News Clipping

NASA Warns Employees of Personal Information Breach [thehackernews]

Another day, another data breach. This time it’s the United States National Aeronautics and Space Administration (NASA) NASA today confirmed a data breach that may have compromised personal information of some of its current and former employees after at least one of the agency’s servers was hacked. In an internal memo sent...

Read more

The Clickjacking Bug that Facebook Won’t Fix [bleepingcomputer]

A security professional exposed to a spam campaign on Facebook discovered the method used by the perpetrator and submitted a report through the company’s bug bounty program. The issue still exists because Faceboook dismissed it on on the grounds that it does not change the state of the account. Proof-of-concept...

Read more

Double-Gun Trojan which uses game plug-in to spread [360totalsecurity]

In July 2017, 360 Security Center discovered the first virus Trojan infected with MBR and VBR. It was named “Double- Gun”. In the following year, we found that the virus author frequently updated the virus version to increase the profitability and ability to fight against security software, and the virus...

Read more

Hackers Intercepted EU Diplomatic Cables for 3 Years [bankinfosecurity]

For the past three years, hackers have been intercepting sensitive diplomatic cables sent between EU member states after stealing passwords for accessing the EU network via a phishing attack against diplomats in Cyprus, The New York Times reported late Tuesday. The attack was discovered by Area 1, an anti-phishing firm based in...

Read more

Unprivileged Linux Users With UID > INT_MAX Can Execute Any Command [thehackernews]

A low-privileged user account on most Linux operating systems with UID value anything greater than 2147483647 can execute any systemctl command unauthorizedly—thanks to a newly discovered vulnerability. The reported vulnerability actually resides in PolicyKit (also known as polkit)—an application-level toolkit for Unix-like operating systems that defines policies, handles system-wide privileges...

Read more

0-Days Found in iPhone X, Samsung Galaxy S9, Xiaomi Mi6 Phones [thehackernews]

At Pwn2Own 2018 mobile hacking competition held in Tokyo on November 13-14, white hat hackers once again demonstrated that even the fully patched smartphones running the latest version of software from popular smartphone manufacturers can be hacked. Three major flagship smartphones—iPhone X, Samsung Galaxy S9, and Xiaomi Mi6—were among the...

Read more

Page 5 of 50« First...34567...102030...Last »