The Redirect to SMB vulnerability affects all supported versions of Windows and could be exploited to steal users’ credentials for various services. Experts at Cylance have discovered a new credential hijacking vulnerability dubbed Redirect to SMB that affects all versions of Windows OSs, including the upcoming Windows 10. The Redirect to SMB could be exploited by an attacker […]
Unknown hackers have leaked another set of Kelly Brook’s Nude Pictures online, this is the second time after the Fappening case of the last year. The Fappening cases are probably the most popular privacy breaches that are known to ordinary people, celebrities nude photo leaks are still circulating in the Internet and raised the discussion about security […]
Unknown hackers took over social media accounts of Iranian state Al Alam TV spreading fake news of the death of an Iran-allied rebel leader in Yemen. The Iranian Arabic-language state TV network Al Alam announced that its Twitter account had been hacked on Sunday. The attackers abused the account to spread a false report to post […]
A serious flaw affecting the Darwin kernel in the Apple OS X 10.10 and iOS 8 could be exploited to cause DoS attack just sending a specific IP packet. At the end of 2014, security experts at Kaspersky Lab discovered a serious vulnerability in the Darwin kernel. The name “Darvin kernel” is unknown to the […]
Researchers uncovered the Great Cannon, a powerful hacking tool, used by the Chinese Government to run MITM attacks, that was used also against GitHub. The researchers from the University of California at Berkeley and the University of Toronto have uncovered a powerful weapon of the Chinese Government cyber arsenal, dubbed the Great Cannon, used to […]
The FBI is warning that individuals sympathetic to the ISIS are running mass-hacking websites exploiting known vulnerabilities in WordPress. The FBI is warning administrators of WordPress websites about the possibility of cyber attacks carried out by sympathizers of the ISIS terrorist group. Unfortunately, it is quite simple to compromise websites based on the popular content management system (CMS) that […]
The British television host scored a rare one-on-one interview in Moscow with Edward Snowden for the Sunday’s edition of the “John Oliver Tonight” show. A British channel hosted a rare interview with Snowden in Moscow, the interview was conducted by John Oliver from “John Oliver Tonight.” Aside from jokes like “Do you miss a hot […]
According to the CNN Russian hackers used data gathered from State Department to run a Phishing campaign against White House staffers. On October 2014, the Reuters Agency published the news that a suspicious activity had been detected on the Executive Office of the President (EOP) network. According to an unnamed official at the White House, hackers infiltrated an […]
Million of WordPress websites are vulnerable to cyber attacks due to a critical vulnerability affecting the WP-Super-Cache plugin. Million of WordPress websites using the WP-Super-Cache are exposed to the risk of cyber attack due to a critical vulnerability affecting the popular plugin. The WP-Super-Cache plugin, is normally used to improve the performance of the WordPress website because it generates static HTML […]
A security expert has discovered a severe vulnerability in BitTorrent Sync that can be exploited by a remote attacker to execute arbitrary code on a vulnerable machine. The security expert Andrea Micalizzi, also known as “rgod,”, has discovered a serious vulnerability in BitTorrent Sync (CVE-2015-2846) can be exploited by a remote attacker to execute arbitrary code. […]