Delicious Digg Facebook Favorites More Stumbleupon Twitter

Thursday, 5 December 2013

Posted by Unknown 18:46 in , ,
No comments
JPMorgan Chase admits network hack; 465,000 card users' data stolen The banking giant suffered a network breach this year that resulted in a large data breach — though, funds or critical personal information are not thought to have been stolen. JPMorgan Chase has warned some 465,000 prepaid cash card customers that their personal information...
Posted by Unknown 04:20 in , ,
No comments
NSA tracking cellphone locations worldwide, Snowden documents show The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable. The records feed a vast...
Posted by Unknown 04:02 in , ,
No comments
Mass hack affects almost 2 million Internet accounts Hackers stole almost 1.6 million login credentials and 320,000 e-mail credentials. Almost 2 million accounts on Facebook, Google, Twitter, Yahoo and other social media and Internet sites have been breached, according to a Chicago-based cybersecurity firm. The hackers stole 1.58 million...

Wednesday, 4 December 2013

Posted by Unknown 05:14 in , ,
No comments
Logins stolen from Facebook, Google, ADP payroll processor Attackers are using the 'Pony' botnet command-and-control server software Two million logins and passwords from services such as Facebook, Google and Twitter have been found on a Netherlands-based server, part of a large botnet using controller software nicknamed "Pony." Another...
Prototype Malware Spreads Via Audio Signals:  The digital world has its fair share of benefits, but do be aware that there are also dangers and pitfalls to look out for as well. Computer viruses as well as malware have evolved over the years, that even the mobile platform is not spared. Well, researchers have come up with another way that...

Tuesday, 3 December 2013

Posted by Unknown 05:25 in , ,
No comments
UK man accused of hacking US government computers A British man has been arrested and charged with hacking into computer systems of the US army, Nasa, the Environmental Protection Agency and other agencies at a cost of millions of dollars to the federal government. Lauri Love, 28, of Stradishall, England, and his partners stole...
Backdoor in D-link router allows attackers full access D-Link has patched a backdoor present in a number of its routers that was publicized almost two months ago and could allow an attacker to remotely access the administrative panel on the hardware, run code and make any number of changes. The Thanksgiving patch parade...
Posted by Unknown 04:55 in , ,
No comments
Vulnerability in Android 4.3 allow to remove Device lock There is a vulnerability in Android 4.3 Jelly Bean that enables a malicious app to disable all of the security locks on a given device, leaving it open to further attacks. Jelly Bean is the most widely deployed version of Android right now. The vulnerability in Android exists in the way...
Posted by Unknown 04:51 in , ,
No comments
State Bank of Patiala hacked and defaced by Pakistani Hacker A Pakistani hacker with the online handle " Kai-H4xOrR" from PAKISTAN HAXORS CREW(PHC), has hacked into the State Bank of Patiala(SBP) sub-domain and managed to deface the website. In the defacement page, hacker stated that the security breach is payback "For Hacking Sui Gas Site". "And...

Sunday, 1 December 2013

Posted by Unknown 06:54 in , , ,
No comments
Neverquest Trojan: Built to Steal from Hundreds of Banks Neverquest is a new banking trojan that spreads itself via social media, email and file transfer protocols. It possesses the capacity to recognize hundreds of online banking and other financial sites. When an infected user attempts to login to one of the sites the trojan reacts by activating...
Posted by Unknown 01:21 in , , ,
No comments
New Linux worm targets routers, cameras,  “Internet of things” devices Researchers have discovered a Linux worm capable of infecting a wide range of home routers, set-top boxes, security cameras, and other consumer devices that are increasingly equipped with an Internet connection. Linux.Darlloz, as the worm has been dubbed, is now classified...
Posted by Unknown 00:48 in , ,
No comments
Turkish Hackers Hacks official Vodafone Iceland website, leaks 77,000 accounts and SMS logs Famous Turkish hacker going with the handle of @AgentCorporatio from Turkish Agent Hacker Group has hacked and defaced the official website of telecom giant Vodafone Iceland. As a result of hack, the hacker has leaked around...

Friday, 29 November 2013

Hackers exploit Ruby on Rails vulnerability to compromise servers, create botnet Hackers are actively exploiting a critical vulnerability in the Ruby on Rails Web application development framework in order to compromise Web servers and create a botnet. The Ruby on Rails development team released a security patch for the vulnerability,...
Posted by Unknown 07:43 in , ,
No comments
Three Charged Over FA Computer Hacking A referee is among three men charged over allegations of computer hacking and dissemination of private information at the FA.                                                     ...

Thursday, 28 November 2013

Posted by Unknown 07:53 in , ,
No comments
Two Singaporeans arrested for hacking president's website          Two Singaporean men have been arrested for allegedly defacing the president's website during a recent rash of cyber attacks in the city-state, police said today.  The men, aged 17 and 42, were arrested following a complaint lodged by the website...
Posted by Unknown 07:50 in , ,
No comments
Phone-hacking trial shown Glenn Mulcaire's investigation whiteboards Glenn Mulcaire's private investigation wall featuring diagrams, lists of telephone numbers, taskings and names of people including Rebekah Wade and tennis player Venus Williams was shown to the jury at the hacking trial on Thursday. The jury were shown five large and small...

Wednesday, 27 November 2013

Posted by Unknown 09:22 in , ,
No comments
College Student Sentenced for stealing passwords to rig Campus Election  Matthew Weaver, a former Cal State San Marcos student was sentenced one year of prison for stealing almost 750 students password and using 630 of those accounts to cast the ballots. 22 years old Mr. Weaver was a third year business student when he planned to win election...
Posted by Unknown 09:19 in , ,
No comments
Hackers convince bank to send $15000 wire transfer with the help of Hacked Gmail account It is time to enable the Google two-step authentication feature.  If the website is providing you additional security feature, it is always good to use that feature.  This news will help you to understand the risk of ignoring the additional security...
How a  bitcoin  transaction  works The basics for a new user As a new user, you can get started with Bitcoin without understanding the technical details. Once you have installed a Bitcoin wallet on your computer or mobile phone, it will generate your first Bitcoin address and you can create more whenever you...

Search

Our Sponsors