HackDig : Dig high-quality web security articles for hacker

US military is working on the creation of separate unified cyber warfare command

President Donald Trump ordered the US Military to create a separate cyber warfare command tasked with cyber warfare operations. President Donald Trump wants to improve cyber capabilities of the US Military, he ordered it to create a separate cyber warfare command tasked with cyber warfare operations. President is thinking of a separate command specialized on
Publish At:2017-08-19 11:40 | Read:190 | Comments:0 | Tags:Breaking News Cyber warfare Admiral Mike Rogers Cyber attack

The Ukrainian central bank warned of new NotPetya-style massive attack risk

The Ukrainian central bank warned state-owned and private lenders of the appearance of new the NotPetya-like attack that would target national businesses. On Friday, the Ukrainian central bank warned of new malware-based attack risk. According to the Reuters, the Ukrainian central bank warned state-owned and private lenders of the spreading of new infections
Publish At:2017-08-19 08:55 | Read:176 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Malware notpetya Petya r

An unpatchable flaw in CAN protocol expose modern cars to hack

Experts discovered a flaw in CAN protocol that could be exploited by an attacker to disable safety systems of connected cars, including power-steering. Almost any function in modern vehicles, from brakes to accelerator, is electronically controlled, this means that the surface of attack is dramatically enlarging. We discussed car hacking several times, ex
Publish At:2017-08-18 14:30 | Read:154 | Comments:0 | Tags:Breaking News Hacking automotive CAN bus Car hacking

Hacker published the decryption key for the Apple Secure Enclave security chip

A hacker Thursday afternoon published what he claims to be the decryption key for Apple iOS’ Secure Enclave Processor (SEP) firmware. The Apple Secure Enclave is an ARM-based coprocessor that enhances iOS security, but on Thursday a hacker published what he says is the decryption key for Apple iOS’ Secure Enclave Processor (SEP) firmware. According to Apple 
Publish At:2017-08-18 14:30 | Read:167 | Comments:0 | Tags:Breaking News Hacking Apple Apple Secure Enclave decryption

Misconfigured AWS S3 exposed 1.8 million US voter records

More than 1.8 million voter records belonging to Americans have been accidentally leaked online by a US voting machine supplier for dozens of US states. It has happened again, more than 1.8 million voter records belonging to Americans have been accidentally leaked online by a US voting machine supplier for dozens of US states. The voter records were left op
Publish At:2017-08-18 14:30 | Read:157 | Comments:0 | Tags:Breaking News Digital ID Hacking AWS S3 Chris Vickery data b

Faketoken evolves and targets taxi booking apps to steal banking info

Kaspersky discovered a news strain of the mobile banking Trojan Faketoken that displays overlays on top of taxi booking apps to steal banking information. Security experts from Kaspersky have discovered a news strain of the infamous mobile banking trojan Faketoken that implements capabilities to detect and record an infected device’s calls and display
Publish At:2017-08-18 14:30 | Read:93 | Comments:0 | Tags:Breaking News Malware Mobile Android Banking Malware Faketok

Cyber Criminals Hijack Chrome Extensions and put 4.7 Million Users at Risk

Developer accounts of popular chrome extensions being hijacked by cyber criminals, over 4.7 million users are at a risk of cyber attack. Over 4.7 million users could be at risk after being exposed to malicious adverts and credentials theft due to developer accounts of popular chrome extensions being hijacked by cyber criminals. A phishing campaign run by Cyb
Publish At:2017-08-17 20:05 | Read:70 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Chrome extensions Cybercri

Drupal maintainers fix several access bypass vulnerabilities in Drupal 8

Drupal maintainers this week released security updates to fix several access bypass vulnerabilities in Drupal 8. Update your installation. On Wednesday Drupal maintainers released security updates to fix several access bypass vulnerabilities in Drupal 8. The flaws affect several components, including the entity access system, the REST API and some views. Th
Publish At:2017-08-17 20:05 | Read:173 | Comments:0 | Tags:Breaking News Hacking access bypass vulnerabilities CMS Drup

After Westminster attack, now Scottish parliament hit by brute-forcing attack

The Scottish Parliament has been targeted by a “brute force” attack, the assault is still ongoing and is similar to the one that hit the British Parliament. The Scottish Parliament is under attack, crooks are brute-forcing email accounts in the attempt to access members’ emails. The attack appears similar to the one that in June targeted th
Publish At:2017-08-17 04:25 | Read:197 | Comments:0 | Tags:Breaking News Hacking Intelligence brute force attacks Scott

NotPetya ransomware caused $300m losses to the shipping giant Maersk

The transportation giant Maersk announced that it would incur hundreds of millions in U.S. dollar losses due to the NotPetya ransomware massive attack. A.P. Moller-Maersk, the transportation and logistics firm, announced Tuesday that it would incur hundreds of millions in U.S. dollar losses due to the NotPetya ransomware massive attack. According to the seco
Publish At:2017-08-17 04:25 | Read:280 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Cybercrime Maersk

DitM Dog In The Middle – New Hacking Technique to Eavesdropping

During Defcon 25 hacking conference held in Las Vegas on July, a new eavesdropping attack technique was introduced, it was dubbed DitM (Dog In The Middle). During Defcon 25 one of the biggest information security event that took place in Las Vegas on July 27-30 this year, a new eavesdropping attack technique was introduced. At the BioHacking Village’s Pisa R
Publish At:2017-08-17 01:40 | Read:156 | Comments:0 | Tags:Breaking News Hacking Defcon DitM Dog In The Middle eavesdro

Cerber Ransomware now includes a feature to avoid canary files anti-malware

Researchers at Cybereason have discovered a new strain of the Cerber ransomware that implements a new feature to avoid triggering canary files. The canary files are a security measure for the early detection of threat like ransomware. These files are located in specific positions of systems and an anti-ransomware application watches for any modification. If
Publish At:2017-08-17 01:40 | Read:201 | Comments:0 | Tags:Breaking News Cyber Crime Malware anti-ransomware canary fil

Faulty firmware OTA update bricked hundreds of LockState smart locks

Some models of LockState smart locks also used by AirBnB customers were bricked by an OTA firmware update leaving guests unable to access their rentals. At the last Black Hat hacker conference, security experts demonstrated how to hack electronic locks, and the news I’m going to tell you demonstrates how annoying could be an incident to occurred to hun
Publish At:2017-08-16 07:15 | Read:211 | Comments:0 | Tags:Breaking News Hacking AirBnB IoT LockState OTA smart locks

ShadowPad backdoor was spread in corporate networks through software update mechanism

Kaspersky Lab discovered attackers were able to modify the NetSarang software update process to include a malware tracked as ShadowPad backdoor. Software update mechanism could be an efficient attack vector, news of the day is that hackers compromised the update process for a popular server management software package developed by NetSarang. Attackers were a
Publish At:2017-08-16 07:15 | Read:187 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware malware ShadowPad

Google adds Anti-Phishing feature also to Gmail app for iOS

To fight phishing attacks, Google has introduced a security measure for its Gmail app for iOS that will help users identify and delete phishing emails. Phishing continues to be one of the most dangerous threats, crooks continue to devise new techniques to trick victims into providing sensitive information. The technique is still the privileged attack vector
Publish At:2017-08-15 15:40 | Read:210 | Comments:0 | Tags:Breaking News Mobile Security Cybercrime Gmail Gmail app for

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud