Operators of the XDA-developers forum explained how it is possible to hack Windows Phone 8.1 to run any app package in any Program directory. XDA-developers have discovered a new vulnerability in latest Microsoft OS Windows Phone 8.1 that could easily be exploited by attackers to compromise a Nokia Lumia phone running it. The XDA Developers member […]
The State Department has taken the unprecedented step of shutting down its entire unclassified email system in response to a suspected cyber attack. The State Department has decided of shutting down its entire unclassified email system in response to a suspected cyber attack. A senior department official at the State Department, which reported the facts on […]
The International bank Hong Kong and Shanghai Banking Corporation (HSBC) announced that its systems suffered a major data breach. Last week the International bank Hong Kong and Shanghai Banking Corporation (HSBC) has announced that its computer networks in Turkey were breached by unknowns. The data breach has exposed the personal data of about 2.7 million customers of the HSBC bank, […]
The research revealed that more than 81 percent of Tor clients can be de-anonymized by exploiting a new traffic analysis attack based on Netflow technology. A team of researchers conducted a study between 2008 and 2014 on the de-anonymization of the Tor users, the team worked to disclose their originating IP addresses. A group led by […]
Two individuals exploited knowledge of the default passcode to hack ATMs and steal more than $400,000 in 18 months from the targeted machines. Another story of ATM hacking is circulating on the web, once again criminals exploited the knowledge of the default configuration of the machine, factory-set passcodes. The hackers haven’t run a brute-force attack against […]
The researcher Karsten Nohl and his team presented an update on their BadUSB study.It is impossible to discriminate patchable devices from unpatchable ones. Earlier August 2014 the security expert Karsten Nohl and his team discovered that an attacker could exploit a new class of attacks based on a USB device to compromise a targeted machine. […]
Russian Internet Traffic redirected by a Chinese operator due to routing errors caused by a weakness in the Border gateway protocol (BGP). The Russian Internet traffic in several circumstances has been re-routed outside the country, the incidents seem to be caused by routing errors made by China Telecom. The news has been published by the Internet monitoring service Dyn in a blog […]
State-sponsored hackers are suspected of breaching the systems of the United States Postal Service exposing the data of more than 800,000 employees. The U.S. Postal Service has suffered a major data breach that may have exposed the personal information of more than 800,000 employees, including data on customers who contacted Postal Service Customer Care Center […]
Kaspersky revealed that a crew of criminals dubbed Darkhotel targets executives traveling across Asia through hotel internet networks. Security experts at Kaspersky Lab uncovered the Darkhotel espionage campaign, which is ongoing for at least four years while targeting selected corporate executives traveling abroad. According to the experts, threat actors behind the Darkhotel campaign aim to steal sensitive data from executives while […]
A study published by Google demonstrates that manual phishing attacks are the simplest and most effective method for hacking email accounts. A study recently published by Google demonstrates that so-called manual phishing attacks are the simplest and most effective method for hijacking users’ email address. Let’s consider that the manual phishing attacks, as suggested by the name, doesn’t use […]