Categories Hack

56 posts

Auto Added by WPeMatico

‘Hundreds of millions’ of iPhones vulnerable to permanent jailbreak

‘Unpatchable’ iOS exploit could allow for a permanent jailbreak for iPhones A security researcher has released an iOS exploit for iPhone 4S through iPhone X that could potentially lead to a permanent jailbreak. axi0mX, the pretty well-known iOS hacker and cybersecurity researcher, has publicly released what he claims to be […]

Malicious websites have been quietly hacking iPhones for years, says Google

Google reveals malicious websites were secretly used to hack into iPhones for years Security researchers at Google have discovered a series of hacked websites that were delivering malware designed to hack iPhones over a period of at least two years. These websites, which were visited thousands of times a week, […]

Your Android smartphone can be hacked just by playing a malicious video

Beware! Just opening a video on Android can hack your smartphone More than one billion devices running versions between Android 7.0 Nougat and Android 9.0 Pie are facing a critical remote code execution (RCE) vulnerability, reports The Hacker News. The critical RCE flaw ( CVE-2019-2107 ) in question resides in the Android Media […]

Hackers can hack your PC by exploiting critical vulnerability in VLC media player

VideoLAN releases a security update for vulnerable VLC Media player VLC media player has been discovered with two high-risk security flaws on software versions 3.0.6 and earlier that can allow attackers to load specially crafted video files in the vulnerable system to execute the arbitrary code. For those unaware, VLC […]

Hackers use a $25 Raspberry Pi computer to breach NASA JPL

NASA Lab was hacked using a $25 Raspberry Pi computer NASA’s Jet Propulsion Laboratory (JPL) department was compromised in April 2018 using an unsecured and unauthorized Raspberry Pi device, confirms an audit document from NASA’s Office of Inspector General (OIG). According to OIG’s report, JPL “has experienced several notable cybersecurity […]

Teen hacked Apple hoping the company would offer him a job

Adelaide teenager gets a good-behavior bond for hacking twice into Apple’s computer systems An Australian teenager who was a big admirer of the technology giant, Apple hacked into the company’s secure computer system twice hoping to get a job. He is now pleading guilty to multiple computer hacking charges. The […]

Chinese hackers breached TeamViewer’s systems in 2016 reveals report

TeamViewer confirms breaching by Chinese cyber attackers in 2016 The German software company behind the most popular software in the world, TeamViewer recently confirmed that its systems were breached by Chinese state-sponsored hackers in 2016, after a report by German newspaper Der Spiegel. However, the company said that TeamViewer chose […]

Hackers breach Stack Overflow Q&A platform and compromise users’ data

Stack Overflow confirms hackers breached its systems; some users’ data compromised Stack Overflow, a popular question and answer site for professional and tech programmers, recently confirmed that their systems were breached by hackers. “Over the weekend, there was an attack on Stack Overflow. We have confirmed that some level of […]

Windows Zero-Day Vulnerability Allow Hackers To Take Complete Control Over PC

Microsoft patch zero-day vulnerability discovered by Kaspersky Labs Microsoft last week released a patch for a Windows zero-day vulnerability that could allow hackers to take full control over a targeted device. Kaspersky Lab researchers, Vasily Berdnikov and Boris Larin, who discovered the zero-day vulnerability last month reported the vulnerability to […]

New vulnerabilities in WPA3 Protocol allow hackers to steal Wi-Fi password

Dragonblood vulnerabilities discovered in Wi-Fi WPA3 protocol Last year, Wi-Fi Alliance had released the next-gen WPA3 (Wi-Fi Protected Access 3) with several security improvements over WPA2 after the KRACK (Key Reinstallation Attack) exploit that affected almost every Wi-Fi supported device. WPA3 was introduced to protect against brute-force dictionary attacks on […]