The Hacker News — Most Popular Cyber Security, Hacking News Site: exploit

CVE-2013-3906 : Zero Day Vulnerability in Microsoft Graphics Component

CVE-2013-3906 : Zero Day Vulnerability in Microsoft Graphics Component

November 05, 2013Mohit Kumar
Microsoft has issued a temporary fix for a 0day vulnerability that can be exploited to install malware via infected Word documents. ...
China is planting spying microchips in Electric Iron and kettles that can scan Wi-Fi devices to serve malware

China is planting spying microchips in Electric Iron and kettles that can scan Wi-Fi devices to serve malware

November 01, 2013Anonymous
We have discussed many times in our stories the network of Intelligent devices , their capabilities and the possibilities that cyber cri...
Terminator RAT became more sophisticated in recent APT attacks

Terminator RAT became more sophisticated in recent APT attacks

October 27, 2013Mohit Kumar
Advanced Persistent Threat (APT) is a term referring to targeted attacks on enterprises and other organizations and recently referred to...
Google detected Malware on PHP.net website; Flagged as 'Suspicious' site

Google detected Malware on PHP.net website; Flagged as 'Suspicious' site

October 24, 2013Mohit Kumar
If you are today trying to visit the php.net website, an official website of the PHP scripting language, you will likely see the above s...
Simple, but Critical vulnerability in Verizon Portal revealed users' SMS History

Simple, but Critical vulnerability in Verizon Portal revealed users' SMS History

October 21, 2013Mohit Kumar
A Security researcher discovered a critical privacy vulnerability on Verizon Wireless’s Web-based customer portal that allows anyone to dow...
ASLR bypass techniques are popular with APT attacks

ASLR bypass techniques are popular with APT attacks

October 16, 2013Mohit Kumar
Address space layout randomization (ASLR) is a security technique involved in protection from buffer overflow attacks. Many recent APT ...
Vulnerability in WhatsApp allows decrypting user messages

Vulnerability in WhatsApp allows decrypting user messages

October 11, 2013Anonymous
A serious vulnerability in WhatsApp allows anyone who is able to eavesdrop on WhatsApp connection to decrypt users' messages. ...
Paunch, the author of Blackhole Exploit kit arrested in Russia

Paunch, the author of Blackhole Exploit kit arrested in Russia

October 07, 2013Wang Wei
According to a Security Analyst ' Maarten Boone ' working  at Fox-IT company, the Developer of notorious Blackhole Exploit Kit  ...
Android's Firefox app Vulnerability allows hacker to steal files from SD card

Android's Firefox app Vulnerability allows hacker to steal files from SD card

October 01, 2013Mohit Kumar
Mobile Browsers are complicated applications and locking them down against threats is extremely difficult. According to a Mobile Securit...
New Mac OS Malware exploited two known Java vulnerabilities

New Mac OS Malware exploited two known Java vulnerabilities

September 24, 2013Wang Wei
A new Mac OS Malware has been discovered called OSX/Leverage . A , which appears to be yet another targeted command-and-control Trojan ...
NSA bought Hacking tools from 'Vupen', a French based zero-day Exploit Seller

NSA bought Hacking tools from 'Vupen', a French based zero-day Exploit Seller

September 18, 2013Mohit Kumar
The US government, particularly the National Security Agency  has been paying a French security firm for backdoors and zero day hacks. Acc...
Microsoft issues Emergency Fix for Internet Explorer zero-day exploit

Microsoft issues Emergency Fix for Internet Explorer zero-day exploit

September 18, 2013Anonymous
All supported versions of Internet Explorer are vulnerable to a zero-day Exploit that is currently being exploited in targeted attacks aga...
Android WebView vulnerability allows hacker to install malicious apps

Android WebView vulnerability allows hacker to install malicious apps

September 16, 2013Mohit Kumar
WebView is an essential component in Android and iOS. It enables applications to display content from online resources and simplifies ...
FBI compromised Tor hidden service to bust largest Child Pornography Ring

FBI compromised Tor hidden service to bust largest Child Pornography Ring

September 14, 2013Wang Wei
A few days before the servers of the largest provider of Ultra Anonymous hosting were found to be serving custom malware designed to id...
Pinterest Exploit exposes user information of 70 Million accounts

Pinterest Exploit exposes user information of 70 Million accounts

August 25, 2013Anonymous
Security researcher Dan Melamed has found a serious Pinterest Exploit that exposed user's information of over 70 Million accounts. ...
Exploit for most critical Android vulnerability publicly released

Exploit for most critical Android vulnerability publicly released

July 09, 2013Mohit Kumar
What if hackers could take an existing legitimate app or update with a valid digital signature, and modify it in order to use it as a ma...
BlackBerry Z10 Privilege Escalation Vulnerability

BlackBerry Z10 Privilege Escalation Vulnerability

June 18, 2013Mohit Kumar
BlackBerry Z10 users should be aware that there is a privilege escalation vulnerability. The vulnerability potentially allows a hacker t...
Android malware loaded with Linux kernel privilege escalation exploit

Android malware loaded with Linux kernel privilege escalation exploit

June 12, 2013Mohit Kumar
Malware authors are notorious for quickly leveraging new exploits in the public domain for nefarious purposes. A recently discovered Lin...
Ruby on Rails exploit could hijack unpatched servers for botnet

Ruby on Rails exploit could hijack unpatched servers for botnet

May 30, 2013Mohit Kumar
Server Administrators are being urged to update their Ruby on Rails servers following the discovery of an active malware campaign targetin...
Windows zero day vulnerability publicly exposed by Google engineer

Windows zero day vulnerability publicly exposed by Google engineer

May 23, 2013Mohit Kumar
A Google security engineer has not only discovered a Windows zero-day flaw, but has also stated that Microsoft has a knack of treating outs...