HackDig : Dig high-quality web security articles

Some Uber ride data is publicly accessible through Google

Some Uber trip information is publicly accessible through simple Google queries, the set includes trip and user info, and home and work addresses. Rapid diffusion of technology makes easy phenomena of accidental data leakage, the last one is related to the popular car service Uber. Dozens of trips of Uber customers have been c
Publish At:2015-09-04 10:50 | Read:4337 | Comments:0 | Tags:Breaking News Security car service data leakage Hacking priv

Alleged Anonymous members leaked 13000 credentials for popular websites

A group of hackers claiming to be members of the collective Anonymous has released online a lot of 13,000 passwords and credit cards for popular websites. Hackers claiming to be members of the popular group of hacktivists Anonymous have leaked more than 13,000 alleged credentials for some popular websites, including Amazon,
Publish At:2014-12-28 15:05 | Read:5604 | Comments:0 | Tags:Hacking Anonymous data breach data leakage malware

Hackers leak scripts, celebrity phones and aliases at Sony Pictures Entertainment

GOP released a new archive of Sony Pictures Entertainment confidential data including private information of employees, celebrity phone numbers, film scripts and many more. The Sony Pictures data breach is becoming a never ending history, the GOP is leaking company data and much more since the attack while security firms are p
Publish At:2014-12-11 00:45 | Read:4874 | Comments:0 | Tags:Cyber Crime Security Cybercrime data breach data leakage Des

93 percent of Government Chinese websites are vulnerable

A report issued by the China Software Testing Center revealed that 93 percent of Chinese websites are vulnerable to cyber attacks. Nearly 93 percent of 1,000 Chinese government websites under evaluation is affected by vulnerabilities and other security issues. The data is part of a study conducted by the China Software Testing
Publish At:2014-12-08 18:45 | Read:4206 | Comments:0 | Tags:Hacking Mobile Security China Chinese website Cross-site Req

Adobe updates its e-reader - DRM data no longer transmitted insecurely

Adobe has published an update to its cryptographically-challenged Digital Editions 4 e-reader software.Digital Editions lets you read eBooks, but thanks to the exigencies of Digital Rights Management (DRM), it also keeps track of a fair chunk of information about your reading habits.If an eBook makes use of DRM, for example to charge you for reading it, then
Publish At:2014-10-27 18:10 | Read:3820 | Comments:0 | Tags:Adobe Cryptography Featured Privacy data leakage Digital Edi

Apple pushes out iOS 8.1 - kills the mobile POODLE and closes some, ahem, "backdoors"

Hot on the heels of Apple's OS X Security Update 2014-005 comes iOS 8.1.It's only just over a month since iOS 8 came out.We almost immediately received iOS 8.0.1 to fix some bugs, and 8.0.2 a couple of days after that.But neither of those versions was listed by Apple as a security update.iOS 8.1, on the other hand, is all about security: cryptographic securi
Publish At:2014-10-21 15:20 | Read:4283 | Comments:0 | Tags:Apple Cryptography Data loss Featured iOS Vulnerability blue

Apple pushes out iOS 8.1 - kills the mobile POODLE and closes some, ahem, "backdoors"

Hot on the heels of Apple's OS X Security Update 2014-005 comes iOS 8.1.It's only just over a month since iOS 8 came out.We almost immediately received iOS 8.0.1 to fix some bugs, and 8.0.2 a couple of days after that.But neither of those versions was listed by Apple as a security update.iOS 8.1, on the other hand, is all about security: cryptographic securi
Publish At:2014-10-21 13:45 | Read:4534 | Comments:0 | Tags:Apple Cryptography Data loss Featured iOS Vulnerability blue

POODLE attack takes bytes out of your encrypted data - here's what to do

Imagine that you're a hacker who has taken over a Wi-Fi access point at a coffee shop.You don't need to be there in person; you just need to be able to login to the access point as root (UNIX's name for the system administrator).If you can do that, you can almost certainly spy on, and sneakily modify, everyone's network traffic.However, you're out of luck fo
Publish At:2014-10-16 14:40 | Read:3910 | Comments:0 | Tags:Cryptography Data loss Featured AES authentication CBC ciphe

POODLE attack takes bytes out of your encrypted data - here's what to do

Imagine that you're a hacker who has taken over a Wi-Fi access point at a coffee shop.You don't need to be there in person; you just need to be able to login to the access point as root (UNIX's name for the system administrator).If you can do that, you can almost certainly spy on, and sneakily modify, everyone's network traffic.However, you're out of luck fo
Publish At:2014-10-16 13:05 | Read:4656 | Comments:0 | Tags:Cryptography Data loss Featured AES authentication CBC ciphe

Snapchat Photos Hacked over Third party application

Snapchat database with more then 100 million users pictures and videos have been published by hackers. still not known the way that hackers have compromised the database but the first analyses shows that the leak was due to a third party application. pictures and videos are going to be hosted on 4Chan this is the site where usually attacker upload hacked fi
Publish At:2014-10-12 07:05 | Read:5488 | Comments:0 | Tags:Cybercrime Cybercrime & Hacking 4chan Data leakage pictures

Mummy, my schoolbooks are spying on me! 60 Sec Security [VIDEO]

Got a minute to spare?Watch this week's 60 Second Security...→ Can't view the video on this page? Watch directly from YouTube. Can't hear the audio? Click on the Captions icon for closed captions.In this episode:• [0'05"] Adobe to update e-reader to mop up data leak• [0'25"] BadUSB - now with DIY instructions• [0'49"] Return of the Androi
Publish At:2014-10-11 13:45 | Read:4260 | Comments:0 | Tags:Adobe Android Cryptography Data loss Featured Google Malware

Bugzilla bug tracker fixes zero-day bug revealing bug

Bugzilla, Mozilla's free and popular bug tracking program, has just been updated to patch a number of security holes.One of them is not only interesting and important, but also ironic.In fact, if we are allowed to smile at security holes, this bug is wryly amusing.Many Bugzilla implementations are publicly accessible on the internet, as a way of encouraging
Publish At:2014-10-07 22:40 | Read:3422 | Comments:0 | Tags:Data loss Featured Bugzilla data leakage Mozilla

The Fappening 3, other nude celebrity photos leaked

A new collection of photos belonging to the Fappening archives have been leaked online, it includes nudes of Jennifer Lawrence and other celebrities. The Fappening is now in its third episode and the celebrities are naked again. The Fappening seems to be never ending story, a new archive of nude celebrity photos has been lea
Publish At:2014-09-27 16:00 | Read:16018 | Comments:0 | Tags:Cyber Crime Hacking Laws and regulations Security Apple brut

The Fappening Continues, Nudes of celebrities on line again

Another cache of nude photos and videos of celebrities was disclosed online, investigators believe that this wave is linked to the first Fappening archive. During the last weeks media have focused their attention on the celebrity iCloud hacking case, hundreds of naked pictures are available online raising the interest to the
Publish At:2014-09-21 14:20 | Read:6615 | Comments:0 | Tags:Cyber Crime Apple brute force celebrities data leakage Find

“Shocking” Android browser bug could be a “privacy disaster”: here’s how to fix it

Independent security researcher Rafay Baloch has written about a security bug in the Android Browser app that allows one website to steal data from another.The guys over at Metasploit are calling it a "Privacy Disaster," and promising to take the time to create a video that is "sufficiently shocking" in order to show you why.So, what went wrong, and what sho
Publish At:2014-09-16 15:40 | Read:3990 | Comments:0 | Tags:Android Data loss Featured Google Privacy Vulnerability brow