The Hacker News

Syndikovat obsah The Hacker News
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and hackers
Aktualizace: 14 min 56 sek zpět

Android Gets New Anti-Spoofing Feature to Make Biometric Authentication Secure

21 Červen, 2018 - 22:53
Google just announced its plan to introduce a new anti-spoofing feature for its Android operating system that makes its biometric authentication mechanisms more secure than ever. Biometric authentications, like the fingerprint, IRIS, or face recognition technologies, smoothen the process of unlocking devices and applications by making it notably faster and secure. Although biometric systems
Kategorie: Hacking & Security

Thousands of Mobile Apps Expose Their Unprotected Firebase Hosted Databases

21 Červen, 2018 - 13:25
Mobile security researchers have discovered unprotected Firebase databases of thousands of iOS and Android mobile applications that are exposing over 100 million data records, including plain text passwords, user IDs, location, and in some cases, financial records such as banking and cryptocurrency transactions. Google’s Firebase service is one of the most popular back-end development
Kategorie: Hacking & Security

Google Solves Update Issue for Android Apps Installed from Unknown Sources

21 Červen, 2018 - 10:22
If you are wondering how to receive latest updates for an Android app—installed via a 3rd party source or peer-to-peer app sharing—directly from Google Play Store. For security reasons, until now apps installed from third-party sources cannot be updated automatically over-the-air, as Google does not recognize them as Play Store apps and they do not show up in your Google account app list as well
Kategorie: Hacking & Security

Google Developer Discovers a Critical Bug in Modern Web Browsers

20 Červen, 2018 - 20:05
Google researcher has discovered a severe vulnerability in modern web browsers that could have allowed websites you visit to steal the sensitive content of your online accounts from other websites that you have logged-in the same browser. Discovered by Jake Archibald, developer advocate for Google Chrome, the vulnerability resides in the way browsers handle cross-origin requests to video and
Kategorie: Hacking & Security

Popular Flight Tracker Flightradar24 Suffers Data Breach

20 Červen, 2018 - 15:21
One of the world's most popular flight tracking services Flightradar24, which shows real-time aircraft flight information on a map, has suffered a massive data breach that may have compromised email addresses and hashed passwords for more than 230,000 customers. Without revealing any information about the breach publically via their blog or social media accounts, Flightradar24 started sending
Kategorie: Hacking & Security

OpenBSD Disables Intel Hyper-Threading to Prevent Spectre-Class Attacks

20 Červen, 2018 - 11:44
Security-oriented BSD operating system OpenBSD has decided to disable support for Intel's hyper-threading performance-boosting feature, citing security concerns over Spectre-style timing attacks. Introduced in 2002, Hyper-threading is Intel's implementation of Simultaneous Multi-Threading (SMT) that allows the operating system to use a virtual core for each physical core present in processors
Kategorie: Hacking & Security

Magento Hackers Using Simple Evasion Trick to Reinfect Sites With Malware

20 Červen, 2018 - 09:28
Security researchers have been warning of a new trick that cybercriminals are leveraging to hide their malicious code designed to re-introduce the infection to steal confidential information from Magento based online e-commerce websites. So, if you have already cleaned up your hacked Magento website, there are chances your website is still leaking login credentials and credit card details of
Kategorie: Hacking & Security

Email Phishers Using A Simple Way to Bypass MS Office 365 Protection

19 Červen, 2018 - 22:19
Security researchers have been warning about a simple technique that cyber criminals and email scammers are using in the wild to bypass most AI-powered phishing detection mechanisms implemented by widely used email services and web security scanners. Dubbed ZeroFont, the technique involves inserting hidden words with a font size of zero within the actual content of a phishing email, keeping
Kategorie: Hacking & Security

Hackers Who Hit Winter Olympics 2018 Are Still Alive and Kicking

19 Červen, 2018 - 16:07
Remember the 'Olympic Destroyer' cyber attack? The group behind it is still alive, kicking and has now been found targeting biological and chemical threat prevention laboratories in Europe and Ukraine, and a few financial organisation in Russia. Earlier this year, an unknown group of notorious hackers targeted Winter Olympic Games 2018, held in South Korea, using a destructive malware that
Kategorie: Hacking & Security

TRON Cryptocurrency Founder Buys BitTorrent, µTorrent for $140 Million

19 Červen, 2018 - 11:20
BitTorrent, the company which owns the popular file-sharing client uTorrent, has quietly been sold for $140 million in cash to Justin Sun, the founder of blockchain-focused startup TRON. TRON is a decentralized entertainment and content-sharing platform that uses blockchain and distributed storage technology. It allows users to publish content without having to use third-party platforms such
Kategorie: Hacking & Security

Ex-CIA employee charged with leaking 'Vault 7' hacking tools to Wikileaks

19 Červen, 2018 - 10:00
A 29-year-old former CIA computer programmer who was charged with possession of child pornography last year has now been charged with masterminding the largest leak of classified information in the agency's history. Joshua Adam Schulte, who once created malware for both the CIA and NSA to break into adversaries computers, was indicted Monday by the Department of Justice on 13 charges of
Kategorie: Hacking & Security

Apple macOS Bug Reveals Cache of Sensitive Data from Encrypted Drives

18 Červen, 2018 - 18:37
Security researchers are warning of almost a decade old issue with one of the Apple's macOS feature which was designed for users' convenience but is potentially exposing the contents of files stored on password-protected encrypted drives. Earlier this month, security researcher Wojciech Regula from SecuRing published a blog post, about the "Quick Look" feature in macOS that helps users
Kategorie: Hacking & Security

Epic Games Fortnite for Android–APK Downloads Leads to Malware

18 Červen, 2018 - 15:12
Given Fortnite's current popularity and craziness across the globe, we understand if you have been searching the web for download links to Fortnite APK for Android phone. However, you are not alone, thousands of people out there are also searching tutorials and links for, "how to install Fortnite on Android" or "how to download Fortnite for Android" on the Internet. The app has taken the
Kategorie: Hacking & Security

GnuPG Flaw in Encryption Tools Lets Attackers Spoof Anyone's Signature

15 Červen, 2018 - 11:52
A security researcher has discovered a critical vulnerability in some of the world's most popular and widely used email encryption clients that use OpenPGP standard and rely on GnuPG for encrypting and digitally signing messages. The disclosure comes almost a month after researchers revealed a series of flaws, dubbed eFail, in PGP and S/Mime encryption tools that could allow attackers to
Kategorie: Hacking & Security

Chinese Hackers Carried Out Country-Level Watering Hole Attack

14 Červen, 2018 - 17:10
Cybersecurity researchers have uncovered an espionage campaign that has targeted a national data center of an unnamed central Asian country in order to conduct watering hole attacks. The campaign is believed to be active covertly since fall 2017 but was spotted in March by security researchers from Kaspersky Labs, who have attributed these attacks to a Chinese-speaking threat actor group called
Kategorie: Hacking & Security

New 'Lazy FP State Restore' Vulnerability Found in All Modern Intel CPUs

14 Červen, 2018 - 09:59
Hell Yeah! Another security vulnerability has been discovered in Intel chips that affects the processor's speculative execution technology—like Specter and Meltdown—and could potentially be exploited to access sensitive information, including encryption related data. Dubbed Lazy FP State Restore, the vulnerability (CVE-2018-3665) within Intel Core and Xeon processors has just been confirmed
Kategorie: Hacking & Security

OnePlus 6 Flaw Allows to Boot Any Image Even With Locked Bootloader

13 Červen, 2018 - 22:46
Have you recently bought a OnePlus 6? Don't leave your phone unattended. A serious vulnerability has been discovered in the OnePlus 6 bootloader that makes it possible for someone to boot arbitrary or modified images to take full admin control of your phone—even if the bootloader is locked. A bootloader is part of the phone's built-in firmware and locking it down stops users from replacing
Kategorie: Hacking & Security

Special Price Drop—Get Secure VPN Service For Lifetime

13 Červen, 2018 - 16:58
PRIVACY – a bit of an Internet buzzword nowadays, because the business model of the Internet has now shifted towards data collection. Today, most users surf the web unaware of the fact that websites and online services collect their personal information, including search histories, location, and buying habits and make millions by sharing your data with advertisers and marketers. If this is
Kategorie: Hacking & Security

Microsoft June 2018 Patch Tuesday Pushes 11 Critical Security Updates

13 Červen, 2018 - 16:44
It's time to gear up for the latest June 2018 Microsoft security patch updates. Microsoft today released security patch updates for more than 50 vulnerabilities, affecting Windows, Internet Explorer, Edge, MS Office, MS Office Exchange Server, ChakraCore, and Adobe Flash Player—11 of which are rated critical and 39 as important in severity. Only one of these vulnerabilities, a remote code
Kategorie: Hacking & Security

Cortana Software Could Help Anyone Unlock Your Windows 10 Computer

13 Červen, 2018 - 16:40
Cortana, an artificial intelligence-based smart assistant that Microsoft has built into every version of Windows 10, could help attackers unlock your system password. With its latest patch Tuesday release, Microsoft has pushed an important update to address an easily exploitable vulnerability in Cortana that could allow hackers to break into a locked Windows 10 system and execute malicious
Kategorie: Hacking & Security