Samsung smart Tv 0-day Vulnerability allows hackers to read attached storage...
ReVuln Ltd has discovered a zero-day vulnerability in the Samsung Smart Tv that allows attackers to retrieve sensitive information, monitor and root the device itself remotely.The vulnerability has...
View ArticleSwami Ramdev official site hacked by Turkish Hacker CyberDead
The official website of Swami Ramdev(divyayoga.com) has been breached by Turkish Hacker CyberDead and defaced with a message "We Will Be Your Curse On Cyber World !"The hack was occurred on last...
View ArticleExploitHub.com hacked by Inj3ct0r Team and stole private exploits worth $24233
The Inj3ct0r team who provide ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers , has hacked into the ExploitHub.com(competitor of 1337day).In an...
View ArticleReveton Ransomware upgraded , now it speaks to victims
Do you ever think a virus can speak to you? It seems like the Ransomware does.Ā The Reveton Ransomware that prevents victims from using their computers and displays rogue message , has been upgraded -...
View ArticleVulnerability Lab discovered persistent XSS vulnerability in Paypal
The Vulnerability Laboratory Research Team discovered persistent web vulnerability in the official Paypal (core) ecommerce website content management system.The security flaw allows remote attackers to...
View ArticleReflected XSS in Vulnerability-Lab site(vulnerability-lab.com)
The Inj3ct0r team has found Reflected Cross Site scripting(XSS) vulnerability in the official website of Vulnerability-Lab.The subdomain of Vulnerability Lab (video.vulnerability-lab.com/) that host...
View ArticleList of Bug Bounty program for PenTesters and Ethical Hackers
"The Best way to improve Network security is hiring hackers" Unfortunately, companies can't hire all best hackers.Ā So the companies has chosen another best way to improve their system security, "Bug...
View ArticleIE vulnerability allows attackers to track mouse cursor, even if IE window is...
Internaut often use virtual keyboard while typing their password in order to protect their data from being stolen from Keyloggers.Ā It seems like a new bug in IE makes the virtual keyboard insecure.A...
View ArticleHackers breached Industrial heating system using backdoor
Earlier this year, Hackers breached the Industrial Control System (ICS) network of a New Jersey air conditioning company by exploiting a backdoor vulnerability in the system, according to an FBI...
View ArticleComodo site inspector , now called as Web Inspector
Comodo, a software company specialising in computer security has changed name for their website malware scanning service from 'site inspector' to WebInspector(webinspector.com). They have also changed...
View ArticleEgyptian hacker ViruS_HimA breached Yahoo server using critical vulnerability
The Egyptian hacker ViruS_HimA has claimed to have discovered a number of critical vulnerabilities in the Yahoo server that allowed him to access Full files backup for one of Yahoo domains and Full...
View ArticleWestboro Baptist Church Spokeswoman Twitter account hacked by UGNazi Hacker...
The UGNazi hacker, CosmoTheGod , hacked into the personal twitter account of Westboro Baptist Church Spokeswoman Shirley Phelps-Roper.After hijacking the account, he started to retweeting tens of...
View Article#BatchWiper, a new data-wiping virus targets Iranian computers
Recently, The Iranian CERT reported that a new piece of malware targets Iranian computers that capable of wiping the files from the infected computers.SophosLabs have analyzed the new sample and...
View ArticleIzz ad-Din al-Qassam Cyber Fighters Continue cyber attacks against US Banks
A group calling itself "Izz ad-Din al-Qassam Cyber Fighters announced another distributed-denial-of-service(DDOS) attack against major banks as part of second week of the Phase 2 of Operation Ababil....
View ArticleMultiple vulnerabilities in Enterpriser16 LoadBalancer v7.1
Vulnerability-Lab researchers have found multiple persistent input validation web vulnerabilities in theĀ Enterpriser16 v7.1 Load Balancer Application. The first vulnerabilities are located in the...
View ArticleMalware masquerades as Sudoku generator spreadsheet
SophosLabs have come across a Microsoft Excel based Sudoku generator spreadsheet that tricks victim into running the malware."if you want to generate a puzzle to solve, you have to enable macros. It...
View Article11 Government websites hacked and defaced by AnonGhost
A hacker group calling itself AnonGhost has hacked into 11 Governmemt websites belong to different countries."To All Governments of the World, We are watching you , we can see what you're doing , we...
View ArticleHacker breached 'Heroes of Newerth' and gained access to user passwords
The S2 Games urges Heroes of Newerth players to change their password , as result of a password security breach.Hackers managed to gain access to user passwords after they've breached a third-party...
View ArticleWordPress Pingback Vulnerability Can Be Leveraged in DDoS Attacks
A pingback security bug exists in the Wordpress blogging platform may be exploited to launch distributed denial-of-service (DDoS) attacks, according to web application security firm Acunetix.The...
View ArticleTurkish Ajan Hacker Group hacks Panda Security Greece
The hacker collective known as 'Turkish Ajan Hacker Group' have breached one of the famous Internet security solution firm, Panda Security, according to Cyber war news.Hackers breached the Greece based...
View Article