The Hacker News — Most Popular Cyber Security, Hacking News Site: Vulnerable

Hacking Instagram Accounts using OAuth vulnerability

Hacking Instagram Accounts using OAuth vulnerability

May 02, 2013Mohit Kumar
' Nir Goldshlager ' known as Facebook hacker and founder of Break Security  , who reported many critical bugs in Facebook OAuth ...
New Apache backdoor serving Blackhole exploit kit

New Apache backdoor serving Blackhole exploit kit

April 27, 2013Mohit Kumar
A new sophisticated and stealthy Apache backdoor meant to drive traffic to malicious websites serving Blackhole exploit kit widely has b...
Apple App Store was vulnerable for more than Half year

Apple App Store was vulnerable for more than Half year

March 10, 2013Wang Wei
A Google developer helps Apple to fixed a security flaw in its application store that for years has allowed attackers to steal passwords and...
Security firm Bit9 hacked, Stolen Digital Certs Used To Sign Malware

Security firm Bit9 hacked, Stolen Digital Certs Used To Sign Malware

February 09, 2013Mohit Kumar
Bit9 disclosed Friday that hackers had stolen digital code signing certificates from its network and have utilized it to sign malware. Bit9,...
Flaw in Intel Ethernet controller exposes to 'packet of death' attack

Flaw in Intel Ethernet controller exposes to 'packet of death' attack

February 08, 2013Anonymous
The hardware qualification is a very important issue, recent vulnerabilities discovered in network appliances of various manufacturer have...
Chinese malware campaign 'Beebus' target US defense industries

Chinese malware campaign 'Beebus' target US defense industries

February 06, 2013Wang Wei
A Chinese malware campaign called ' Beebus ' specifically targeting the aerospace and defense industries has been uncovered by FireE...
The use of passwords in a technological evolution

The use of passwords in a technological evolution

January 17, 2013Anonymous
Every day we read about an incredible number of successful attacks and data breaches that exploited leak of authentication mechanisms ...
Cisco Linksys routers vulnerable to remote zero-day exploit

Cisco Linksys routers vulnerable to remote zero-day exploit

January 16, 2013Mohit Kumar
A zero-day vulnerability has been discovered in popular Cisco Linksys routers that allows hackers to gain remote root access. Security ven...
Running Desktop Apps on Windows RT, The Hackers Way!

Running Desktop Apps on Windows RT, The Hackers Way!

January 08, 2013Wang Wei
A hacker claims to have found a method in the code integrity mechanism in Windows RT, that allow one to bypass security mechanism preventi...
Internet Explorer 6, 7 and 8 vulnerable to remote code execution

Internet Explorer 6, 7 and 8 vulnerable to remote code execution

December 31, 2012Mohit Kumar
Last Friday, we reported that the website of the U.S. Council of Foreign Relations was allegedly compromised by Chinese hackers who exp...
Facebook Camera App Vulnerable to Man in The Middle Attack

Facebook Camera App Vulnerable to Man in The Middle Attack

December 26, 2012Mohit Kumar
Egypt-based security researcher reported that Facebook Camera App for mobiles are Vulnerable to Man in The Middle Attack , that allow an ...
iPhone Instagram users vulnerable to hackers

iPhone Instagram users vulnerable to hackers

December 03, 2012Mohit Kumar
Instagram - Facebook’s popular photo sharing app for iOS, is currently has a vulnerability that could make your account susceptible to hac...
Ministry of Justice of Qatar vulnerable to hackers

Ministry of Justice of Qatar vulnerable to hackers

December 02, 2012Mohit Kumar
Hacker Going by name "human mind cracker" discovered SQL injection vulnerability in official website of Ministry of Justice of Qat...
Inj3ct0r Team found XSS Vulnerability on MSN website

Inj3ct0r Team found XSS Vulnerability on MSN website

November 14, 2012Mohit Kumar
A particular class of attacks commonly referred to as “code insertion” and often “ Cross-Site Scripting ” has become increasingly popu...
PayPal Bug Bounty Program - playing fair ?

PayPal Bug Bounty Program - playing fair ?

November 13, 2012Mohit Kumar
Bug Bounty program, where white hat hackers and researchers hunt for serious security vulnerabilities and disclosing them only to the v...
XSS Vulnerability in Apple website

XSS Vulnerability in Apple website

November 13, 2012Mohit Kumar
A 16 years old Spanish Whitehat hacker going by name " The Pr0ph3t " found XSS Vulnerability on Apple website. The Vulnerabili...
Airline, Myspace, Banks, Government websites vulnerable to Hackers

Airline, Myspace, Banks, Government websites vulnerable to Hackers

November 04, 2012Mohit Kumar
Cross Site Scripting (XSS) is currently the most common vulnerability in the world. This is vulnerability of some host which allows an...
NASA Jet Propulsion Laboratory Vulnerable to Cross Site Scripting (XSS)

NASA Jet Propulsion Laboratory Vulnerable to Cross Site Scripting (XSS)

October 27, 2012Mohit Kumar
Yesterday, we report about the security breach in US Government computers belongs to NASA  restricted area website and Hacker dump out the ...
Smartphone wireless chipset vulnerable to DoS attack

Smartphone wireless chipset vulnerable to DoS attack

October 25, 2012Mohit Kumar
Security researcher Andres Blanco from CoreSecurity discovered a serious vulnerability in two Wireless Broadcom chipsets used in Smartphone...
Medical Devices Vulnerable to Hacking

Medical Devices Vulnerable to Hacking

October 23, 2012Mohit Kumar
A heart defibrillator remotely controlled by a villainous hacker to trigger a fatal heart attack? Yes now its possible, The Government Accou...