The Hacker News — Most Popular Cyber Security, Hacking News Site: Search results for Hijack

Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password

Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password

March 20, 2017Mohit Kumar
You may be aware of the fact that a local Windows user with system rights and permissions can reset the password for other users, but did...
You Can Hijack Nearly Any Drone Mid-flight Using This Tiny Gadget

You Can Hijack Nearly Any Drone Mid-flight Using This Tiny Gadget

October 27, 2016Wang Wei
Now you can hijack nearly any drone mid-flight just by using a tiny gadget. Security researcher Jonathan Andersson has devised a small ...
Researchers Uncover Spying Tool Used by Governments to Hijack all Types of Smartphones

Researchers Uncover Spying Tool Used by Governments to Hijack all Types of Smartphones

June 25, 2014Mohit Kumar
Purchasing malware to victimize people is illegal by laws but if the same thing any government official do, then its not!! Yes, the police f...
Cybercriminals Hijack Router DNS to Distribute Android Banking Trojan

Cybercriminals Hijack Router DNS to Distribute Android Banking Trojan

April 16, 2018Swati Khandelwal
Security researchers have been warning about an ongoing malware campaign hijacking Internet routers to distribute Android banking malware...
Spy Agencies Hijack Google Play Store to Install Spyware on Smartphones

Spy Agencies Hijack Google Play Store to Install Spyware on Smartphones

May 21, 2015Mohit Kumar
I have an Android phone with a five different gmail accounts configured in it. But what if any one of them get compromised via phishing,...
WordPress Cookie Flaw Lets Hackers Hijack Your Account

WordPress Cookie Flaw Lets Hackers Hijack Your Account

May 27, 2014Mohit Kumar
Do you own a blog on WordPress.com website? If Yes, then you should take some extra cautious while signing into your Wordpress account ...
Unpatchable 'DoubleAgent' Attack Can Hijack All Windows Versions — Even Your Antivirus!

Unpatchable 'DoubleAgent' Attack Can Hijack All Windows Versions — Even Your Antivirus!

March 21, 2017Swati Khandelwal
A team of security researchers from Cybellum, an Israeli zero-day prevention firm, has discovered a new Windows vulnerability that could ...
15-Year-Old JasBug Vulnerability Affects All Versions of Microsoft Windows

15-Year-Old JasBug Vulnerability Affects All Versions of Microsoft Windows

February 10, 2015Mohit Kumar
Microsoft just issued a critical patch to fix a 15-year-old vulnerability that could be exploited by hackers to remotely hijack users’ PCs r...
Google Apps Flaw Allowed Hacker to Hijack Account and Disable Two-factor Authentication

Google Apps Flaw Allowed Hacker to Hijack Account and Disable Two-factor Authentication

January 22, 2015Wang Wei
A critical cross-site scripting ( XSS ) vulnerability in the Google Apps administrator console allowed cyber criminals to force a Goog...
BASHLITE Malware leverages ShellShock Bug to Hijack Devices Running BusyBox

BASHLITE Malware leverages ShellShock Bug to Hijack Devices Running BusyBox

November 17, 2014Swati Khandelwal
Cyber criminals are using new malware variants by exploiting GNU Bash vulnerability referred to as ShellShock ( CVE-2014-6271 ) in ord...
Hacker exploits Heartbleed bug to Hijack VPN Sessions

Hacker exploits Heartbleed bug to Hijack VPN Sessions

April 18, 2014Mohit Kumar
Cyber criminals have explored one more way to exploit Heartbleed OpenSSL bug against organisations to hijack multiple active web session...
Vulnerability in Facebook app allows hackers to steal access tokens and hijack accounts

Vulnerability in Facebook app allows hackers to steal access tokens and hijack accounts

October 29, 2013Mohit Kumar
There are more than 100 Million users who are using Facebook mobile app. Facebook has fixed multiple critical vulnerabilities in its A...
Exploiting GPS vulnerability to Hijack Ships, Airplanes with $3000 Equipments

Exploiting GPS vulnerability to Hijack Ships, Airplanes with $3000 Equipments

July 27, 2013Anonymous
The GPS expert Todd Humphreys , professors at the University of Texas, demonstrated that just using a cheap apparatus composed by a smal...
Vulnerability in HTC website allow attacker to hijack accounts

Vulnerability in HTC website allow attacker to hijack accounts

December 28, 2012Wang Wei
Thamatam Deepak (Mr.47™) reported a Cross site scripting (XSS) Vulnerability and cookie handling in HTC website, that allow an attacker ...
Proof of Concept : PuttyHijack – Hijack SSH/PuTTY Sessions

Proof of Concept : PuttyHijack – Hijack SSH/PuTTY Sessions

October 02, 2011Mohit Kumar
Proof of Concept : PuttyHijack - Hijack SSH/PuTTY Sessions PuttyHijack is a POC tool that injects a dll into the Putty process to hijack ...
Hackers learning new ways to hijack smartphones !

Hackers learning new ways to hijack smartphones !

January 11, 2011Mohit Kumar
How safe is your cell phone? Thieves are coming up with new ways to hijack the most popular smartphones. ABC Action News investigative repor...
GLitch: New 'Rowhammer' Attack Can Remotely Hijack Android Phones

GLitch: New 'Rowhammer' Attack Can Remotely Hijack Android Phones

May 03, 2018Swati Khandelwal
For the very first time, security researchers have discovered an effective way to exploit a four-year-old hacking technique called Rowham...
Warning – 3 Popular VPN Services Are Leaking Your IP Address

Warning – 3 Popular VPN Services Are Leaking Your IP Address

March 15, 2018Mohit Kumar
Researchers found critical vulnerabilities in three popular VPN services that could leak users' real IP addresses and other sensitive...