Articles about hack (page 6)

Database Of Instagram Influencers And Celebrities Leaked
Storing contact information in a database makes a lot of sense, but what would make even more sense is if that database was password protected. Unfortunately, that was not the case with a database that contained contact information of millions of Instagram influencers, celebrities, and brand accounts.

Microsoft Warns Of Security Exploit For Older Versions Of Windows
There is a good reason to upgrade to the newest versions of software whenever possible. This is because due to the management of resources, most developers would much rather focus on its newer software than older ones. An example would be Microsoft’s Windows, where in some cases, the company has stopped keeping older versions of Windows updated.

New Intel ‘ZombieLoad’ Security Flaw Discovered
It wasn’t too long ago that Intel was inundated with the Meltdown and Spectre vulnerabilities that affected a ton of their processors. To their credit, the company did take steps to try and address the problem, but it seems that new vulnerabilities have since been discovered by the original researchers who found the Meltdown and Spectre flaws.

WhatsApp Vulnerability Allowed Hackers To Inject Spyware
One of the features of WhatsApp that the company loves to boast about would be its end-to-end encryption. This means that messages sent and received are thoroughly encrypted, thus preventing hackers from intercepting them and reading them. However, it seems that while the app might be protected on that front, there was a vulnerability that was open.


This Guy Hacked His Roomba To Swear When It Bumps Into Objects
How many of us have sworn and cursed really loudly whenever we stub our toe against some furniture, or trip over a cable? Many, we’re guessing. Thankfully, robots such as the Roomba don’t swear when it runs into furniture. Instead, it takes what it learns and tries not to let it happen again, a good philosophy we should all strive to adopt.

Chrome Exploit Uses Fake Address Bar For Phishing
Phishing attacks come in many forms, such as URLs created to look similar to authentic websites, or emails that are seemingly legit. However, according to researcher James Fisher, he has discovered a new Chrome exploit that could let hackers create a very real-looking, but fake, address bar.

Student Destroys $58,000 Of Computer Equipment With A USB Killer Device
If you’re looking to ruin a computer, there are many ways to go about doing it. There is your traditional fare such as malware, but in the case of 27-year old (former) student Vishwanath Akuthota of The College of St. Rose in Albany, New York, it seems that he opted for less conventional means.

It’s 2019 And Over 20 Million People Still Use ‘123456’ As Their Password
These days with the number of hacks and phishing scams that we are seeing, you would think that everyone would start securing their accounts with stronger passwords, 2FA, and maybe even use physical security keys. Unfortunately, the truth of the matter is that it seems that people haven’t or don’t want to change.

Google Will Soon Block Logins From Embedded Browsers
Apps on our mobile devices like Facebook, Instagram, Reddit, and so on come with their own built-in browsers. The idea is that this will help keep users using their app even when they have clicked a link. However, the problem with embedded browsers is that they can be exploited and used with man-in-the-middle attacks.

New Powerful Spyware Discovered That Targets iPhone Users
Due to Android being more open and how apps can be easily installed outside of the Google Play Store, it’s not uncommon to hear about people running into issues with malware. But to assume that the iPhone is safer would be wrong. In fact, more recently, researchers mobile security firm Lookout have discovered a new and powerful spyware that is aimed at iPhone users.

Woman Arrested For Carrying Malware Into A Resort
When we think of malware attacks, we usually associate them with online attacks where clicking a suspicious link or opening a suspicious email attachment can sometimes result in malware being installed on a computer. However, it seems that a woman was recently arrested for carrying malware into President Trump’s Mar-a-Lago resort.

Researchers Trick Tesla’s Autopilot Using Nothing But Stickers On The Ground
One of the features of Tesla cars would be its Autopilot feature where it is more of an enhanced cruise control feature that also has the ability for the car to steer itself, meaning that it can be used on curved roads where the sensors on the car would allow it to continue to remain in its lane without driver input.

New Research Finds At Least 36 New Security Flaws In LTE
Sometimes we tend to take our technology for granted and assume that it should just work. However, it isn’t always the case as researchers have recently found out. According to a report out of South Korea (via Engadget), it seems that at least 36 new security flaws have been discovered within LTE.

Safari Zero-Day Exploit Can Takeover A Mac Computer Entirely
Safari is Apple’s default browser that comes bundled with their iOS and macOS devices. It’s a pretty decent browser but unfortunately, it seems that it might not necessarily be the most secure. This is according to a demonstration made at a white-hat hacker security conference in Vancouver, Canada.