hackers Archive

Federal Communications Commission approve net neutrality rules

  The Federal Communications Commission on Thursday voted to approve new rules on how the internet should be governed. New rules will prohibit internet service providers from discriminating against content producers. “Who determines how you use the internet? Who decides what content you can view and when? Should there

Android phones can be tracked just with battery power alone

  We all know that a phone uses more power the further away it is from a cell tower as it tries to connect. So, an Android phone can be tracked by studying their power use over time, without using their GPS or wi-fi/data usage. Extra power is used by

Forbes.com attacked by Chinese hackers

Chinese hackers attacked Forbes.com web site with an malicious software (malware) that target only certain visitors, which include several US defense institutions and financial services, according to cyber security companies, iSIGHT. According to iSIGHT and Invincea, someone compromised this application for three days (November 28 until December 1, 2014) or

Facebook says it was not the victim of a cyber attack, invoking technical problems

    Facebook says it was not the victim of a cyber attack, invoking technical problems  this morning for unavailability. Facebook invoke technical issues related to configuration changes to systems which fall off 50 minutes this morning.  “The network” denies rumors which says that it was the victim of a cyber

CENTCOM Twitter and YouTube accounts, hacked by a terrorist group of Islamic State

    An affiliated group  of terrorist network of Islamic State has conducted cyber attacks against official Twitter and YouTube accounts of US Central Command (CENTCOM), broadcasting threats against US troops, reports The Washington Post newspaper. Assigned messages of hackers have begun to appear on the CENTCOM Twitter

IBM Study: Companies rethinking cyber security strategies

  Approximately 60% of leaders in security believe that hackers have exceeded cybersecurity capabilities within their organization, said in a study conducted by IBM. Over 80% of security leaders believe that the challenges of external threats is increasing, while 60% agree that oraganizatiile are  exceeded in this cyber war,

Focus on multidirectional malware and spyware on 2015

  Dangerous malware such as Uroburos, spyware on Android smartphones and a growing number of cases involving malware attacks on mobile devices – 2014 was marked by cyber espionage, hacker attacks and cyber campaigns. Number of 3.5 million new strains of malware has been exceeded for the first

After hackers threats, Sony decided to cancel Christmas release of The Interview

US investigators have established that cyber attack on Sony Pictures was conducted by North Korea, according to official sources in Washington, film studio was forced to cancel the launch of the film “The Interview”, a decision widely criticized by Hollywood on Tuesday. A group of computer pirates who showed

Magento Go vulnerability allows hackers to bypass the authentication by creating administrator account

According to Securatary, this vulnerability allows for a cross store (unauthenticated, as we have not authenticated to our target store) privilege escalation attack, that will create a user on any *.gostorego.com store. There are over 200 000 active Magento Go stores. So this attack allows access to

We Are Legion: The Story of the Hacktivists

A MUST SEE documentary for those who don’t understand ANONYMOUS and WIKILEAKS, and/or just plain listen to what the MainStream media wants you to believe about them. Watch It! Details about the Movie – http://wearelegionthedocumentary.com/about-the-film/ Please support the authors. Buy the DVD, stream or download the film