-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Teyana Taylor's Twitter Hacked, Nude image Leaked

Teyana Taylor's Twitter Hacked, Nude image Leaked

Feb 18, 2012
Teyana Taylor 's Twitter Hacked, Nude image Leaked R&B singer  Teyana Taylor was the latest victim of an Internet scandal when a nude photo of her hacked and spread around the Internet. The topless photo and other pictures claiming to be of the " Google Me " singer reportedly appeared online by way of her Yfrog account. The embarrassing nude photo that is trending on Twitter shows someone who has similar features like Taylor, showing off her breasts and is seen wearing nothing but her underwear and a pair of socks. The person's face in the picture is not shown and it hasn't been confirmed that it is in fact the rapper. But Twitter users believe that it us the rapper and has said that Taylor's phone was either stolen or she has uploaded the photo of herself. Read her open letter below: Look I’m human, & just like every girl in this world, I admire my body so i take pics just like EVERY other human being. However my phone that was stolen Wit...
Anonymous Hackers Develop WebLOIC DDOS Tool for Android Mobiles

Anonymous Hackers Develop WebLOIC DDOS Tool for Android Mobiles

Feb 18, 2012
Anonymous Hackers Develop WebLOIC DDOS Tool for Android Mobiles These Days Anonymous Hacker Group using a new tool WebLOIC . This tool is even easier to use than LOIC DDOS tool, requiring no download, it sends requests using Javascript in the user's browser. Just like LOIC, it is a quick path to prison, sending thousands of requests from your IP address to the target, accompanied by a slogan. Recently Hackers Release and New Interface of WebLOIC, ie. for Android Mobile in the form of an Application named “ LOIC para Android by Alfred ”. They Spread this tool via Anonymous social network accounts to execute the new attack in Various Anonymous operations against Argentinian government - such as #opargentina #iberoamerica. When Attacker will click " Fire ", a JavaScript will sends 1,000 HTTP requests with the message “ We are LEGION! ” that perform DoS attacks of Given Target URL. This Application is Available to Download here .
The Syrian spyware to target the opposition activists

The Syrian spyware to target the opposition activists

Feb 18, 2012
The Syrian spyware to target the opposition activists CNN News reported about malicious programs used to target the Syrian opposition, Its a computer viruses that spy on them and according to report a Syrian opposition group and a former international aid worker whose computer was infected. They steal the identities of opposition activists, then impersonate them in online chats, then they gain the trust of other users, pass out Trojan horse viruses and encourage people to open them. Security Researcher in the Malware Detection Team (MDT) at Norman analyse the packages and found that there are two malicious programs, one which displays message about downloading a free security program, and one which showed no action when executed. He said that Most of the ones we’ve seen come as selfextracting RAR executables that extract a malicious program. The malicious programs have been Visual Basic executables that primarily are downloaders and keyloggers  they ...
cyber security

AI Security Board Report Template

websiteWizAI Security / Compliance
This template helps security and technology leaders clearly communicate AI risk, impact, and priorities in language boards understand.
cyber security

AI Security Isn’t Optional—Join the Conversation at SANS Security West

websiteSANSCybersecurity Training
SANS Fellow, Eric Johnson addresses emerging risks and tactical responses.
How Hackers can Track your Mobile phone with a cheap setup ?

How Hackers can Track your Mobile phone with a cheap setup ?

Feb 18, 2012
How Hackers can Track your Mobile phone with a cheap setup ? Cellular phones have become a ubiquitous means of communications with over 5 billion users worldwide in2010, of which 80% are GSM subscribers. Due to theiruse of the wireless medium and their mobile nature, thosephones listen to broadcast communications that could reveal their physical location to a passive adversary. University of Minnesota researchers found a flaw in AT&T and T-Mobile cell towers that reveals the location of phone users. The attack, described in a Research paper (Click to Download Pdf) , is most useful for determining whether a target is within a given geographic area as large as about 100 square kms or as small as one square kilometer. It can also be used to pinpoint a target's location but only when the attacker already knows the city, or part of a city, the person is in. Ph.D. student Denis Foo Kune says, “ Cell phone towers have to track cell phone subscribers to provide service efficiently...
Tenable Release Nessus 5.0 vulnerability scanner

Tenable Release Nessus 5.0 vulnerability scanner

Feb 17, 2012
Tenable Release Nessus 5.0 vulnerability scanner Tenable Network Security announced Nessus 5.0 vulnerability and configuration assessment solution for enterprises and security professionals. Nessus version 5.0 introduces key features and improvements, separated into the four major phases of the vulnerability scanning process: Installation and management (for enhanced usability) - Nessus 5.0 simplifies the installation and configuration for non-technical users. Configuration and management: Nessus v5.0 configuration and management is now done 100% through the GUI Scan policy creation and design (for improved effectiveness) - Users now enjoy improved effectiveness when creating scan policies. Over two dozen new pre-built plugin filters make it easy for security and compliance professionals to simplify policy creation for laser-focused scans on the areas that matter most. Users can quickly select multiple filter criteria, such as, Vulnerability Publication Date, publi...
Anonymous deface National Consumer and Federal Trade Commission sites against #ACTA

Anonymous deface National Consumer and Federal Trade Commission sites against #ACTA

Feb 17, 2012
Anonymous deface National Consumer sites & Federal Trade Commission sites  against #ACTA Today, Anonymous Hackers deface multiple National Consumer websites over ACTA, the protests and hactivism continues against ACTA - 'The Anti-Counterfeiting Trade Agreement' is a proposed plurilateral agreement for the purpose of establishing international standards on intellectual property rights enforcement. Hackers Deface following sites : business.ftc.gov consumer.gov ncpw.gov ftcstaging.mt.fhdbeta.com ncpw.gov consumer.ftc.gov ftcdev.mt.fhdbeta.com Mirror of Defacements : http://zone-h.org/mirror/id/16983974 Mysql Username, Emails and Passwords of all usres leaked by Hackers on Deface page as shown. Hackers also post a video on The Top of page to show there view about ACTA. Last Month, Prime Minister Donald Tusk's web site was still offline, following attacks by hackers protesting against Poland signing the Anti-Counterfeiting Trade Agreement (ACTA), designed to combat ...
Armitage Update : Graphical cyber attack management tool for Metasploit

Armitage Update : Graphical cyber attack management tool for Metasploit

Feb 15, 2012
Armitage Update : Graphical cyber attack management tool for Metasploit Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don’t use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help you. Armitage Changelog 14/Feb/12 - Added ports 5631 (pc anywhere) and 902 (vmauthd) to the MSF Scans feature. - Several cosmetic tweaks to the spacing in Armitage tables. - Moved table render code from Sleep to Java to avoid potential lock conflicts - Added support for vba-exe payload output type. - Payload generation dialog now sets more appropriate default options for the vba output type when it is selected. - Meterp command shell "read more stuff?" heuristic now accounts for Yes/No/All - Fixed ExitOnSession ...
Tor Bridge Relay to Bypass Internet Censorship

Tor Bridge Relay to Bypass Internet Censorship

Feb 15, 2012
Internet users in dozens of countries around the world where governments tend to look askance at freedom and civil liberties have come to rely on the Tor network for dependable, anonymous access to the Web. But those governments and some popular websites have caught on to the game and begun to make it more difficult for users to connect to the Tor network. If you live in an area with little or no Internet censorship, you may want to run a Tor relay or a Tor bridge relay to help other Tor users access an uncensored Internet.The Tor network relies on volunteers to donate bandwidth. The more people run relays, the faster and more secure the Tor network will be. To help people using Tor bypass Internet censorship, set up a bridge relay rather than an ordinary relay. Now, new version of the software include a feature that enables users to connect to one of several " bridges ," or Tor relays whose IP addresses aren't listed in the Tor directory. Bridges to Tor is a step forwa...
Indian Stock Market next target of Bangladesh Hackers

Indian Stock Market next target of Bangladesh Hackers

Feb 15, 2012
Indian Stock Market next target of Bangladesh Hackers Bangladesh Cyber Army hackers released a Youtube video mentioning their next attack would be on Indian Stock Market, in order to Protesting the killing of another Bangladeshi citizen on Border by BSF. Bangladesh Cyber Army has attacked 3 important Indian Stock Market sites : http://www.dseindia.com/ http://www.nseindia.com/ http://www.paisacontrol.com/ The websites were down during the peak hour. So all types of online transaction was off. The sites faced DDoS attacks and were down for around 10 hours. This caused a huge amount of loss in the financial sector of India. The amount of loss may reach millions of rupees as well. Bangladesh Cyber Army mentioned that they are still not done. They will continue their attacks if BSF does not stop their brutality over innocent Bangladeshi citizens. They also mentioned that these high-profile sites will suffer continuous attacks if the points mentioned by them are not accepted. Bangla...
Dangerous IE browser vulnerabilities, Allows remote code execution !

Dangerous IE browser vulnerabilities, Allows remote code execution !

Feb 15, 2012
Dangerous IE browser vulnerabilities, Allows remote code execution ! Microsoft is expected to show some love for Windows administrators on Valentine's Day, with nine patches fixing 21 vulnerabilities in February's Patch Tuesday release. Also, Microsoft is warning all users of its Internet Explorer web browser to immediately apply the latest security patch as a precaution against malicious hacker attacks. Critical fixes would address flaws that could allow remote code execution in Windows, Internet Explorer, .NET Framework, and Silverlight, Microsoft's web development tool. The update is rated “critical” for Internet Explorer 7, Internet Explorer 8, and Internet Explorer 9 on Windows client machines and Microsoft expects to see reliable exploit code published with the next 30 days. Here are the bulletins for February 2012: MS12-008 – Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2660465) MS12-010 – Cumulative Security Update for Inte...
Anonymous Hackers target Nasdaq website

Anonymous Hackers target Nasdaq website

Feb 15, 2012
Anonymous Hackers target Nasdaq website Websites of exchange operators Nasdaq and BATS have been attacked by hackers over the last 24 hours, causing ongoing disruptions for those trying to use the sites. Sites was down because of distributed denial-of-service attack from a group of Anonymous hackers. L0NGwave99 ,a online hacktivist, is claiming to be responsible for the attack. In a release issued Tuesday, an operative writes " This DDoS Operation over NASDAQ is done in support of the great and rooted 99% movement, whom the L0NGwave99 Group has decided to give a present ." " The website wasn't hacked, nobody got any information. What they did was try to block access for our users ," NASDAQ spokesman Joseph Christinat adds to the agency. Trading in Nasdaq stocks has not been affected by the attacks. According to reports, the attacks have also affected the NasdaqTrader.com site, although it seems to be fine at the moment. " The website wasn't hacke...
Anonymous leak 400 Mb Documents from US Army Intelligence Knowledge Network

Anonymous leak 400 Mb Documents from US Army Intelligence Knowledge Network

Feb 15, 2012
Anonymous leak 400 Mb Documents from US Army Intelligence Knowledge Network Anonymous claim to hack Intelligence Knowledge Network (IKN) Portal of United States Army -  ikn.army.mil . Hackers dump around 400 Mb of Data on Rapidshare in two parts : https://rapidshare.com/files/665225777/Documents1.zip https://rapidshare.com/files/2204410673/Documents.zip AnonymousIRC also tweeted few part of leaked documents , here and here .  IKN is a Knowledge Management tool and dynamic portal that enables Intelligence Soldiers all over the world to communicate, collaborate and investigate. IKN serves as the Intelligence Warfighter Forum and hosts discussion forums, a single point of entry to access Intelligence Community websites, and provides a variety of public and private web applications that support the Intelligence Community and the Warfighter.IKN Public Sites
Cryptome Webpages infected with Blackhole exploit kit

Cryptome Webpages infected with Blackhole exploit kit

Feb 13, 2012
Cryptome Webpages infected with Blackhole exploit kit Cryptome.org a popular website and similar to Wikileaks was hacked by the cybercriminals & Attackers were able to hide malicious scripts on every one of the site’s 6,000 pages. Anyone visiting with a vulnerable browser will have found themselves infected with Blackhole, most likely adding their computer to a larger bot. Cryptome attack, website owners only know they have a problem when users contact them with the bad news after detecting it with security software wise to its many techniques for staying out of sight. Cryptome official write , " A reader reported today that accessing a file on Cryptome caused this intrusion warning " and " Replacement with clean files is proceeding, probably done by end of day ." Two years ago, the organisation published Microsoft's secret Global Criminal Compliance handbook, which laid out how the company was gathering certain data from users of some of its services...
Philips Electronics got hacked, Database Stolen by Hackers

Philips Electronics got hacked, Database Stolen by Hackers

Feb 13, 2012
Philips Electronics got hacked, Database Stolen by Hackers Another big site got hacked today, its Philips Electronics - had revenues of €25.42 billion in 2010, making it one of the largest electronics companies in the world. It employs around 114,500 people across more than 60 countries. The deface page shows the name of Hacker as -  Hacked by bch195 and HaxOr . These hackers belongs from  Team INTRA . Hacker also make a pastebin note ( http://pastebin.com/BDbrcx8b ) about hack. Hacker claim to hack many subdomains of Philips websites as shown. The screenshot is of a php shell uploaded on Philips's Website. Hackers link 3 more Private note in last pastebin note, which include Most of the Hacked Database of Website and List of few emails extracted from their. Also hacker comment that " This is first 100 emails from 200k list.I don't want to share more because i will sell it ." Last week seems to have another interesting Hacks of big websites : "NASA Own...
Al Jazeera news network hacked by Syrian Hackers

Al Jazeera news network hacked by Syrian Hackers

Feb 13, 2012
Al Jazeera  news network hacked by Syrian Hackers Arabic-language news network Al Jazeera ‘s website was hacked last week by a Syrian hacktivist group in support of the government’s actions in the country. Aljazeera is broadcaster owned by the state of Qatar through the Qatar Media Corporation and headquartered in Doha, Qatar. Initially launched as an Arabic news and current affairs satellite TV channel, Al Jazeera has since expanded into a network with several outlets, including the Internet and specialty TV channels in multiple languages. Al Jazeera is accessible in several world regions. Hackers from cyria " ThePro " again hit aljazeera network They claim to hack the one of the network and post list ofemail and passwrds of aljazeera.  The Syrian Electronic Army is a collection of young Syrians, angry about the way the media and other sources are portraying the fighting in their country. They call it a “ massive distortion of facts". Al Jazeera hosts a live blog c...
Microsoft Store India got hacked in India !

Microsoft Store India got hacked in India !

Feb 12, 2012
Microsoft Store India got hacked in India ! Today, Hackers from group EvilShadow  successfully hack and deface the website of  Microsoft Store India ( http://www.microsoftstore.co.in ) . But Hacker upload his deface page at location  http://www.microsoftstore.co.in/evil.html . Hacker revealed that user passwords were saved in plain text as shown below:
"NASA Own3d Again" - NASA Database Leaked by r00tw0rm

"NASA Own3d Again" - NASA Database Leaked by r00tw0rm

Feb 12, 2012
" NASA Own3d Again " - NASA Database Leaked by r00tw0rm Hackers from Team  r00tw0rm again hit NASA . According to Latest tweet by Hackers,  They claim to hack the one of the Sudomain of Nasa (Link is not exposed by hackers and claimed to be reported for Fix). Hackers claim to hack GB's of database and they  Leaked sample of database include Users names, emails and Passwords , Contact as shown: Same Hackers Yesterday Hack and Expose the Database of United States Census Bureau and Vulnerable link was also Exposed.
United States Census Bureau Hacked and Vulnerability Exposed

United States Census Bureau Hacked and Vulnerability Exposed

Feb 12, 2012
United States Census Bureau Hacked and Vulnerability Exposed A Group of Hackers from  r00tw0rm found SQL injection Vulnerability on  United States Census Bureau and Hackers successfully exploit the Database and Leak it online today. The United States Census Bureau is the government agency that is responsible for the United States Census. It also gathers other national demographic and economic data. As part of the United States Department of Commerce, the Census Bureau serves as a leading source of data about America's people and economy. The Pastebin Note include the complete Database Structure as shown: There is no reason mentioned for this attack yet by Hacker, But Hacker suggest United States Census Bureau to fix their loopholes as soon as possible. The Note include the Greets to other Hacking Groups like Inj3ct0r , TeaMp0isoN and Anonymous, seems that its a collective hack for #Antisec.
38 Bangladeshi Government sites Defaced by Indian Hackers

38 Bangladeshi Government sites Defaced by Indian Hackers

Feb 11, 2012
38 Bangladesh Government sites Defaced by Indian Hackers Indians hacking Group " Indishell " took down 38 Bangladeshi government websites on Saturday, including ministry of  the ministries are communications, youth and sports, primary and mass education , Trading Corporation of Bangladesh. The Deface page include the name of hackers - Love the Risk, Amal Landhe, Lnx Root, Silent Killer . In the hacked pages, between two eyes resembling Indian flags, the hackers wrote, "We have an EYE on you. Indishell is non other that Indian Cyber Army Hacking group, who already deface most of the Pakistani Govt sites in Past.  Most of the Hacker Sites either Restored or Hosting Suspended by Providers, or Under maintenance. The Complete list of Hacked Sites and Mirrors of All hacks are listed below. Hacked Sites: http://www.www.moef.gov.bd/ http://www.mincom.gov.bd/ http://www.cga.gov.bd/ http://www.bdlaws.minlaw.gov.bd/ http://www.mopme.gov.bd/ http://www....
Cia.gov Tango Down - #FuckFBIFriday by Anonymous

Cia.gov Tango Down - #FuckFBIFriday by Anonymous

Feb 10, 2012
#FuckFBIFriday by Anonymous, cia.gov Tango Down ! Anonymous has struck again at Central Intelligence Agency, The site went down about 3:10 p.m. apparently under a massive distributed denial of service (DDOS) attack. No specific reason for the attack was announced, nor were any specific groups or individuals within Anonymous named as the attackers. Anonymous took credit for crashing the websites of the US Department of Homeland Security, which was quickly revived, and the FBI. CIA's site is still down even two hours after the attack. One of the twitter accounts affiliated with Anonymous issued a statement on the reasons of the attack: " We do it for the lulz, " referring to the popular online abbreviation " for laughs ." Two weeks ago, the online group also released the audio of a conference call between the US Federal Bureau of Investigation and Britain’s Scotland Yard counterpart targeting members of the largely untraceable group. It was done as part of th...
BFT- Browser forensic tool Released by DarkCoderSc

BFT- Browser forensic tool Released by DarkCoderSc

Feb 10, 2012
BFT- Browser forensic tool Released by DarkCoderSc From the Developer of Famous DarkComet RAT Tool, DarkCoderSc Yesterday Release Another Interesting tool called BFT- Browser forensic tool. Browser forensic tool, is a software that will search in all kind of browser history (even archived) in a few seconds.It will retrieve URLS and Title with the chosen keywords of all matching search.You can use default example profiles or create yours, with thematic search. You can Download it from here :  BFT Download Video Demonstration: 
Iran Shutdown Google ,Yahoo & other Major sites using Https Protocol

Iran Shutdown Google ,Yahoo & other Major sites using Https Protocol

Feb 10, 2012
Iran Shutdown Google ,Yahoo & other Major sites using Https Protocol We Received latest reports from Iran ,Governments has blocked access to the major sites plus websites using certain Https protocol like Gmail, Google ,Yahoo. On the eve of the anniversary of the revolution that overthrew the country’s monarchy and replaced it with an Islamic republic. At the same time nobody can even use banking websites in Iran because all of them using “Https” to encode the sensetive data . As well as Yahoo, Gmail, Google and all sites that rely on the search giant’s API such as WolframAlpha. Sites such as BMI.ir , BPI.ir and Parsian-Bank.com are also apparently banned. There is Online Service  http://www.blockediniran.com  , where you can check that Is there any site blocked in Iran or Not ? We check the " google.com " as shown,but it showing that site is Working. This Condition until Esfand, next month in Persian calender after the 33rd anniversary of the Islamic Revolu...
Listen to your instincts when it comes to the Web

Listen to your instincts when it comes to the Web

Feb 10, 2012
Listen to your instincts when it comes to the web Lee Ives from Security-FAQs talk about Internet Security in January Edition of The Hacker News Magazine . When you are on the web the best thing that you can do is to go with your instincts. In real life, when we walk around, we usually go with our gut to make sure that we stay out of danger. If something does not seem right we usually “sense” it for lack of a better term. This is not something that is new. This is how we survived in the wilderness all of those many years ago. We made sure that we stayed safe by following our instincts and doing the right thing. All of these years later and that same advice still holds up to be true. But like we said in the previous paragraph, you have to worry about following your instincts when you are on the web as well. There are many different kinds of pitfalls that you can encounter when you are on the web. It doesn’t matter whether it is meeting the wrong type of person or it is downloading...
THC-HYDRA 7.2 - Fast and Flexible network login Bruteforce Tool Updated

THC-HYDRA 7.2 - Fast and Flexible network login Bruteforce Tool Updated

Feb 10, 2012
THC-HYDRA 7.2 - Fast and Flexible network login Bruteforce Tool Updated One of the most famous network logon cracker – THC-HYDRA 7.2 get latest Update . Hydra is a parallized login cracker which supports numerous protocols to attack. New modulesare easy to add, beside that, it is flexible and very fast.Hydra was tested to compile on Linux, Windows/Cygwin, Solaris 11, FreeBSD 8.1 and OSX, andis made available under GPLv3 with a special OpenSSL license expansion. Hydra is best for Samba, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support and is part of Nessus. Changelog v7.2 Speed-up http modules auth mechanism detection Fixed -C colonfile mode when empty login/passwords were used (thanks to will(at)configitnow(dot)com for reporting) The -f switch was not working for postgres, afp, socks5, firebird and ncp, thanks to Richard Whitcroft for reporting! Fixed NTLM auth in http-proxy/http-proxy-url module Fixed ...
63 Vulnerabilities on United Nation Website Exposed Online !

63 Vulnerabilities on United Nation Website Exposed Online !

Feb 10, 2012
63 Vulnerabilities on United Nation Website Exposed Online ! Latest Notification in The Hacker News Vault by a Hacker named " Xenu (Casi) " from r00tw0rm Team that There are  63 Blind SQL injection Vulnerabilities exist on United Nation's Website (www.un.org). Blind SQL injection is identical to normal SQL Injection except that when an attacker attempts to exploit an application rather then getting a useful error message they get a generic page specified by the developer instead. This makes exploiting a potential SQL Injection attack more difficult but not impossible. An attacker can still steal data by asking a series of True and False questions through sql statements. Information purported to be stolen from the organization was posted on the site Pastebin on Thursday morning.  Martin Nesirky , a spokesperson for the Secretary General of the United Nations, confirmed the breach." A case of unauthorized access to the UN website is still being investigated ,...
Trixd00r v0.0.1 - An Invisible TCP/IP based backdoor for UNIX systems

Trixd00r v0.0.1 - An Invisible TCP/IP based backdoor for UNIX systems

Feb 10, 2012
Trixd00r v0.0.1 - An Invisible TCP/IP based backdoor for UNIX systems NullSecurity Team Releases " Trixd00r v0.0.1 " an advanced and invisible TCP/IP based userlandbackdoor for UNIX systems. It consists of a server and a client. The server sits and waits for magic packets using a sniffer. If a magic packet arrives, it will bind a shell over TCP or UDP on the given port or connecting back to the client again over TCP or UDP.  The client is used to send magic packets to trigger the server and get a shell. You can  Download and Use trixd00r-0.0.1.tar.gz  from NullSecurity Website. Video Demonstration : 
Hacker hits the Embassy of Indonesia in Hungary

Hacker hits the Embassy of Indonesia in Hungary

Feb 10, 2012
Hacker Hits the Embassy of Indonesia in Hungary Hacker from Team thec7crew today claim to Hack the Official Website  Embassy of Indonesia in Hungary. Hacker Hack the Database of Site also Expose various Server Parameters on Pastebin . As Database name mentioned " indone01_web " - There are 30 tables and Hacker also Extract and Expose the Admin's Emails and Passwords in Note. Reason of Hacking is Unknown, But this Hack will really effect the Security of officials at Embassy.
Android.Bmaster Exploits root access to connect to Botnet

Android.Bmaster Exploits root access to connect to Botnet

Feb 10, 2012
Android.Bmaster Exploits root access to connect to Botnet A new piece of Android malware named Android.Bmaster , first highlighted by researcher Xuxian Jiang at North Carolina State University, was uncovered on a third-party marketplace and is bundled with a legitimate application for configuring phone settings, Symantec researcher Cathal Mullaney wrote in a blog . This Malware is estimated to affect between 10,000 and 30,000 phones on any given day. The malware, mostly found on Chinese phones, works by using GingerBreak, a tool that gives users root access to Android 2.3 Gingerbread.  RootSmart is designed to escape detection by being named " com.google.android.smart, " which the same name as a settings app included by default with Android operating systems. Mullaney explained that once the malware is installed on the Android phone, an outbound connection from the infected phone to a remote server is generated.“ The malware posts some user and phone-specific data to t...
Hackers Claims to compromise Intel's Sensitive Data

Hackers Claims to compromise Intel's Sensitive Data

Feb 10, 2012
Hackers Claims to compromise Intel 's Sensitive Data A security researcher under the name of " WeedGrower ", or " X-pOSed " has been on a roll since the start of 2012. He has ambushed huge sites such as AOL, NASA, Hotmail, Myspace, Xbox, USBank, Yahoo, and VISA, he has also leaked sensitive data on most of those websites. Hackers today Claiming that he compromise Intel's Sensitive Data like User Base & Credit Cards. He found a way to expose sensitive data via the subscriber section on Intel.com and he also has access to the INTEL.com database which reveals Credit Card Numbers, Social Security Numbers, Emails, Passwords, and more. "WeedGrower", or "X-pOSed" has threatened that he's going to be leaking this soon if he doesn't get a response from Intel.com carriers. Hacker said ," I've got to give some applause to all these pseudo-security technicians out there. I cut Intel a break, I have access to a database and a...
Apple Supplier Foxconn’s Servers Hacked, Exposing Vendor Usernames and Passwords

Apple Supplier Foxconn’s Servers Hacked, Exposing Vendor Usernames and Passwords

Feb 09, 2012
Apple Supplier Foxconn ’s Servers Hacked, Exposing Vendor Usernames and Passwords Apple supplier Foxconn has reportedly been hacked, exposing the usernames and passwords of the company’s clients and employees. Hacker group SwaggSec just released a dump of Foxconn internal information, including a mail server login/password dump and logins to various online procurement sites and Intranets. " We encourage media, security experts, and other interested individuals to explore our leaks. Foxconn did have an appropriate firewall, but fortunately to our intent, we were able to bypass it almost flawlessly. Of course with funding ourselves we did have our limitations. But with several hacking techniques employed, and a couple of days in time, we were able to dump most of everything of significance. " Hacker said. The group made a 6.04MB file available earlier this evening first on Demonoid, and then on The Pirate Bay   which purported to contain login and password information for F...
Expert Insights Articles Videos
Cybersecurity Resources