacking Vulnerability Allows Hackers to Execute Malicious Code

Security researchers have disclosed local zero day DLL hijacking vulnerabilities in several app...
Website Backdoor Scripts Leverage the Pastebin Service

Website Backdoor Scripts Leverage the Pastebin Service

The popular copy and paste website ' Pastebin ' created a decade ago for software develo...
Thunderstrike — Infecting Apple MacBooks with EFI Bootkit via Thunderbolt Ports

Thunderstrike — Infecting Apple MacBooks with EFI Bootkit via Thunderbolt Ports

A security researcher has discovered an easy way to infect Apple’s Macintosh computers with an u...
Google Researcher Reveals Zero-Day Windows 8.1 Vulnerability

Google Researcher Reveals Zero-Day Windows 8.1 Vulnerability

A Google security researcher, ' James Forshaw ' has discovered a privilege escalation vu...
Hacking Facebook Accounts Using Android 'Same Origin Policy' Vulnerability

Hacking Facebook Accounts Using Android 'Same Origin Policy' Vulnerability

A serious security vulnerability has been discovered in the default web browser of the Android O...