Topface, the Russian-based dating site, has been hacked, User names and e-mail addresses of 20 million visitors are offered for sale online. Nearly 20 Million User names and e-mail addresses of visitors to the Russian-based dating website Topface have been available for sale online, the news first reported by Bloomberg. According to Daniel Ingevaldson, chief technology […]
Rumors on the Internet reveals that the PlayStation 4 Jailbreak hack allegedly made by the Lizard Squad would be soon available. It is difficult to understand right now how true the news, but according to rumors circulating in the Internet the popular hacking collective Lizard Squad, responsible for the attacks against Sony PSN, XBox live and […]
Security Expert Brett Buerhaus has discovered a critical flaw on admin.google.com, which could be exploited by to Hijack an account and disable 2FA Authentication. Even the giants have their Achilles heel, the Google Apps administrator console is affected by a critical cross-site scripting (XSS) vulnerability that could be exploited by attackers to force a Google Apps admins […]
Researchers have presented the TURNIPSCHOOL project and other activities that replicate NSA surveillance implants with cheaper and off the shelf components. In December 2013, the popular cyber security expert Jacob Appelbaum, with the support of Der Spiegel news agency, disclosed the NSA’s catalog of surveillance. “Germany’s Der Spiegel has published another disturbing article on the NSA surveillance activities, the […]
A security expert discovered a cross-site request forgery (CSRF) flaw to take over domains registered with GoDaddy, the company has already fixed it. The security engineer Dylan Saccomanni discovered a critical cross-site request forgery (CSRF) vulnerability in GoDaddy domain management console that could be exploited by attackers to take over domains. The vulnerability was discovered on January 17 […]
A security researcher demonstrated that “car hacking” is reality through the exploitation of vulnerable Can Insurance Dongle. Million vehicles at risk. Car hacking is a reality, we have discussed the topic several times and we have learned that modern vehicles have a complex internal networking infrastructure that could be subject to cyber attacks. The news […]
The VLC open-source media player is affected by two security vulnerabilities that can allow an attacker to run arbitrary code on vulnerable machines. Some versions of the popular VLC open-source media player are affected by two memory corruption vulnerabilities that could be exploited by an attacker to run arbitrary code on vulnerable machines. The couple of vulnerabilities was […]
GreatFire revealed that the popular Microsoft Outlook emailing service was subjected to a man-in-the-middle (MITM) attack in China. This time the popular Outlook email service was allegedly hacked by Chinese authorities. The Outlook email service was not reachable in China over the weekend and according the to experts at the GreatFire organization, Chinese Government run a man-in-the-middle […]
Security expert discovered a critical flaw in Verizon’s FiOS mobile app that could be exploited to access the email account of any Verizon customer. A new critical vulnerability in exposing million accounts to cyber threats, this time the flaw affects the Verizon FiOS mobile app and could be exploited by attackers to access the email account […]
FBI seems to consider seriously the list of IP addresses involved in the hack of US CENTCOM social media accounts and provided by members of Anonymous. The FBI is investigating on IP addresses released by the Anonymous collective in a wake of the hijacking of the US CENTCOM social media accounts. Anonymous members have collected the IP […]