Delicious Digg Facebook Favorites More Stumbleupon Twitter

Friday, 29 November 2013

Hackers exploit Ruby on Rails vulnerability to compromise servers, create botnet Hackers are actively exploiting a critical vulnerability in the Ruby on Rails Web application development framework in order to compromise Web servers and create a botnet. The Ruby on Rails development team released a security patch for the vulnerability,...
Posted by Unknown 07:43 in , ,
No comments
Three Charged Over FA Computer Hacking A referee is among three men charged over allegations of computer hacking and dissemination of private information at the FA.                                                     ...

Thursday, 28 November 2013

Posted by Unknown 07:53 in , ,
No comments
Two Singaporeans arrested for hacking president's website          Two Singaporean men have been arrested for allegedly defacing the president's website during a recent rash of cyber attacks in the city-state, police said today.  The men, aged 17 and 42, were arrested following a complaint lodged by the website...
Posted by Unknown 07:50 in , ,
No comments
Phone-hacking trial shown Glenn Mulcaire's investigation whiteboards Glenn Mulcaire's private investigation wall featuring diagrams, lists of telephone numbers, taskings and names of people including Rebekah Wade and tennis player Venus Williams was shown to the jury at the hacking trial on Thursday. The jury were shown five large and small...

Wednesday, 27 November 2013

Posted by Unknown 09:22 in , ,
No comments
College Student Sentenced for stealing passwords to rig Campus Election  Matthew Weaver, a former Cal State San Marcos student was sentenced one year of prison for stealing almost 750 students password and using 630 of those accounts to cast the ballots. 22 years old Mr. Weaver was a third year business student when he planned to win election...
Posted by Unknown 09:19 in , ,
No comments
Hackers convince bank to send $15000 wire transfer with the help of Hacked Gmail account It is time to enable the Google two-step authentication feature.  If the website is providing you additional security feature, it is always good to use that feature.  This news will help you to understand the risk of ignoring the additional security...
How a  bitcoin  transaction  works The basics for a new user As a new user, you can get started with Bitcoin without understanding the technical details. Once you have installed a Bitcoin wallet on your computer or mobile phone, it will generate your first Bitcoin address and you can create more whenever you...

Tuesday, 26 November 2013

Posted by Unknown 04:52 in , , ,
No comments
Bitcoin Payment Solutions (BIPS) hacked, $1 million stolen  Danish bitcoin exchange Bitcoin Payment Solutions (BIPS) is the latest victim of Bitcoin website hacks. The BIPS has temporarily shut down the consumer its consumer wallet initiative after hackers reportedly steal Bitcoins worth more than $1 million(1200+ BTC). The company says...

Monday, 25 November 2013

Cryptocat  Encrypted  chat vulnerable to simple Brute-Force  Decryption Cryptocat, an open source encrypted Web-based chat application, is taking heat from numerous places after a vulnerability was discovered that put chats at risk for relatively simple decryption, experts say. Worse, says researcher Steve Thomas who found...

Sunday, 24 November 2013

Posted by Unknown 04:31 in , ,
No comments
CYBER criminals are using fake social networking profiles in a bid to access data which could allow them to hack bank accounts and company computers. The Scottish Business Resilience Centre (SBRC) has warned that organisations could be attacked by hackers who gather information from networks such as Facebook or Twitter. The group revealed...
Trojan malware steals sensitive data from SAP client apps Attackers also using TrojanSpy:Win32/Gamker.A malware to remotely control infected workstations and access SAP servers A recently discovered malicious program steals log-in passwords and other sensitive information from SAP client applications and allows cybercriminals to access...

Saturday, 23 November 2013

NSA Infected 50,000 Computer Networks Worldwide With Malware:  Time to break out the virus scanner – or, perhaps, nuke your computer from orbit. (It's the only way to be sure.) According to new documents provided by the National Security Agency's favorite foe, former employee-turned-whistleblower Edward Snowden, Dutch newspaper NRC...
Vulnerabilities in RunKeeper website could allow hackers to run XSS worm  A security researcher David Sopas has discovered a Cross site scripting and Cross Site Request Forgery(CSRF) vulnerabilities in the RunKeeper website, official site of popular GPS fitness-tracking application. The POST request in the "Account Setting" page failed...
UK Bank Computers Become Part of Malicious Conficker Botnet Computers in many of the UK's biggest banks and building societies have been infected with malware and become part of the malicious Conficker botnet. Using data collected from three groups, the research project commissioned by the BBC discovered that 20 spam "incidents"...
A police department in Massachusetts has paid $750 for two bitcoins to release files encrypted by the increasingly pervasive Cryptolocker ransomware A computer in the police department of Swansea, Massachusetts was hit by the CryptoLocker ransomware on 6 November. CryptoLocker is a particularly pernicious piece of malware that is typically...

Friday, 22 November 2013

Posted by Unknown 02:56 in , ,
No comments
Weak GitHub passwords lead to account security breach in Code repository GitHub is the latest site to have hackers compromise some user accounts, and in response, it's taking aim at bad passwords. In a blog post, GitHub engineer Shawn Davenport said that a brute force attack from around 40,000 IP addresses revealed some commonly used...
Posted by Unknown 02:52 in , , ,
No comments
More Java-based malware plagues the cross-platform runtime  The same Java vulnerability used in the infamous Flashback malware is now being used as an attack vector for a single piece of malware that can infect both Windows and Mac OS X computers. Security vendors have discovered a new piece of malware that attacks both PCs and Macs....

Search

Our Sponsors