HackDig : Dig high-quality web security articles for hacker

Google mistake is the root cause of Internet Outage in Japan

A widespread internet disruption occurred in Japan on Friday, Google error it the main cause of the Internet outage that caused the panic in the country. Google error it the root cause of a widespread Internet outage in Japan that lasted for about an hour on Friday, August 25. The incident was caused by a BGM route hijack that began at 12:22 PM local Japan t
Publish At:2017-08-28 14:00 | Read:1026 | Comments:0 | Tags:Breaking News Hacking Security BGP Google Hacking Hijacking

The Icarus box is able to hijack nearly any drone mid-flight

A security researcher presented a small hardware named Icarus box that is able to hijack a variety of popular drones mid-flight. It could be very easy to hijack nearly any drone mid-flight by using the hardware presented by the Trend Micro researcher Jonathan Andersson at the PacSec hacking conference in Japan this week. Andersson, who leads the Trend Micro
Publish At:2016-10-28 06:50 | Read:1520 | Comments:0 | Tags:Breaking News Hacking Drones Hijacking Icarus box

BadTunnel attack could have the widest impact in the history of Windows

A Chinese security researcher has discovered a Windows design flaw dubbed BadTunnel that affects all versions of Windows. The Chinese researcher Yang Yu, director of Xuanwu Lab of Tencent has discovered a design flaw in Microsoft Windows that affects all versions of the popular operating system. The vulnerability could allow an attacker to hijack a target
Publish At:2016-06-21 23:00 | Read:2023 | Comments:0 | Tags:Breaking News Hacking BadTunnel Hijacking Microsoft Windows

FTC’s chief technologist gets her mobile phone number hijacked by ID thief

In a scenario that's growing increasingly common, the chief technologist of the US Federal Trade Commission recently lost control of her smartphone after someone posing as her walked into a mobile phone store and hijacked her number.Details of the incident were provided by the FTC's Lorrie Cranor in a blog post published Tuesday morning with the headline "Yo
Publish At:2016-06-08 02:35 | Read:1663 | Comments:0 | Tags:Gear & Gadgets Law & Disorder Risk Assessment Technology Lab

How to hack drones with just a $40 hardware from 2 km away

The IBM expert Nils Rodday revealed how to hack drones with just a $40 hardware from 2 km away by replicating its signals and blocking legitimate operators. At the Black Hat Asia hacking conference, the IBM expert Nils Rodday revealed that hackers can hijack expensive professional drones from 2 km away by replicating its signals and blocking legitimate opera
Publish At:2016-04-01 03:35 | Read:2310 | Comments:0 | Tags:Breaking News Hacking Drones hack drones Hijacking UAV WEP

Expert revealed how to hack professional drones used also by police

An expert presented his study on hijacking high-end drones commonly deployed by government and law enforcement agencies. The researcher Nils Rodday presented at the annual RSA conference in San Francisco the findings of its study on hacking drones. Rodday, who currently at IBM, has conducted his research while working as a graduate researcher at the Universi
Publish At:2016-03-05 16:40 | Read:1991 | Comments:0 | Tags:Breaking News Hacking drone hacking encryption Hijacking RSA

Drone regulation – Keeping the skies safe from commercial drones

My participation at the World Insight on CCTV discussing the Federal Aviation Administration regulation for the commercial  drones. Q1 First of all, the Federal Aviation Administration gave a very compressed timeline. They’re asking a expert panel task force to make registration guideline recommendations by November 20 and the
Publish At:2015-11-12 04:30 | Read:1438 | Comments:0 | Tags:Breaking News Laws and regulations Security Drones FAA Hacki

Thousands of legitimate WordPress sites are serving malware

Sucuri has noticed a spike in the number of compromised websites as part of a malware campaign which relies on thousands of compromised WordPress sites. According to security experts at Sucuri, threat actors have hijacked thousands of websites running the WordPress CMS to serve malware. The technique is not new, legitimate com
Publish At:2015-09-18 09:10 | Read:2464 | Comments:0 | Tags:Breaking News Cyber Crime Malware CMS Cybercrime Hacking Hij

Hacking Team orchestrated brazen BGP hack to hijack IPs it didn’t own

Spyware service provider Hacking Team orchestrated the hijacking of IP addresses it didn't own to help Italian police regain control over several computers that were being monitored in an investigation, e-sent among company employees showed.Over a six day period in August 2013, Italian Web host Aruba S.p.A. fraudulently announced its ownership of 256 IP
Publish At:2015-07-13 00:15 | Read:3232 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab BGP Border Gat

Reconnect tool for hacking Facebook is publicly available

The security expert Egor Homakov from Sakurity firm has released the Reconnect tool that allows hackers to hijack accounts on sites that use Facebook logins. The security expert Security Egor Homakov has developed a hacking tool dubbed Reconnect that exploit a flaw in Facebook to hijack accounts on sites that use Facebook logi
Publish At:2015-03-12 17:35 | Read:1797 | Comments:0 | Tags:Breaking News Hacking Cross-site Request Forgery CSRF Facebo

Google account hijacking via exploitation of XSS flaw

Security Expert Brett Buerhaus has discovered a critical flaw  on admin.google.com, which could be exploited by to Hijack an account and disable 2FA Authentication. Even the giants have their Achilles heel, the Google Apps administrator console is affected by a critical cross-site scripting (XSS) vulnerability that could be
Publish At:2015-01-23 12:35 | Read:2024 | Comments:0 | Tags:Hacking Security Cross-Site Scripting Google Google Apps Hij

Leveraging the WordPress Platform for SPAM

We’ve all seen WordPress comment and pingback spam, but thanks to strict moderation regimes and brilliant WordPress plugins that focus strictly on SPAM comments, comment spam isn’t a major problem for most websites these days. I have seen however, a new trend starting to emerge when it comes to spam involving WordPress. In recent years WordPress has become
Publish At:2014-12-05 18:25 | Read:1571 | Comments:0 | Tags:Learn Website Spam WordPress Security hijacking

Twitch Chat Spreading Eskimo Malware

Online gaming are becoming popular website that can be used by attackers to promote malicious software. New case have been reported by F-secure in Twitch.tv that have more then 50 million visitors. The attack starts by adding an advertisement banner on chat page that invite users to participate in a raffle to win a counter strike prizes.The link leads to ja
Publish At:2014-09-22 03:30 | Read:1682 | Comments:0 | Tags:Malwares counter strike Eskimo Hijacking Malicious Attack Ma

Thousands of computers open to eavesdropping and hijacking

There's a gaping hole in thousands of unsuspecting people's computers that lets any random internet passerby not only look over their shoulder but reach through to take over their systems.The hole is caused by a remote access tool: specifically, unsecured use of a product known as Virtual Network Computing (VNC).VNC is actually a handy application that lets
Publish At:2014-08-15 09:04 | Read:1946 | Comments:0 | Tags:Featured Privacy Security threats hijacking passwords remote

Finding Executable Hijacking Opportunities

BackgroundDLL Hijacking is nothing new and there are a number of ways to find the issue, but the best way I have found is a bit more forceful method using a network share. First we need a network share that we can 1. monitor every request failed or not, and 2. allow ANYONE to access that share because if there is a problem with a service that runs as SYSTEM
Publish At:2014-08-12 02:15 | Read:2077 | Comments:0 | Tags:dll hijacking mubix


Share high-quality web security related articles with you:)


Tag Cloud