Tag: Hackers

CyberCaliphate Hacks Twitter Account of US Central Command

Earlier this morning, the official Twitter account of US Central Command (CENTCOM) was apparently hacked by members of the ISIS terrorist organization in the form of public protest from the much maligned group. “AMERICAN SOLDIERS, WE ARE COMING, WATCH YOUR BACK. ISIS,” one tweet read, along with a link to a Pastebin document that pointed […]

vendor

Dare Devil PoS Malware Targets ATMs & Ticket Machines

Hackers are taking advantage of new malware called Dare Devil (stylized as “d4re|dev1|”) created to steal financial payment card data from PoS terminals and also attack electronic kiosks and vending systems. Dare Devil was discovered by security researchers from IntelCrawler, a cyber intelligence firm. They found the malware can steal data from multiple point of […]

Pakistani Hackers Allegedly Deface Official Indian Sites

A team of Pakistani hackers have allegedly hacked and defaced the websites of Indian regional governments with offensive remarks on Indian PM Narendra Modi. Of the websites defaced were two governmental portals for the Gujarat state – Commissionerate of Higher Education and the Agricultural Produce Market Committee of Ahmedabad (APMC). The sites were also posted […]

north korea

North Korea Denies Phone Hacking Allegations

North Korean authorities have denied allegations that it sponsored smartphone hacking attempts on South Korea, following reports last week. South Korea’s NIS news agency reported that North Korean hackers had loaded mobile games with malware that were then downloaded by up to 20,000 Southerners to spy on the action of their inimical neighbors. However, this […]

white house

Russian Hackers Allegedly Breach White House Computers

Hackers working for the Russian government have been accused of breaching White House computers, according to the Washington Post. Speaking on the condition of anonymity, a number of sources told the Post that several services were disrupted by the breach, which occurred two to three weeks ago. “In the course of assessing recent threats, we […]

iSIGHT

Russian ‘Sandworm’ Virus Discovered, NATO Targeted

Researchers from the security firm iSight have announced their discovery of a new zero-day exploit, Sandworm, that had “wormed” its way into the networks of several major government organizations including NATO and Ukranian institutions. Because of the specific nature of the targets listed, iSight was quick to pick up a trail on the culprits, all […]

HITRUST Announces Healthcare Security Program, CTX

With cyber attacks targeting the healthcare sector evolving and increasing at a significant pace, HITRUST (Health Information Trust Alliance) has announced Cyber Threat XChange (CTX) to automate cyber threat analysis and intelligence and distribute actionable indicators in an electronically consumable format that firms can use to improve their cyber defenses. HITRUST stated the CTX would […]

BadUSB Source Code Published on Github

Back in August of this year, we wrote about a new form of malware called BadUSB, which was capable of infecting billions of devices currently in operation around the globe, everything from mice to keyboard, and even simple flash-based thumb drives. The flaw was originally discovered by researchers at Security Research Labs in Berlin, which […]

‘Tunneling’ Your Way Through The Bad Side of the Internet

Most virtual private networks use ‘tunneling’ to create a secure private network across the Internet. To put it simply, a tunnel is the link between two places. It is actually a shortcut that connects two servers on the Internet. Consider this situation. Your company has branches in different cities. Sending your business data from one […]

tel aviv

Researchers Show How to Steal Encryption Keys Through Touch

A new version of safecracking may enable hackers to crack computer security by simply touching computing devices. Computer security experts at Tel Aviv University, Itamar Pipman, Eran Tromer, and Daniel Genkin, conducted research entitled ‘Get Your Hands Off My Laptop’, which reveals a simple electrical trick is enough for a sophisticated hacker to gain access […]

Tails I2P Vulnerability Puts Thousands at Risk

Tails, the OS designed by the same engineers behind the now-infamous Tor protocol, is under threat. Earlier this week, Austin-based zero day vendor Exodus Intelligence revealed that the I2P protocol on which Tails depends to anonymize its movements online, has been compromised by a new packet-sniffing technique that could put its userbase of around 30,000 […]

Russia Posts Open Bounty to Break Tor in Two

This week, the Russian Interior Ministry put out an open call for hackers from around the globe, and posted a large bounty for any freelance blackhats who could assist the former Soviet Union in breaking the code that makes anonymizing communications and web traffic possible. Totaling just short of four million rubles ($111,290 USD), the […]

WordPress Plugin “MailPoet” Exploited Across 50,000 Sites

A vulnerability affecting nearly 50,000 websites has been exposed as part of the latest assault on WordPress, security firm Sucuri reported today. MailPoet, a popular plugin designed to assist webmasters with push notifications and autoresponders, was revealed as the culprit, which allowed hackers to not only sneak into WordPress builds that had the code installed […]