Category: Security

  • Hackers can crash Google’s Nest Dropcams by exploiting Bluetooth flaws

    Last year Google found some critical security flaws in Microsoft’s Edge browser and urged the company to fix these flaws within nine months but Microsoft acted otherwise, and the browser is still vulnerable to cyber attacks. In return, Google security researchers published some aspects regarding the flaws to give a glimpse into their findings. Fair […]

  • Millions of Accounts from 11 Hacked Bitcoin Forums Being Sold on Dark Web

    A famous Dark Web vendor known by their handle of “DoubleFlag” is selling databases of eleven Bitcoin forums on a popular dark web marketplace. The databases were stolen between 2011 to 2017 from widely visited forums providing information about Bitcoin mining and trading. The combined number of data stolen from these forums is more than […]

  • Russian bank Alfa Says it was Under DNS Botnet Attacks

    The Russian banking giant Alfa announced, in a press statement, that hackers targeted its cyber infrastructure in a large-scale DNS Botnet attack. The purpose appears to have been to make it seem as though the bank had been communicating with the Trump Organization. The bank is now asking U.S. to assist it to uncover the […]

  • 21 Million Decrypted Gmail, 5 Million Yahoo Accounts Being Sold on Dark Web

    Last week HackRead exclusively reported on a Darb Web vendor “SunTzu583” selling millions of decrypted Gmail, Yahoo and PlayStation Network accounts. Now, the same vendor is offering a trove of data containing more of Gmail and Yahoo accounts with decrypted passwords. Gmail The total number of Gmail accounts being sold are 4,928,888 which have been divided into three […]

  • Safari, Ubuntu Linux, Edge and Adobe Reader, Hacked At Pwn2Own 2017

    This year, the popular Pwn2Own event has $1,000,000 up for grabs from hackers. Among the pieces of software being targeted are Apple Safari, Ubuntu Linux, Microsoft Edge and the Adobe Reader. This year, there are 11 teams in the competition with 30 threats taking part. The event began on the 15th of March and is […]

  • Security Flaw Allowed Hackers to Compromise WhatsApp, Telegram Accounts

    CheckPoint, an Israeli security firm, unveiled this Wednesday a security flaw in encrypted messages that could affect the web version of WhatsApp and Telegram. The platforms were alerted about the vulnerability on March 8th and have already fixed the issue in both messengers by changing the file upload validation protocols to protect against the attack. The flaw […]

  • Private Photos of Amanda Seyfried, Emma Watson and others Leaked

    It is 2017, but it’s still happening. The latest victims of this campaign include top celebrities, Amanda Seyfried, Emma Watson, Rhona Mitra, Alyssa Arce, Jillian Murray, Analeigh Tipton, Iliza Shlesinger and others. The leaked pictures and or videos were leaked yesterday on a celebrity gossip website “Celeb Jihad” ranging from nude selfies, explicitly sexual photos of intimate moments. The […]

  • 13 Infected Android Apps on Google Play Phishing Instagram Accounts

    Lately, credential stealing campaigns and Instagram go hand in hand as we have seen so many credential stealers targeting social networking app users. These campaigns circulate on Google Play in the form of tools designed to increase the number of followers on Instagram. Recently, 13 malicious apps were identified to be uploaded on Google Play […]

  • U.S. to Charge 4 Hackers Involved in Massive Yahoo Data Breach

    The U.S. Department of Justice is gearing up to issue indictment orders against four hackers involved in cyber attacks against Yahoo which affected hundreds of millions of users worldwide, reports Bloomberg. The department is charging four people for their role in the data breach against Yahoo which almost derailed its deal with Verizon. In an unconfirmed report, TechCrunch reports that these […]

  • Beware; 36 Android Devices Shipped with Preinstalled Malware

    Android devices have remained the center of attraction for malicious cyber criminals since forever. Not only do they churn out fake, infected apps one after another but also devise ways to exploit Android devices. The reason is quite evident; since Android devices are among the most commonly preferred mobile phone choices, therefore, cyber-criminals attack them […]

  • Misconfigured Drive Leads to Data Leak of Thousands of US Air Force Officials

    Researchers at MacKeeper Security have identified a “misconfigured device,” which was available for public access last week. It was nothing short of a treasure trove of classified data because it contained sensitive personal/official information, backup data and confidential documents belonging to the US Air Force. It has been learned that the device was owned by […]

  • Maybe Microwaves can be hacked but turn them into cameras? Nah

    In her recent interview with Bergen Record columnist Mike Kelly, the Counselor to the President for Donald Trump Kellyanne Elizabeth Conway stated that there was an article talking about how we can all be spied upon by “microwaves that turn into cameras.” She went on to explain that it is “just a fact of modern life.” Q: Do […]

  • Latest Google Chrome Scam Aims At Stealing Credit Card Data

    Google’s Chrome browser has remained the apple of every hacker’s eyes for more than one reasons, the most important being that it is very commonly used. Therefore, the more visitors on Chrome, the higher will be the number of victims of these hacking and scam campaigns. This is why every other week we notice a […]

  • Notepad++ Issues Fix After CIA Attack Revealed in Vault7 Documents

    On 7th Match 2017, the whistle-blowing organization Wikileaks published a series of new documents code-named “Vault 7” allegedly belonging to the U.S. Central Intelligence Agency (CIA). These documents not only revealed the existence of a large-scale cyber espionage campaign but also show how the agency used zero days security flaws in Windows, macOS, Linux, iPhones, Android devices, several […]

  • The Best Alternatives Operating Systems

    For most people, the only operating systems they know of are Windows, macOS, Android and iOS. They have thus restricted their world to these four operating system with the same belief our ancestors thought the world was flat. However, many other operating systems will work even better than the above mentioned OSs especially for those of […]

  • Want a Career in Cybersecurity? Find Out Which Degrees Can Get You There

    Demand for cybersecurity professionals is high. This is set to continue growing for the foreseeable future and the salaries on offer are generally on the higher end of the pay scale—both factors which make a career in this field an attractive option. Entry level positions require a relevant bachelor’s degree, but the more specialized and […]

  • 640,000 Decrypted PlayStation Accounts Being Sold on DarkWeb

    Researchers are claiming that Dark Web marketplaces may be disappearing after the cyber attack by Anonymous on 10,000 websites last month but as far as hackers are concerned things are otherwise. Last week Last week HackRead exclusively reported on a vendor selling over 1 million Gmail and Yahoo accounts on a Dark Web marketplace. Now, […]

  • Google Patched Hundreds of Android Security Flaws in March Update

    Google is busy in updating its Android OS with the third and probably the largest security patch update that the company will be releasing this year. March 2017 Android update offer fixes for around 105 security vulnerabilities. This marks a whopping increment in the number of identified security flaws since when Google released a patch […]