Quantcast
Channel: E Hacking News - Latest Hacker News and IT Security News
Browsing all 6409 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Twitter Spammers abuse Google search

We reported few days ago about a new spam campaign that abuses open-redirect vulnerability in popular websites including CNN, Yahoo and Ask.com.Today, Security researcher Janne Ahlberg discovered...

View Article


Image may be NSFW.
Clik here to view.

Handheld Malware Scanner made with Raspberry Pi

We learned earlier this year that U.S based power plant systems were infected with a malware after an employee used his infected USB drive to update software. Last year, the notorious Stuxnet worm was...

View Article


Image may be NSFW.
Clik here to view.

New 'KeyBoy' malware targets users from India, Vietnam

Security researchers have discovered a new piece of malware that targets users from India, Vietnam.  The backdoor is designed to steal information from the victim.The malware campaign uses well-crafted...

View Article

Image may be NSFW.
Clik here to view.

New Variant of Zeus malware can automatically spread via USB flash drive

Here comes the new version of notorious ZBot which is capable of spreading via USB flash drive. Zeus/Zbot is the notorious banking trojan, has been around many years since 2007, that steals banking...

View Article

Image may be NSFW.
Clik here to view.

ZPanel security vulnerability allows hacker to reset the root password

A critical remote code execution vulnerability has been identified in ZPanel that allows hackers to reset  the root password and gain access to the server.According to the forum post, the latest stable...

View Article


Image may be NSFW.
Clik here to view.

Security Alert: Linux Kernel Privilege escalation exploit affects Android...

Android Operating System is based on the Linux, means the vulnerabilities affecting Linux kernel have the possibility of being exploited in the Android platform. It appears the recently discovered...

View Article

Latest WordPress version 3.5.1 vulnerable to Denial of Service

A security researcher Krzysztof Katowicz-Kowalewski has discovered a critical DOS vulnerability in the latest version of Wordpress (v3.5.1) that allows cybercriminals to cause Denial of service.The...

View Article

Image may be NSFW.
Clik here to view.

iOS 7 Beta Hack allows anyone to Bypass iPhone Lockscreen

Every time Apple attempts to improve the security in the new version of iOS, it ends up with a new security bug.Here comes another iPhone hack to bypass the iOS Lock Screen.  A Spanish iPhone users...

View Article


Image may be NSFW.
Clik here to view.

Gamarue malware abuses SourceForge to host malicious files

 One of the leading source code repository SourceForge is found to be abused cybercriminals to host their malicious files which is later being used by the Gamarue malware.In their malware analysis...

View Article


Image may be NSFW.
Clik here to view.

Researcher found a way to Hack Facebook accounts with the help of Quora

An Indian Security researcher Prakhar Prasad has found a way to hack the facebook accounts by exploiting an open redirection flaw in Quora - one of the famous Question&Answer website.Quora allows...

View Article

Image may be NSFW.
Clik here to view.

Mumbai Police salary accounts hacked, Money withdrawn in Greece

Cybercriminals have reportedly targeted the Salary accounts of Mumbai Police and managed to withdraw money from their account.According to NDTV report, cybercriminals have managed to withdraw money...

View Article

Image may be NSFW.
Clik here to view.

CNN's Political Ticker website hacked, Fake News article posted

Hackers breached CNN's Political Ticker blog(politicalticker.blogs.cnn.com) and manged to post false news story titled "Anonymous Bitcoin operator Btc-e.com goes out of business". The fake news was...

View Article

Image may be NSFW.
Clik here to view.

Hacking the Hackers :Carberp Panel vulnerable to Remote Code Execution

Recent Carberp source code leak gave an opportunity for researchers to investigate the bootkit and other components of the Trojan.  While everyone are looking at the source code of malicious parts, a...

View Article


Image may be NSFW.
Clik here to view.

Incapsula Login Protect - Boost Your Website Security with Two Factor...

Exclusive: You want to Protect your Admin Panel and Feeling just a password is not good enough to secure your website? Here, Incapsula is introducing a newest security feature "Login Protect" to boost...

View Article

Crypted Files in Cyber Espionage

Cryptors are programs which are used for making files FUD(file undetect by antivirus)The cryptor can make a EXE file not detectable by antivirus. Most cryptors are common and once u buy license can be...

View Article


Image may be NSFW.
Clik here to view.

UbiSoft website hacked, urges users to change passwords

 Ubisoft, a French global video game publisher and developer,has confirmed the security breach on their website and sent out email to their customers urging them to change the passwords. "We instantly...

View Article

Image may be NSFW.
Clik here to view.

Security Engineer claims Motorola Collecting Sensitive data from Droid X2

Ben Lincoln, a Security Engineer claims that his Motorola Droid X2 Device is sending sensitive data such as username, email id, password & GPS Coordinates to the website owned by Motorola.What is...

View Article


Image may be NSFW.
Clik here to view.

Fingerprints may now needed to get new SIM cards in India

Fraudulent SIM cards being circulated through small retailers poses a potential risk to the National Security. To bring end to misuse of the SIM Cards and reduce security issues, the Home Ministry has...

View Article

Image may be NSFW.
Clik here to view.

South Korean Defense Ministry Bans Smartphones usage to prevent Military data...

South Korean Defense Ministry is banning their staffs from using the Interent connectivity and Camera functions inside the Ministry's building in a move to prevent the Military information leaks,...

View Article

Image may be NSFW.
Clik here to view.

Android Vulnerability allows hackers to Turn Legitimate Application into Virus

All Android applications contain a signature which helps the Android to determine if the app is legitimate and to make sure the apk hasn't been tampered with or modified.Security Researchers from...

View Article
Browsing all 6409 articles
Browse latest View live