exploits

Visit/hacking/30282/what-is-ethical-hacking-white-hat-hackers-explained
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
11 Jul 2019
Visit/security/33996/critical-infrastructure-at-risk-again-from-stuxnet-like-attack
Hacking
Security

Critical infrastructure at risk from Stuxnet-like attack

Researchers find gaping flaws in critical systems used in the most importnt industries across the globe
10 Jul 2019
Visit/security/33954/decade-old-flaw-in-pgp-is-finally-being-exploited
Encryption
Security

Decade-old flaw in PGP is finally being exploited

It's the Snowden-approved industry standard for secure communications, but hackers have stumbled upon hugely significant flaw
4 Jul 2019
Visit/privacy/33846/law-enforcement-tool-paves-way-for-full-data-extraction-on-iphones
privacy

UFED Premium tool paves way for full mobile data extraction

Israeli developer claims its UFED Premium tool can also crack flagship Android devices like the Samsung Galaxy S9
17 Jun 2019
Advertisement
Visit/security/33779/how-mr-robot-fudged-its-hacks-to-protect-the-public
Mr. Robot poster
Security

How Mr. Robot ‘fudged’ its hacks to protect the public

Showrunners debated over how accurate to make the show’s exploits
5 Jun 2019
Visit/security/33697/security-researcher-auctions-off-windows-10-zero-day-exploits
Security bug
Security

Security researcher auctions off Windows 10 zero-days

The prolific bug hunter says she only wants to sell to non-western buyers
23 May 2019
Visit/security/33604/anthem-healthcare-insurance-hacker-charged-by-fbi
Chinese hacker
Security

Anthem healthcare insurance hacker charged by FBI

US law enforcement pursuing China-based hackers for 11-month hacking campaign
10 May 2019
Visit/security/33564/50000-sap-customers-are-currently-vulnerable-to-hacks-due-to-software
SAP logo
Security

50,000 SAP customers are currently vulnerable to hacks

The vulnerabilities could be prevented if customers simply followed guidance set by SAP more than five years ago
3 May 2019
Visit/security/33457/apache-fixes-dangerous-rce-flaw-in-tomcat-application-server
Security

Apache fixes dangerous RCE flaw in Tomcat application server

Vulnerability affects multiple versions of the software running on Windows
15 Apr 2019
Visit/security/33393/samsung-galaxy-s10-s-ultrasonic-sensor-fooled-by-fake-finger
Security

Samsung Galaxy S10’s ultrasonic sensor fooled by fake finger

Samsung’s in-display fingerprint reader can be hacked ‘in 15 minutes’
5 Apr 2019
Advertisement
Visit/security/33341/cisco-fails-to-fix-two-high-risk-flaws-in-small-business-routers
Security

Cisco fails to fix two critical

The remote-code execution and information disclosure bugs have been unpatched since January
28 Mar 2019
Visit/security/33242/the-equifax-effect-explaining-the-biggest-security-disaster-of-the-21st-century
Security

The Equifax Effect: Explaining the disaster

We take a deep-dive into how the credit agency got so much so wrong
15 Mar 2019
Advertisement
Visit/security/33052/microsoft-flags-iis-flaw-that-could-lead-to-100-cpu-usage-spikes-when-exploited
Photo of a Microsoft building with clouds in view
Security

Microsoft flags flaw that could cause 100% CPU usage spike

The DoS vulnerability involves sending malicious HTTP/2 connections that can slow down or freeze users' systems
21 Feb 2019
Visit/security/32992/zero-day-flaws-in-internet-explorer-and-exchange-patched-by-microsoft
Security

Internet Explorer and Exchange zero-days get patched

Exploit code is known to be in circulation for both vulnerabilities
13 Feb 2019
Visit/security/32798/blackrock-leaks-personal-data-of-thousands-of-clients
Data
Security

BlackRock leaks personal data of thousands of clients

Fears over the data, which could have been available for more than a month, being used in future phishing campaigns
21 Jan 2019
Visit/security/32781/microsoft-launches-20000-azure-devops-bug-bounty-programme
Microsoft Azure
Security

Microsoft launches $20,000 Azure DevOps bug bounty programme

Critical remote code execution flaws are the highest-paid, while denial-of-service attacks earn nothing
18 Jan 2019
Advertisement
Visit/data-breaches/32774/massive-collection-1-leak-exposes-773m-unique-records-online
The word password among code
data breaches

Massive data leak exposes 773m unique records online

Gargantuan 87GB trove of email addresses and passwords was sourced from thousands of separate data breaches
17 Jan 2019
Visit/security/32662/adobe-releases-emergency-fixesacrobat-reader
Adobe Logo
Security

Adobe releases emergency fixes for two critical flaws

The bugs let an attacker execute arbitrary code and allowed privilege escalation via six iterations of the software
4 Jan 2019
Visit/security/32572/the-scariest-security-horror-stories-of-2018
phishing
Security

The scariest security horror stories of 2018

From data breaches to hardware vulnerabilities, these are the most embarrassing security blunders of the year
25 Dec 2018
Visit/security/32581/deutsche-telekom-to-review-5g-vendors-over-china-security-fears
Deutsche Telekom
Security

Deutsche Telekom reviews 5G vendors over China security fear

Europe's largest telecoms firm says it is taking the concerns of allies "very seriously"
14 Dec 2018
Visit/adware/32497/researchers-blast-wakenet-ab-for-spreading-adware
Graphic of pop-up advertising appearing on-screen
adware

WakeNet AB accused of ‘deceptively' spreading adware

Bad actors are using tools like 'embed movie' to coax victims into installing software that house adware
4 Dec 2018
Visit/security/32458/us-identifies-and-charges-samsam-ransomware-authors
hacking and ransomware
Security

US identifies and charges SamSam ransomware authors

In a wave of attacks spanning three years, the US government has charged the people behind it, but getting them in handcuffs won't be easy
29 Nov 2018
Advertisement
Visit/botnets/32427/mirai-botmasters-now-exploiting-hadoop-flaw-to-target-linux-servers
Botnet
botnets

Mirai now exploiting Hadoop flaw to target Linux servers

Malware used to take half the internet offline is being used to build powerful botnets with just a handful of compromised servers
23 Nov 2018
Visit/hacking/32352/critical-vulnerabilities-in-wordpress-gdpr-plugin-let-hackers-seize-control-of
Image of generic lines of code to indicate hackers at work
hacking

Vulnerabilities in GDPR plugin let hackers seize sites

The flaws, present for at least four months, led attackers to change URL settings and add their own administrator accounts
13 Nov 2018
Advertisement