The Hacker News

Syndikovat obsah The Hacker News
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and hackers
Aktualizace: 2 min 18 sek zpět

Two Arrested for Stealing $550,000 in Cryptocurrency Using Sim Swapping

4 hodiny 1 min zpět
It appears that at least the United States has started taking the threat of Sim Swapping attacks very seriously. Starting with the country's first-ever conviction for 'SIM Swapping' this February, U.S. Department of Justice has since then announced charges against several individuals for involving in the scheme to siphon millions of dollars in cryptocurrency from victims. In the latest
Kategorie: Hacking & Security

New Group of Hackers Targeting Businesses with Financially Motivated Cyber Attacks

14 Listopad, 2019 - 20:15
Security researchers have tracked down activities of a new group of financially-motivated hackers that are targeting several businesses and organizations in Germany, Italy, and the United States in an attempt to infect them with backdoor, banking Trojan, or ransomware malware. Though the new malware campaigns are not customized for each organization, the threat actors appear to be more
Kategorie: Hacking & Security

Qualcomm Chip Flaws Let Hackers Steal Private Data From Android Devices

14 Listopad, 2019 - 12:38
Hundreds of millions of devices, especially Android smartphones and tablets, using Qualcomm chipsets, are vulnerable to a new set of potentially serious vulnerabilities. According to a report cybersecurity firm CheckPoint shared with The Hacker News, the flaws could allow attackers to steal sensitive data stored in a secure area that is otherwise supposed to be the most protected part of a
Kategorie: Hacking & Security

Company Detected Years-Long Breach Only After Hacker Maxed Out Servers' Storage

14 Listopad, 2019 - 10:07
What could be even worse than getting hacked? It's the "failure to detect intrusions" that always results in huge losses to the organizations. Utah-based technology company InfoTrax Systems is the latest example of such a security blunder, as the company was breached more than 20 times from May 2014 until March 2016. What's ironic is that the company detected the breach only after it
Kategorie: Hacking & Security

4 Best Free Online Security Tools for SMEs in 2020

14 Listopad, 2019 - 08:00
Cyberattacks on small and midsized companies in 2019 cost $200,000 per company on average, mercilessly putting many of them out of business, says CNBC in its analysis of a recent Accenture report. In light of the global cybersecurity skills shortage, the number is set to soar in 2020. Solely in the UK, over 50,000 British SMEs could collapse next year following a cyberattack. This article
Kategorie: Hacking & Security

The Comprehensive Compliance Guide (Get Assessment Templates)

14 Listopad, 2019 - 07:38
Complying with cyber regulations forms a significant portion of the CISO's responsibility. Compliance is, in fact, one of the major drivers in the purchase and implementation of new security products. But regulations come in multiple different colors and shapes – some are tailored to a specific vertical, while others are industry-agnostic. Some bare explicit consequences for failing to comply
Kategorie: Hacking & Security

New ZombieLoad v2 Attack Affects Intel's Latest Cascade Lake CPUs

13 Listopad, 2019 - 17:16
Zombieload is back. This time a new variant (v2) of the data-leaking side-channel vulnerability also affects the most recent Intel CPUs, including the latest Cascade Lake, which are otherwise resistant against attacks like Meltdown, Foreshadow and other MDS variants (RIDL and Fallout). Initially discovered in May this year, ZombieLoad is one of the three novel types of microarchitectural data
Kategorie: Hacking & Security

Researchers Discover TPM-Fail Vulnerabilities Affecting Billions of Devices

13 Listopad, 2019 - 17:08
A team of cybersecurity researchers today disclosed details of two new potentially serious CPU vulnerabilities that could allow attackers to retrieve cryptographic keys protected inside TPM chips manufactured by STMicroelectronics or firmware-based Intel TPMs. Trusted Platform Module (TPM) is a specialized hardware or firmware-based security solution that has been designed to store and protect
Kategorie: Hacking & Security

Is Facebook Secretly Accessing Your iPhone's Camera? Some Users Claimed

13 Listopad, 2019 - 07:27
It appears that Facebook at the center of yet another issue involving privacy. Reportedly, multiple iPhone users have come forward on social media complaining that the Facebook app secretly activates their smartphone's camera in the background while they scroll through their Facebook feeds or looking at the photos on the social network. As shown in the Twitter videos below, when users click
Kategorie: Hacking & Security

Amazon's Ring Video Doorbell Lets Attackers Steal Your Wi-Fi Password

12 Listopad, 2019 - 08:17
Security researchers at Bitdefender have discovered a high-severity security vulnerability in Amazon's Ring Video Doorbell Pro devices that could allow nearby attackers to steal your WiFi password and launch a variety of cyberattacks using MitM against other devices connected to the same network. In case you don't own one of these, Amazon's Ring Video Doorbell is a smart wireless home
Kategorie: Hacking & Security

Hackers Breach ZoneAlarm's Forum Site — Outdated vBulletin to Blame

11 Listopad, 2019 - 16:44
ZoneAlarm, an internet security software company owned by Israeli cybersecurity firm Check Point Technologies, has suffered a data breach exposing data of its discussion forum users, the company confirmed The Hacker News. With nearly 100 million downloads, ZoneAlarm offers antivirus software, firewall, and additional virus protection solutions to home PC users, small businesses, and mobile
Kategorie: Hacking & Security

Two Former Twitter Employees Caught Spying On Users For Saudi Arabia

8 Listopad, 2019 - 08:33
Two former employees of Twitter have been charged with spying on thousands of Twitter user accounts on behalf of the Saudi Arabian government, likely with the purpose of unmasking the identity of dissidents. According to an indictment filed on November 5 and unsealed just yesterday, one of the charged Twitter employees, American citizen Ahmad Abouammo, left the company in May 2015 and the
Kategorie: Hacking & Security

Gartner Says the Future of Network Security Lies with SASE

7 Listopad, 2019 - 13:09
Cloud services and networking are driving the concept of digital businesses, yet traditional networking and cybersecurity architectures are far from meeting the demands of the digital business. Gartner's "The Future of Network Security Is in the Cloud" report spells out the potential for the transformation of networking and security in the cloud, built upon a new networking and security model
Kategorie: Hacking & Security

Rogue TrendMicro Employee Sold Customer Data to Tech Support Scammers

7 Listopad, 2019 - 12:58
Do you always uncomfortable trusting companies with your data? If so, you're not alone. While companies do much to protect themselves from external threats, insiders always pose the highest risk to a company's data. Unfortunately, when we say companies can't eliminate insider threat completely, cybersecurity firms, who are meant to protect others, are not an exception. Cybersecurity firm
Kategorie: Hacking & Security

Facebook Reveals New Data Leak Incident Affecting Groups' Members

6 Listopad, 2019 - 17:38
Facebook today revealed yet another security incident admitting that roughly 100 app developers may have improperly accessed its users' data in certain Facebook groups, including their names and profile pictures. In a blog post published Tuesday, Facebook said the app developers that unauthorizedly access this information were primarily social media management and video streaming apps that let
Kategorie: Hacking & Security

Explained: How New 'Delegated Credentials' Boosts TLS Protocol Security

6 Listopad, 2019 - 10:45
Mozilla, in partnership with Facebook, Cloudflare, and other IETF community members, has announced technical specifications for a new cryptographic protocol called "Delegated Credentials for TLS." Delegated Credentials for TLS is a new simplified way to implement "short-lived" certificates without sacrificing the reliability of secure connections. In short, the new TLS protocol extension aims
Kategorie: Hacking & Security

Targeted Ransomware Attacks Hit Several Spanish Companies

5 Listopad, 2019 - 14:43
Everis, one of the largest IT consulting companies in Spain, suffered a targeted ransomware attack on Monday, forcing the company to shut down all its computer systems until the issue gets resolved completely. Ransomware is a computer virus that encrypts files on an infected system until a ransom is paid. According to several local media, Everis informed its employees about the devastating
Kategorie: Hacking & Security

Hackers Can Silently Control Your Google Home, Alexa, Siri With Laser Light

5 Listopad, 2019 - 14:39
A team of cybersecurity researchers has discovered a clever technique to remotely inject inaudible and invisible commands into voice-controlled devices — all just by shining a laser at the targeted device instead of using spoken words. Dubbed 'Light Commands,' the hack relies on a vulnerability in MEMS microphones embedded in widely-used popular voice-controllable systems that unintentionally
Kategorie: Hacking & Security

PPT Template: Build Your 2020 Security Plan

5 Listopad, 2019 - 12:02
The end of the year is coming, and it's time for security decision-makers to make plans for 2020 and get management approval. Typically, this entails making a solid case regarding why current resources, while yielding significant value, need to be reallocated and enhanced. The Definitive2020 Security Plan PPT Template is built to simplify this task, providing security decision-makers with an
Kategorie: Hacking & Security

Watch Out IT Admins! Two Unpatched Critical RCE Flaws Disclosed in rConfig

4 Listopad, 2019 - 13:42
If you're using the popular rConfig network configuration management utility to protect and manage your network devices, here we have an important and urgent warning for you. A cybersecurity researcher has recently published details and proof-of-concept exploits for two unpatched, critical remote code execution vulnerabilities in the rConfig utility, at least one of which could allow
Kategorie: Hacking & Security