hacking

  1. B

    Using Windows 7 Will Get You Hacked?

    Hi, I know that Windows 7 support has ended back in January this year. I saw a comment that said if you keep using it still you will get hacked. How true is that comment? How will I get hacked if I don't go to malicious websites and use NOD32? Also, can my PC get hacked just by being on idle...
  2. AlphaAtlas

    Citrix Hacked by a Cyberespionage Group

    Cloud service, VoIP and remote management software provider Citrix has reportedly been hit by an Irianian-linked hacker group. A little less than week ago, Citrix posted a notice on their website saying the FBI believed "international cyber criminals gained access to the internal Citrix...
  3. AlphaAtlas

    Hackers Can Hijack Cars with Alarm Apps

    Security researchers from Pen Test Partners claim they've found serious security vulnerabilities in high end car alarm services from Viper and Pandora. In a quick demonstration, the researchers showed an potential attacker could pull up behind a moving vehicle with one of the commercial security...
  4. AlphaAtlas

    Developers Install Windows 10 on an Nintendo Switch

    A developer and hacker who goes by "Ben" on Twitter has allegedly shoehorned Windows 10 for ARM into an Nintendo Switch. This is reportedly the same hacker who helped get Windows 10 running on the Lumia 950 and the Raspberry Pi 3, but the Switch doesn't appear to be quite as functional as those...
  5. AlphaAtlas

    Software Pirates are Allegedly Hijacking Apple's Enterprise Developer Certificates

    Apple's Developer Enterprise Program has gotten quite a bit of scrutiny after both Facebook and Google seemingly violated the program's guidelines. Now, Reuters reports that "software pirates" are abusing the program to distribute modified versions of apps that enable users to "stream music...
  6. AlphaAtlas

    Engineers Automate Software Exploitation and Patching

    IEEE Spectrum reports that engineers from Carnegie Mellon University won a DARPA challenge to develop a machine that finds, and fixes, software exploits in bytecode all by itself. "Mayhem," as they call it, reportedly found over 14,000 unique vulnerabilities within the entire Debian Linux...
  7. cageymaru

    U.S. Department of Justice Has Indicted Chinese State-Sponsored Hackers

    Chinese hackers Zhu Hua and Zhang Shilong have been indicted by the U.S. Department of Justice as part of a Chinese state-sponsored hacking group called "Advanced Persistent Threat" or "APT 10." They are accused of hacking into scores of technology companies, the military, U.S. Department of...
  8. cageymaru

    Chinese Hackers Are Targeting U.S. Military Contractors

    The Wall Street Journal is reporting that the U.S. Navy and Air Force are the focus of new cyberattacks as the hackers search the computer systems of contractors to find classified advanced military technology. A Chinese hacking group known as Temp.Periscope or Leviathan is using email phishing...
  9. cageymaru

    Chinese Intelligence Officers Conspired to Steal Aviation Turbofan Engine Technology

    Over a period of 5 years, Chinese intelligence officers Zha Rong and Chai Meng, along with other co-conspirators sought to involve co-opted company insiders to hack and steal sensitive commercial aviation and technological data from firms in the United States and abroad. The intelligence...
  10. cageymaru

    Librarian of Congress Adds New Exemptions for Legally Hacking DRM to Repair Devices

    The Librarian of Congress and US Copyright Office has proposed adding new rules that would make hacking DRM legal if done to repair devices purchased legally. Devices such as smartphones, tractors, cars, computers, and more can have their firmware hacked to facilitate repairs to the devices...
  11. DooKey

    Ever Wonder How Much Hacking Tools Cost?

    By now most of us have heard about the Dark Web and know you can buy all sorts of illegal stuff there. However, I bet you didn't know how little you have to spend to be a scammer. It's unbelievable how low the prices are for hacking tools. Prices range from less than 2GBP to more than 38,000GBP...
  12. R

    $100 DLC Comes With Password Stealing Malware for DRM

    A few months ago, a Reddit user by the name of crankyrecursion noticed that the A320 addon from FlightSimLabs contained a file called "test.exe." This file turned out to be used to extract a users passwords from Google Chrome if a pirated key was used, and send your passwords back to...
  13. FrgMstr

    Misfortunate Misconfiguration = Fortune!

    Researchers from Chinese Cyber Security Firm 360 Netlab have discovered that over $20 million dollars worth of Ethereum has been stolen from users with misconfigured Ethereum applications since March of this year. Just to add a little flavor to the conversation, there were only 3.96 Etherium on...
  14. FrgMstr

    Bitcoin Down Sharply After Exchange Hack

    Reuters is reporting that a relatively small South Korean cryptocurrency exchange has been hacked to the tune of about $37M worth of virtual currency. This has sent Bitcoin to a two month low price. In a statement on its website on Monday, Coinrail said its system was hit by “cyber intrusion”...
  15. DooKey

    DOJ Charges Nine Iranians With Hacking Hundreds of Universities and Other Victims

    The DOJ has charged nine Iranian citizens with the hacking of hundreds of universities, companies, and others. They stole research, proprietary data and intellectual property. The hacking was done under the auspices of the Mabna Institute in Tehran on behalf of the Islamic Revolutionary Guard...
  16. R

    fail0verflow Gets Linux GUI Running On Nintendo Switch

    We reported earlier this month that hacker group fail0verflow had gotten Linux to run on the Nintendo Switch due to a flaw in the boot ROM of the Nvidia Tegra X1 SOC. Now fail0verflow has upped the ante by posting a video on Twitter of a fully working Linux GUI on the switch. Slashgear is...
  17. R

    Hacker Group Gets Linux Running On Nintendo Switch

    Hacker group fail0verflow has gotten Linux to run on the Nintendo Switch. According to a report on TechCruch, fail0verflow says there is a flaw in the boot ROM of Nvidia's Tegra X1 SoC. When the console boots, it excecutes code in the ROM with instructions about the boot process. The boot ROM is...
  18. DooKey

    Hackers Continue to Abuse Digital Certs

    It's not a new thing for hackers to abuse stolen digital code-signing certificates, but the scope and scale of it appears to be much more wide spread than security researchers thought. The University of Maryland found 72 compromised certificates after analyzing field data collected by Symantec...
  19. R

    Man Who Hacked Lottery Sentenced To 25 Years

    Eddie Tipton, who was suspected of hacking the Iowa offices of the Multi-State Lottery Association was sentenced to 25 years in prison today. Red flags were first raised in 2010 when Tipton tried to collect a 16.5 million Hot Lotto ticket. In addition to Iowa, Tipton admitted to fixing games in...
  20. R

    Russian Citizen Sentenced to 46 Months in Prison for Involvement in Global Botnet Conspiracy

    In a press release from the US Department of Justice, a Russian citizen Maxim Senakh was sentenced to 46 months in prison for conspiracy to commit wire fraud and to violate the Computer Fraud and Abuse Act. Senakh was using malware to infect tens of thousands of servers in order to generate...
  21. R

    WikiLeaks Releases Docs on 'Dumbo' CIA Tool Allowing Control of Webcams

    Wikileaks released new documents today from the "Dumbo" project of the CIA. This tool is run of a USB stick, and allows identifying, controlling and manipulating monitoring systems on a target computer running Windows. The tool identifies microphones and webcams, that are either locally...
  22. cageymaru

    Google's Cloud Vision API is Easily Fooled by Noise

    Google has created a machine learning platform called the Cloud Vision API that can categorize images looking at them. It also can pick out faces in a crowd and identify them, identify inappropriate content, determine that a house on lakefront property is different than a lake ecosystem...
  23. Zarathustra[H]

    Congressman Introduces Bill That Would Allow Victims To 'Hack Back' After Attacks

    Tech dirt has the, well, the dirt, on some very early stage legislation working its way through congress. It would give victims of hacking legal protection to hack their attackers back. When I first read this article, I got a bad vibe from it, as it sounded like vigilante justice, but...
  24. Zarathustra[H]

    Wikileaks Exposes CIA Hacking Tools

    Apparently CIA's archive of tools used to compromise targeted systems was recently circulated in an unauthorized manner among former CIA contractors and hackers, one or more of which provided the information to Wikileaks. This leak outlines how CIA has been able to compromise platforms like...
Back
Top