hacking Archive

Cloud, a new era of innovation for personal data protection

  A sophisticated cryptographic algorithm prevents unwanted distribution of personal data, including credit card details. IBM researchers have recently announced their intention to develop a technology based on cloud platform that will help users, giving a better protection for their personal data, when they are online, including date of birth,

USBdriveby can take control of a computer in a few seconds

  A few months ago was discovered a worrying  vulnerability of standard USB  which does not seem to be repaired, called BadUSB. Until now such information was only theoretical and no one has developed a software which can uses this security hole, but a well-known hacker Samy Kamkar has

2014 Security News Review

In this article you’ll find the hottest hacking news from 2014. Below you’ll find the most important security news for each month of 2014. All titles are selected from our hacking news blog. We hope you enjoyed reading these news and we assure you that better quality

Facebook says it was not the victim of a cyber attack, invoking technical problems

    Facebook says it was not the victim of a cyber attack, invoking technical problems  this morning for unavailability. Facebook invoke technical issues related to configuration changes to systems which fall off 50 minutes this morning.  “The network” denies rumors which says that it was the victim of a cyber

GHOST glibc vulnerability (CVE-2015-0235) affects Linux Machines

A critical vulnerability has been found in glibc, the GNU C library, that affects almost all Linux systems dating back to 2000. Attackers can use this flaw to execute code and remotely gain control of Linux machines. The Red Hat Product Security has been made aware of

CENTCOM Twitter and YouTube accounts, hacked by a terrorist group of Islamic State

    An affiliated group  of terrorist network of Islamic State has conducted cyber attacks against official Twitter and YouTube accounts of US Central Command (CENTCOM), broadcasting threats against US troops, reports The Washington Post newspaper. Assigned messages of hackers have begun to appear on the CENTCOM Twitter

IBM Study: Companies rethinking cyber security strategies

  Approximately 60% of leaders in security believe that hackers have exceeded cybersecurity capabilities within their organization, said in a study conducted by IBM. Over 80% of security leaders believe that the challenges of external threats is increasing, while 60% agree that oraganizatiile are  exceeded in this cyber war,

Blackhat 2015 – a new Hacking Movie Trailer

Storyline – A furloughed convict and his American and Chinese partners hunt a high-level cybercrime network from Chicago to Los Angeles to Hong Kong to Jakarta. Written by Morgan Davis Foehl and Michael Mann from a project Mann has been developing with Legendary for over a year,

Pro-Russian Hacker Group CyberBerkut Claims Attack On Bundestag Websites

      The German government announced on Wednesday that more of its websites, including that of the Chancellery, were victims of a major cyber attack, which was claimed by a group of pro-Russian Ukraine. The information was made public by an Executive spokesman Steffen Seibert, reports Reuters. The

The largest Bitcoin market from Europe, broken by hackers, causing millions of dollars worth of damage

Bitstamp, a major European bitcoin exchange, suspended operations after  recording losses of several million dollars. Most likely, losses were recorded following a cyber attack, informs Financial Times newspaper. Bitstamp, with offices in London and Slovenia suspended the withdrawal of funds and advised clients on the danger of opening new deposits after