Tag: hack

Here you will find all the articles with the tag: hack.

PewDiePie fans hack The Wall Street Journal and more printers

PewDiePie fans hack The Wall Street Journal and more printers

Fans of YouTube star PewDiePie have hacked printers again. They also attacked The Wall Street Journal. The fans hope that their actions will win more followers for the vlogger in his fight against the Bollywood music channel T-Series. That's what Silicon Angle reports. The vlogger is in a battle wi... Read more

date5 years ago
Global hack campaign focuses on nuclear and energy companies

Global hack campaign focuses on nuclear and energy companies

A global hack campaign called Operation Sharpshooter focuses on nuclear, defence, energy and financial companies. That's what McAfee says in a new report. The campaign has already infiltrated dozens of companies, mainly in the United States and other English-speaking countries. The hackers post rogu... Read more

date5 years ago
Account data of one hundred million users Quora hacked

Account data of one hundred million users Quora hacked

The data of more than one hundred million users of question-and-answer site Quora have been stolen. Quora describes the hack as an unauthorized access to one of our systems by a third party. The hack took place on November 30th. Quora reports that in an extensive blog. Last Friday it was discovered ... Read more

date5 years ago

Hackers abuse NSA malware to crack internal networks

Akamai has discovered a remarkable new malware campaign. The hackers behind it change the settings of home and office routers. This allows them to connect to internal networks and also infect previously isolated devices. According to Akamai Sun, there are 277,000 routers with these vulnerable UPnP s... Read more

date5 years ago
Hacker places malware in popular JavaScript library

Hacker places malware in popular JavaScript library

A hacker has managed to place code in a popular JavaScript library that steals bitcoin. This is a library that many companies use. The impact could therefore potentially be very large, although there is still some uncertainty about this. The hack included placing code in Event-Stream, a JavaScript ... Read more

date5 years ago

Rowhammer attacks can bypass ECC memory protection

Researchers at the Vrije Universiteit in Amsterdam have described in a paper a new variation of the Rowhammer attack, which makes the attack successful on ECC memory. Rowhammer is a group of exploits that exploit an error in the design of modern memory cards. A memory card stores temporary data as s... Read more

date5 years ago
Dropbox researchers accidentally found 3 zero days in Apple software

Dropbox researchers accidentally found 3 zero days in Apple software

The Dropbox red team accidentally discovered a zero day in Apple software. While one of the company's teams was investigating how its software responds to cyber-attacks, it discovered a number of zero-day vulnerabilities. The Offensive Security red team - a group of specialists tasked with attackin... Read more

date5 years ago

Emotet malware includes unique infrastructure to prevent down-time

According to security company Trend Micro, Emotet's malware corridor deliberately designed the backbone infrastructure of its server in two separate clusters. Researchers analyzed 571 samples of the group's malware. It allowed them to extract the IP addresses of 721 Emotet command-and-control (C&... Read more

date5 years ago
1 12 13 14 15 16 18