The Hacker News — Most Popular Cyber Security, Hacking News Site: exploit code

Google Researcher Reveals Zero-Day Windows 8.1 Vulnerability

Google Researcher Reveals Zero-Day Windows 8.1 Vulnerability

January 02, 2015Swati Khandelwal
A Google security researcher, ' James Forshaw ' has discovered a privilege escalation vulnerability in Windows 8.1 that could a...
New Android Browser Vulnerability Is a “Privacy Disaster” for 70% Of Android Users

New Android Browser Vulnerability Is a “Privacy Disaster” for 70% Of Android Users

September 16, 2014Mohit Kumar
A Serious vulnerability has been discovered in the Web browser installed by default on a large number (Approximately 70%) of Android dev...
Flickr Cross-Site Request Forgery Vulnerability Patched

Flickr Cross-Site Request Forgery Vulnerability Patched

August 06, 2014Wang Wei
Yahoo-owned Flickr, one of the biggest online photo management and sharing website in the world was recently impacted by a web application v...
Attackers Compromise TOR Network to De-Anonymize Users of Hidden Services

Attackers Compromise TOR Network to De-Anonymize Users of Hidden Services

July 30, 2014Mohit Kumar
A critical vulnerability in Tor — an encrypted anonymizing network considered to be one of the most privacy oriented service, which is ...
Exploit-Selling Firm Kept Internet Explorer Zero-Day Vulnerability Hidden for 3 Years

Exploit-Selling Firm Kept Internet Explorer Zero-Day Vulnerability Hidden for 3 Years

July 24, 2014Mohit Kumar
A French information security company VUPEN has recently disclosed that it held onto a serious Internet Explorer (IE) vulnerability for at l...
Disqus Wordpress Plugin Flaw Leaves Millions of Blogs Vulnerable to Hackers

Disqus Wordpress Plugin Flaw Leaves Millions of Blogs Vulnerable to Hackers

June 29, 2014Swati Khandelwal
A Remote code execution (RCE) vulnerability has been discovered in the comment and discussion service, Disqus plugin for the most popul...
20-Year Old Vulnerability in LZO Compression Algorithm Went to Planet Mars

20-Year Old Vulnerability in LZO Compression Algorithm Went to Planet Mars

June 27, 2014Mohit Kumar
A 20 year old critical subtle integer overflow vulnerability has been discovered in Lempel-Ziv-Oberhumer (LZO), an extremely efficient d...
Android 4.3 and Earlier versions Vulnerable to Critical Code-Execution Flaw

Android 4.3 and Earlier versions Vulnerable to Critical Code-Execution Flaw

June 26, 2014Swati Khandelwal
A critical code-execution vulnerability almost affecting everyone those are not running the most updated version of Google Android , i.e...
WordPress Cookie Flaw Lets Hackers Hijack Your Account

WordPress Cookie Flaw Lets Hackers Hijack Your Account

May 27, 2014Mohit Kumar
Do you own a blog on WordPress.com website? If Yes, then you should take some extra cautious while signing into your Wordpress account ...
PREC Tool prevents Android Device from Root Exploit hidden in Malicious apps

PREC Tool prevents Android Device from Root Exploit hidden in Malicious apps

March 07, 2014Mohit Kumar
Smartphones are always ready to connect to the Internet and contains sensitive information such as Contacts, SMS, Photos, and GPS inform...
Linksys Malware 'The Moon' Spreading from Router to Router

Linksys Malware 'The Moon' Spreading from Router to Router

February 16, 2014Anonymous
Which Wireless Router do you have at your Home or Office? If it’s a Linksys Router you could be in the danger to a new malware that attack...
Foursquare vulnerability that exposes 45 million users' email addresses

Foursquare vulnerability that exposes 45 million users' email addresses

January 27, 2014Mohit Kumar
A location based Social Networking platform with 45 million users,' Foursquare ' was vulnerable to the primary email address dis...
23-year-old Stack overflow vulnerability discovered in X11 Server

23-year-old Stack overflow vulnerability discovered in X11 Server

January 09, 2014Anonymous
X.Org Foundation develops the X-Window System, the standard window system for open source operating systems and devices. Most of the graphi...
Firmware vulnerability allows man-in-the-middle attack using SD Memory cards

Firmware vulnerability allows man-in-the-middle attack using SD Memory cards

January 01, 2014Anonymous
How is it possible to exploit SD Card, USB stick and other mobile devices for hacking? Another interesting hack was presented at the Chaos C...
Linux worm targeting Routers, Set-top boxes and Security Cameras with PHP-CGI Vulnerability

Linux worm targeting Routers, Set-top boxes and Security Cameras with PHP-CGI Vulnerability

November 30, 2013Mohit Kumar
A Symantec researcher has discovered a new Linux worm, targeting machine-to-machine devices, and exploits a PHP vulnerability ( CVE-2012-18...
Japanese word processor 'Ichitaro' zero-day attack discovered in the wild

Japanese word processor 'Ichitaro' zero-day attack discovered in the wild

November 15, 2013Mohit Kumar
Japanese most popular word processing software ' Ichitaro ' and Multiple Products are vulnerable to a zero day Remote Code Execu...
Web Application Security : PHP SuperGlobal Variables are vulnerable to Hackers

Web Application Security : PHP SuperGlobal Variables are vulnerable to Hackers

September 09, 2013Mohit Kumar
Hackers are focusing on vulnerabilities in the PHP web application development platform threatening 80% websites in the world, including...
Major VBulletin based websites are vulnerable to Hackers; Pakistani forums defaced by Indian Hackers

Major VBulletin based websites are vulnerable to Hackers; Pakistani forums defaced by Indian Hackers

September 06, 2013Wang Wei
vBulletin is a publishing suite that allows users to create and publish a variety of content, including: forums, blogs, and polls. ...
Vulnerability in USB Internet Modems allows hacker to access Millions of Computers remotely

Vulnerability in USB Internet Modems allows hacker to access Millions of Computers remotely

August 16, 2013Mohit Kumar
A USB Internet Modems or Data card, is a type of modem that allows your computer to receive Internet access using USB Port and connect t...
New Botnet Campaign 'Fort Disco' Brute-Forcing Thousands of WordPress, Joomla Websites

New Botnet Campaign 'Fort Disco' Brute-Forcing Thousands of WordPress, Joomla Websites

August 08, 2013Anonymous
Password theft has been a growing problem within the security community. Researchers at Arbor Networks have uncovered a botnet called Fort D...