HackDig : Dig high-quality web security articles for hackers

Satori IoT botnet author sentenced to 13 months in prison

byLisa VaasThe coder who created the massive Satori botnet of enslaved devices and a handful of other botnets will be spending 13 months behind bars, the US Attorney’s Office of Alaska announced on Friday.Kenneth Currin Schuchman, 22, from Vancouver, Wash., spent years developing distributed denial-of-service (DDoS) botnets. In September 2019, he pleaded gui
Publish At:2020-06-29 07:48 | Read:123 | Comments:0 | Tags:Denial of Service Law & order Security threats DDoS Fbot/Tsu

REvil gang threaten to auction celebrity data from Mariah Carey, Lebron James, MTV and more

byLisa VaasWhat would you do if your law firm to the stars were to be presented with this choice: pay us $42 million or we’ll sell Mariah Carey’s confidential legal documents on the dark web on 1 July?… followed by a carefully laid out schedule to sell personal correspondence, contracts, agreements, non-disclosure agreements, court conflicts and
Publish At:2020-06-26 06:27 | Read:205 | Comments:0 | Tags:Celebrities Data loss Hacked Privacy Ransomware Security thr

Twitter apologizes for leaking businesses’ financial data

byLisa VaasTwitter apologized on Tuesday for sticking business clients’ billing information into browser cache – a spot where the uninvited could have had a peek, regardless of not having the right to see it.In an email to its clients, Twitter said it was “possible” that others could have accessed the sensitive information, which incl
Publish At:2020-06-25 07:17 | Read:118 | Comments:0 | Tags:Data loss Privacy Security threats Twitter advertising platf

Hacker indicted for stealing 65K employees’ PII in medical center hack

byLisa VaasA Michigan man has been indicted for the 2014 hack of the University of Pittsburgh Medical Center’s (UPMC’s) HR databases and theft of employees’ personal information – information that he allegedly wound up selling on the dark web to crooks who used it to file thousands of bogus tax returns.The 43-count indictment, returne
Publish At:2020-06-22 09:47 | Read:118 | Comments:0 | Tags:Data loss Law & order Security threats arrest Detroit Justin

‘Anonymous’ takes down Atlanta Police Dept. site after police shooting

byLisa VaasFollowing Friday’s fatal police shooting of Rayshard Brooks – a 27-year-old Black man who fell asleep in a fast-food drive-in lane in Atlanta and was shot while running from police who tried to tase him – hackers affiliating themselves with the Anonymous hacktivist collective may have briefly taken down the website for the city&#
Publish At:2020-06-16 14:48 | Read:190 | Comments:0 | Tags:Denial of Service Government security Law & order Security t

Nuclear missile contractor hacked in Maze ransomware attack

byLisa VaasThe US is protected by what’s known as a nuclear triad: a three-pronged attack force that consists of land-launched nuclear missiles, nuclear missiles on submarines, and aircraft equipped with nuclear bombs and missiles.One of the triad’s legs – the land-based LGM-30 Minuteman intercontinental ballistic missile (ICBM) – has
Publish At:2020-06-04 08:45 | Read:232 | Comments:0 | Tags:Data loss Government security Ransomware Security threats ba

Pablo Escobar’s brother sues Apple for $2.6b over FaceTime flaw

byLisa VaasRoberto Escobar’s company has reportedly filed a $2.6 billion lawsuit against Apple for purportedly having lame-o security – security so bad, his address purportedly got leaked through FaceTime and has led to subsequent assassination attempts.According to TNW and TMZ, former accountant and co-founder of the Medellín drug cartel Roberto
Publish At:2020-05-28 15:14 | Read:240 | Comments:0 | Tags:Apple Law & order Privacy Security threats Uncategorized eav

Woman stalked by sandwich server via her COVID-19 contact tracing info

byLisa VaasMayo? Mustard? Creep who takes your sandwich order plus the personal details you handed over for contact tracing?That’s not what I ordered, said a woman in Auckland, New Zealand, whose trip to a Subway fast-food shop led to a restaurant worker reaching out to pester her on Facebook, Instagram, Messenger and via text.As the local news outlet
Publish At:2020-05-18 12:28 | Read:309 | Comments:0 | Tags:Data loss Privacy Security threats breach contact tracing co

Top 10 most exploited vulnerabilities list released by FBI, DHS CISA

byLisa VaasWhen work-from-home became a sudden, urgent need in March, many organizations slapped together cloud-collaboration services such as Microsoft Office 365 for their newly locked-down staff.Unfortunately and understandably, pressure was high. People were scrambling. Thus did a number of those services get put together with a wing, a prayer, and misco
Publish At:2020-05-18 12:27 | Read:322 | Comments:0 | Tags:Malware Security threats Vulnerability .net Adobe Flash Apac

US offers up to $5m reward for information on North Korean hackers

byLisa VaasKnow anything about North Korean hackers and their activities in cyberspace, past or ongoing?The US on Wednesday said that it’s got up to $5 million in Rewards for Justice money if you cough up useful details, which you can do here.The FBI and the Departments of State, Treasury, and Homeland Security (DHS) put out an advisory about the persi
Publish At:2020-04-17 07:07 | Read:480 | Comments:0 | Tags:Cryptocurrency Government security Law & order Security thre

49 malicious Chrome extensions caught pickpocketing crypto wallets

byLisa VaasGoogle has kicked 49 malicious Chrome browser extensions out of its Web Store that were posing as cryptocurrency wallets in order to drain the contents of bona fide wallets. The extensions were discovered by researchers from MyCrypto – an open-source interface for the blockchain that helps store, send and receive cryptocurrency – and
Publish At:2020-04-16 07:57 | Read:615 | Comments:0 | Tags:Cryptocurrency Data loss Google Google Chrome Malvertising M

Microsoft project proposed to aid Linux IoT code integrity

byJohn E DunnImagine a computer user from 2010 dreaming of a world in which Microsoft is not only an enthusiastic proponent of open source software but actively contributes to it with its own ideas.It would have sounded fanciful and yet a decade on and this is exactly the world a growing number of Microsoft’s in-house developers find themselves working towar
Publish At:2020-04-08 08:21 | Read:671 | Comments:0 | Tags:Security threats cloud Integrity Policy Enforcement (IPE Lin

Firefox 76 will have option to enforce HTTPS-only connections

byJohn E DunnConverting websites from HTTP to HTTPS over the last decade must count as one of the most successful quiet security upgrades ever to affect web browsing.Using an HTTPS site means that your browser and the site establish an encrypted connection which can’t be snooped on by ISPs, rogue Wi-Fi access points, or anyone else trying to monitor the cont
Publish At:2020-03-27 10:24 | Read:503 | Comments:0 | Tags:Firefox Google Mozilla Security threats Web Browsers browser

Android apps are snooping on your installed software

byDanny BradburyAndroid apps are snooping on other software on your device – and that could tell shady advertising companies more about you than you’d like.The news emerged this week in a paper from researchers in Italy, the Netherlands, and Switzerland. The privacy violations centre around installed application methods (IAMs), which are applicat
Publish At:2020-03-27 10:24 | Read:778 | Comments:0 | Tags:Android Google Mobile Operating Systems Privacy Security thr

Windows has a zero-day that won’t be patched for weeks

byJohn E DunnCybercriminals are exploiting two unpatched zero-day flaws affecting all supported versions of Windows, Microsoft has warned.The Remote Code Execution (RCE) vulnerabilities affect Adobe Type Manager (ATM) Library, the part of Windows that manages PostScript Type 1 fonts.For now, there are no CVE identifiers and the only confirmed details are in
Publish At:2020-03-25 09:06 | Read:486 | Comments:0 | Tags:Microsoft Operating Systems Security threats Vulnerability W

Announce

Share high-quality web security related articles with you:)

Tools