hacking News ▼

Samsung Keyboard Flaw Leaves Over 600m Devices Open To Attack

06/16/2015, There is the popular saying that you are only as strong as your weakest link. While Samsung might have beefed up phone security with fingerprint sensors and software, it seems that not all their bases have been covered. According to NowSecure mobile...

US Navy Wants To Buy Your Software’s Zero-Day Vulnerabilities

06/14/2015, There are plenty of software engineers and hackers out there whose job is to search for a software’s security loopholes, flaws, and zero-day vulnerabilities to patch them before they are discovered and exploited by hackers. Google themselves have such...

Syrian Hackers Hack And Deface The US Army’s Website

06/08/2015, It seems that the cyber army in Syria has been very busy hacking the websites of its enemies. A few years ago we saw them hack AnonPlus, and a couple of years ago they also appear to have hacked the US Marines’ website. That being said one would think...

Last Year’s Sony Hacks Could Be Made Into A Movie

06/03/2015, You guys might remember that last year, Sony Pictures was hacked and along with the hack, a ton of private and very telling emails were released. The hack was supposedly about stopping The Interview movie from being released and for a while it looked like...

Russian-made YotaPhone Lets The FSB Spy On You

06/01/2015, The YotaPhone is a pretty cool concept. For those unfamiliar, it’s basically a smartphone with two displays – one in the front and an e-ink display on the back that helps display notifications without being too much of a battery drain. Pretty...

US Will Help Protect Japan From Cyber Attacks

05/31/2015, With so many services and products being online at the moment, the internet can be a scary place as it means that hackers can easily access a lot of sensitive information about someone if they put their minds to it. We’ve seen this happen with credit...

US Reportedly Launched Stuxnet Attack Against North Korea

05/29/2015, A few years ago, a Stuxnet campaign was successfully launched against Iran, hindering the country’s nuclear program by causing an overload that destroyed a thousand nuclear centrifuges. In the wake of that successful attack, a report from Reuters (via...

Hackers Can Track Movement In The Subway Using Accelerometers

05/26/2015, Usually in subways getting a signal on your phone can be a bit difficult meaning that if a hacker wanted to attack you, it would be pretty hard to try and grab ahold of your signal, or at least that’s what you think. According to research conducted by...

Man Hacks Starbucks Gift Card, Creates Money Out Of Thin Air

05/22/2015, Gift cards are handy if you don’t know what to buy someone. It can also be used like a prepaid system like iTunes Gift Cards where you can purchase a $50 card for yourself and limit your app purchases to that amount. However it seems that security...

Spy Agencies Wanted To Use Google Play To Install Spyware

05/21/2015, App stores such as the iTunes App Store, Google Play, BlackBerry World, and the Windows Phone Store are meant to be safe havens for apps and its users where thanks to the review efforts, apps that are published in these stores follow a certain guideline...

Teen Launches DDoS Attack On His School District’s Network

05/20/2015, We’ve seen teens lash out in all sorts of ways, but with technology being so prevalent in our lives and with us depending so much on it, it seems that one way teens might have found a new way to disrupt our lives. According to a report from KTVB News,...

Tech Companies Urge Obama To Disallow Encryption Backdoors

05/19/2015, It was revealed as part of the Snowden report that apparently agencies like the NSA had backdoors installed on products meant to be secure and also reportedly intercepted packages to install backdoors on them as well. Ultimately this renders security...

Hack Us, Please, Says United Airlines

05/15/2015, Most companies that we know of would do their level best to ensure that they do not end up getting hacked or experience a security breach, and for very good reason, too. After all, important and sensitive information can be obtained in this manner, which...