Billions of mobile, desktop and IoT devices that use Bluetooth may be exposed to a new stealthy remote attack dubbed BlueBorne attack. Billions of mobile, desktop and IoT devices that use Bluetooth may be exposed to a new remote attack, even without any user interaction and pairing. The unique condition […]
Hacking
Compromised LinkedIn accounts used to send phishing links via private message and InMail
Phishing continues to be a criminals’ favorite for harvesting user credentials with more or less sophisticated social engineering tricks. In this post, we take a look at a recent attack that uses existing LinkedIn user accounts to send phishing links to their contacts via private message but also to external […]
More than 700 million email addresses leaked in huge data breach
A spambot has leaked more than 700 million email addresses and passwords publicly in a huge data breach. The data dump occurred thanks to a misconfigured spambot, dubbed ‘Onliner’, and was discovered by a Paris-based security researcher known as Benkow. Troy Hunt, an Australian computer security expert, who runs the […]
WikiLeaks suffers defacement at the hands of OurMine group
WikiLeaks’ whistleblowing website suffered an attack from the group known as OurMine on Thursday, when Julian Assange’s data-leaking site found itself on the receiving end of a ‘hack’. To read the original article : https://www.welivesecurity.com/2017/09/01/wikileaks-suffer-defacement-ourmine-group/
Equifax confirms up to 400,000 UK consumers at risk after data breach
One week after publicly revealing that a data breach had exposed the personal information and social security numbers of up to 143 million American consumers, the credit reporting agency has revealed more details of just how many people are affected in the UK. Although Equifax’s UK systems are said not […]
More than one million new phishing sites created each month
Phishing attacks continue to increase in volume and sophistication, according to researchers at security firm Webroot Phishing attacks are highly targeted, sophisticated, hard to detect and difficult for users to avoid, with 1.39 million new phishing sites created each month, say security researchers. In May 2017, the number of new phishing […]
8,2 milliards d’appareils piratables via Bluetooth
Le cabinet Armis Labs a identifié 8 vulnérabilités dont 4 critiques permettant à des pirates de se connecter, prendre le contrôle et déployer des malwares sur n’importe quel terminal via la liaison Bluetooth. Baptisée BlueBorne, cette vulnérabilité peut être exploitée sur les appareils Windows, Linux, iOS et Android. To read […]
CCleaner Malware Incident – What You Need to Know and How to Remove
This is a small guide and FAQ on the malware installed alongside CCleaner 5.33.6162. For a full recap of what happened, you can read our complete CCleaner coverage. What happened? An unknown threat group compromised the CCleaner infrastructure. The attacker added malware to the CCleaner 5.33.6162 and CCleaner Cloud 1.07.3191 installers, but the malware only executed on […]
How Do Hackers Hack Social Networking Websites?
At the point when individuals discuss hacking and social networks, they’re not alluding to the common meaning of hacking, which is utilizing malignant code or secondary passages as a part of machine systems to harm systems or take restrictive data. Hacking into social networks requires almost no specialized ability. It’s […]