HackDig : Dig high-quality web security articles for hacker

DitM Dog In The Middle – New Hacking Technique to Eavesdropping

During Defcon 25 hacking conference held in Las Vegas on July, a new eavesdropping attack technique was introduced, it was dubbed DitM (Dog In The Middle). During Defcon 25 one of the biggest information security event that took place in Las Vegas on July 27-30 this year, a new eavesdropping attack technique was introduced. At the BioHacking Village’s Pisa R
Publish At:2017-08-17 01:40 | Read:156 | Comments:0 | Tags:Breaking News Hacking Defcon DitM Dog In The Middle eavesdro

Faulty firmware OTA update bricked hundreds of LockState smart locks

Some models of LockState smart locks also used by AirBnB customers were bricked by an OTA firmware update leaving guests unable to access their rentals. At the last Black Hat hacker conference, security experts demonstrated how to hack electronic locks, and the news I’m going to tell you demonstrates how annoying could be an incident to occurred to hun
Publish At:2017-08-16 07:15 | Read:211 | Comments:0 | Tags:Breaking News Hacking AirBnB IoT LockState OTA smart locks

ShadowPad backdoor was spread in corporate networks through software update mechanism

Kaspersky Lab discovered attackers were able to modify the NetSarang software update process to include a malware tracked as ShadowPad backdoor. Software update mechanism could be an efficient attack vector, news of the day is that hackers compromised the update process for a popular server management software package developed by NetSarang. Attackers were a
Publish At:2017-08-16 07:15 | Read:187 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware malware ShadowPad

Google adds Anti-Phishing feature also to Gmail app for iOS

To fight phishing attacks, Google has introduced a security measure for its Gmail app for iOS that will help users identify and delete phishing emails. Phishing continues to be one of the most dangerous threats, crooks continue to devise new techniques to trick victims into providing sensitive information. The technique is still the privileged attack vector
Publish At:2017-08-15 15:40 | Read:210 | Comments:0 | Tags:Breaking News Mobile Security Cybercrime Gmail Gmail app for

HBO Hacked, Game of Thrones script leaked on the Internet

Early August, hackers announced to have breached the systems of the television network HBO that is owned by the giant Time Warner. Crooks claimed to have stolen 1.5 terabytes of data from HBO, including information on the current season of Game of Thrones and a script that is reportedly for the upcoming fourth episode of Game of Thrones Season 7.On Sun
Publish At:2017-08-15 14:10 | Read:182 | Comments:0 | Tags:Hacking

WannaCry hero Marcus Hutchins pleads not guilty

The 23-year-old expert Marcus Hutchins pleaded “not guilty” during a court hearing in Milwaukee, Wisconsin. His trial has been scheduled for October. Yesterday, Marcus Hutchins, the WannaCry hero, has pleaded not guilty to charges of creating and selling malware at a hearing in Milwaukee, Wisconsin. The court decided to relax the expert bail ter
Publish At:2017-08-15 12:50 | Read:227 | Comments:0 | Tags:Breaking News Cyber Crime banking trojan Cybercrime Hacking

CVE-2017-0199: Crooks exploit PowerPoint Slide Show files to deliver malware

According to Trend Micro, cyber criminals abuse the CVE-2017-0199 vulnerability to deliver malware via PowerPoint Slide Show. In April Microsoft fixed the CVE-2017-0199  vulnerability in Office after threat actors had been exploiting it in the wild. Hackers leveraged weaponized Rich Text File (RTF) documents exploiting a flaw in Office’s Object Linking and E
Publish At:2017-08-15 12:50 | Read:132 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware CVE-2017-0199 malw

OpDomesticTerrorism – Anonymous takes down Charlottesville website after the incident

Anonymous launched the OpDomesticTerrorism and claimed responsibility for carrying out a DDoS attack on the website of Charlottesville city Virginia. The hacktivist collective Anonymous launched the OpDomesticTerrorism and claimed responsibility for carrying out a DDoS attack on the official website of Charlottesville city Virginia. The website went offline
Publish At:2017-08-14 18:00 | Read:174 | Comments:0 | Tags:Breaking News Hacking Hacktivism Anonymous Charlottesville i

PostgreSQL issues three security patches, apply them asap

PostgreSQL has issued three security patches for 9.6.4, 9.5.8, 9.4.13, 9.3.18, and 9.2.22 versions. Update them as soon as possible. PostgreSQL has issued three security patches for 9.6.4, 9.5.8, 9.4.13, 9.3.18, and 9.2.22 versions. “The PostgreSQL Global Development Group is pleased to announce the availability of PostgreSQL 10 Beta 3 and updates to a
Publish At:2017-08-14 18:00 | Read:156 | Comments:0 | Tags:Breaking News Hacking authentication DBMS PostgreSQL

North Korea-Linked Lazarus APT targets U.S. Defense contractors

The North Korea-linked Lazarus APT group as Lazarus is believed to be behind attacks targeting United States defense contractors. According to Palo Alto Networks, the North Korea-linked Lazarus APT group as Lazarus is believed to be behind attacks targeting United States defense contractors. The activity of the Lazarus APT Group surged in 2014 and 2015, its
Publish At:2017-08-14 18:00 | Read:200 | Comments:0 | Tags:APT Breaking News Cyber Crime Hacking Intelligence cyber esp

Rapid7 warns of Remote Desktop Protocol (RDP) exposure for millions of endpoints

According to a new research conducted by experts at Rapid7, there are 4.1 million Windows endpoints exposed online via Remote Desktop Protocol (RDP). The researchers discovered that there are 11 million open 3389/TCP endpoints, and that 4.1 million of them are RDP. “We analyzed the responses, tallying any that appeared to be from RDP speaking endpoints
Publish At:2017-08-14 18:00 | Read:199 | Comments:0 | Tags:Breaking News Hacking Reports Security EsteemAudit Intellige

Kenya opposition claims election results manipulated in cyber attack

Kenya opposition claims hackers have manipulated the results of the recent election by breaking into the database of Kenya’s electoral commission. According to Kenya opposition, led by Raila Odinga, hackers have manipulated the results of the recent election by breaking into the database of Kenya’s electoral commission. The President Uhuru Kenyat
Publish At:2017-08-13 05:10 | Read:257 | Comments:0 | Tags:Breaking News Hacking election Kenya election Kenya oppositi

Crosstalk Leakage Attacks – USB gadgets can spy on data flowing in and out adjacent ports

Crosstalk Leakage Attacks – Experts demonstrated that USB gadgets can secretly spy on data flowing in and out of devices plugged into adjacent USB ports. A group of Australian researchers has demonstrated that USB gadgets can secretly spy on data flowing in and out of devices plugged into adjacent USB ports. The spy gadget can intercept electrical sign
Publish At:2017-08-12 13:35 | Read:235 | Comments:0 | Tags:Breaking News Hacking channel-to-channel crosstalk leakage C

Variety reports a failed attempt of HBO to Offer a ‘Bug Bounty’ to hackers

According to a report from a leaked memo by Variety, in response to the incident, HBO offered a reward of $250,000, a figure far from the HBO annual budget. Cyber criminals claiming to have hacked television group HBO networks were demanding millions of dollars in ransom payments from the company while threatening to release more material. The alleged hacker
Publish At:2017-08-12 10:40 | Read:172 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Hacking Cybercrime dat

DNA Contains Instructions for Biological and Computer Viruses

University of Washington scientists have created an experiment that shows how DNA can be used to not only create biologic viruses, but also viruses that can infect computers. Deoxyribonucleic acid (DNA) is one of the oldest methods for storing information. It is found in almost all living cells and DNA information is used in nature to determine “traits
Publish At:2017-08-12 10:40 | Read:270 | Comments:0 | Tags:Breaking News Hacking Malware cyber security DNA encoding ma

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud