Quantcast
Channel: E Hacking News - Latest Hacker News and IT Security News
Browsing all 6409 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

BLOCKCHAINS BEING REPLACED BY SAFEBOX IN CRYPTOCURRENCY

(pc-Google Images)Thanks to the presence of tech-enthusiasts, one needs to possess many cryptocurrencies that are rather inaccessible for average users. PascalCoin – a new cryptocurrency – is already...

View Article


Image may be NSFW.
Clik here to view.

UIDAI REPORTS BREACH IN BIOMETRIC DATA FROM AADHAAR ACCESS

(pc-Google Images)A case of Aadhaar data breach has resulted in serious privacy concerns and raised questions over the security of the much spoken biometric data in possession of the Unique...

View Article


Image may be NSFW.
Clik here to view.

BACKEND PROVIDER LEAD TO BREACH IN CARD DETAILS OF 40 COMPANIES

(pc-Google Images)Shoppers of 40 online stores have gotten their bank card numbers and addresses captured by a malware infection at backend provider Aptos.The security breach occurred during the end of...

View Article

Image may be NSFW.
Clik here to view.

RANSOMWARE ATTACKS AT LARGE WITH 752% HIKE IN 2016

(pc-Google Images)2016 was indeed the year of online extortion. Cyber threats reached an all-time high with more than thousand attacks every month, ransomware and Business Email Compromise (BEC) scams...

View Article

Image may be NSFW.
Clik here to view.

FBI ADVISES CIVILIANS TO FIGHT AGAINST RANSOMWARE ATTACKERS

(pc-Google Images)Being attacked by a ransomware virus can be as terrifying of an experience as anything for both citizens and business owners as well. The threat of losing years’ worth of data and...

View Article


Image may be NSFW.
Clik here to view.

WINDOWS MALWARE INFECTING ANDROID APPS THROUGH PLAY STORE

(pc-Google Images)Researchers are scratching their heads over the mystery where 132 Android apps in the official Google Play store attempted to infect smartphones with Windows malware.The apps, which...

View Article

Wikileaks released data trove of CIA hacking secretes

On Tuesday, WikiLeaks released an extensive data trove that contained documents which prove that Central Intelligence Agency (CIA)  had spying operations and hacking tools.The operation was codenamed,...

View Article

CIA created and lost malware for iOS, claims Wikileaks

WikiLeaks has targeted CIA yet again in a new data dump about its technical capabilities when it started its new series of leaks on the U.S. Central Intelligence Agency on Tuesday (March 07). The code...

View Article


Image may be NSFW.
Clik here to view.

Interview with Security Researcher Arthur Garipov

At the recent nullcon conference, E-Hacking News had the chance to interview Arthur Garipov, Senior Research Specialist at Positive Technologies, who presented his research on "Drone and IoT Hacking"...

View Article


Image may be NSFW.
Clik here to view.

The tech giants react to CIA dump

The series of documents leaked by WikiLeaks against CIA is reported to have made use of previously unknown flaws in Apple's iOS operating system.Over this issue, several of the tech firms whose...

View Article

20% of the dark websites shut down by an anonymous hacker

Recently 20% of the dark web websites have been taken off by a hacker claiming to be from the very famous Vigilant group know as 'Anonymous'. The dark web is associated with the illicit content,...

View Article

Vulnerability found in Service module of Drupal

When a team of researchers from Ambionics audited the Service module of Drupal, they found an insecure use of unserialize(). Using this vulnerability the exploiters could easily exploit SQL injection...

View Article

Image may be NSFW.
Clik here to view.

No app can stop CIA from reading your messages, says Pavel Durov

In an article titled "What does the "Year Zero" and "Vault 7" stuff from Wikileaks mean?", Pavel Durov, the Founder of social network Vkontakte and messenger Telegram, explained how CIA can read your...

View Article


Smart Machines during escalating Cyber Warfare

Cyber warfare is rapidly increasing not just on companies, but nowadays there is no personal privacy or security either which is soon to turn worse. There is a gaping hole of trained workers in the...

View Article

Image may be NSFW.
Clik here to view.

Interview with BugsBounty.com founder Himanshu Sharma

We had a chance to interview Himanshu Sharma, Founder of BugsBounty.com he has found security bugs in top organizations including Google, Facebook, Apple etc.How did you get interested in the field of...

View Article


Image may be NSFW.
Clik here to view.

Europol blames technology behind ‘all serious crime’

In a new report, Europe’s police agency has warned that new and emerging technologies are being used by criminal gangs operating in nearly every aspect of the crime.“Technology is a key component of...

View Article

UK Political Parties next target for Russian Hackers

Spies at the Government Communications Headquarters (GCHQ) has issued a warning and called an emergency meeting of all the leaders of  Britain’s political parties against the hacking threats from...

View Article


Image may be NSFW.
Clik here to view.

Ransomware, Banking Malware, DDoS attacks are UK’s top frauds

UK’s national law enforcement and police agency, National Crime Agency (NCA) officially announced that bitcoin ransomware, banking malware, distributed denial of service (DDoS) and business email...

View Article

Image may be NSFW.
Clik here to view.

More than 33 million US employee records leaked

A database containing more than 33 million records of corporate and government employees has been leaked online from a huge commercial corporate database which includes information like names, job...

View Article

Hackers from Russia and Canada accused of hacking Yahoo: US Justice Department

The US Department of Justice accused hackers from Russia and Canada for hacking Yahoo back in 2013, reported March 15 Bloomberg.An unnamed source provided the data which shows that there are four...

View Article
Browsing all 6409 articles
Browse latest View live