News from 'The Hackers News'

Syndicate content Some Rights Reserved
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and hackers
Updated: 11 hours 3 min ago

15-Year-Old Schoolboy Posed as CIA Chief to Hack Highly Sensitive Information

Sat, 20/Jan/2018 - 16:21
Remember "Crackas With Attitude"? A notorious pro-Palestinian hacking group behind a series of embarrassing hacks against United States intelligence officials and leaked the personal details of 20,000 FBI agents, 9,000 Department of Homeland Security officers, and some number of DoJ staffers in 2015. Believe or not, the leader of this hacking group was just 15-years-old when he used "social
Categories: Cyber India

OnePlus confirms up to 40,000 customers affected by Credit Card Breach

Fri, 19/Jan/2018 - 23:04
OnePlus has finally confirmed that its online payment system was breached, following several complaints of fraudulent credit card transactions from its customers who made purchases on the company's official website. In a statement released today, Chinese smartphone manufacturer admitted that credit card information belonging to up to 40,000 customers was stolen by an unknown hacker between
Categories: Cyber India

Researchers Uncover Government-Sponsored Mobile Hacking Group Operating Since 2012

Fri, 19/Jan/2018 - 16:10
A global mobile espionage campaign collecting a trove of sensitive personal information from victims since at least 2012 has accidentally revealed itself—thanks to an exposed server on the open internet. It's one of the first known examples of a successful large-scale hacking operation of mobile phones rather than computers. The advanced persistent threat (APT) group, dubbed Dark Caracal,
Categories: Cyber India

Facebook Password Stealing Apps Found on Android Play Store

Thu, 18/Jan/2018 - 22:35
Even after many efforts made by Google last year, malicious apps always somehow manage to make their ways into Google app store. Security researchers have now discovered a new piece of malware, dubbed GhostTeam, in at least 56 applications on Google Play Store that is designed to steal Facebook login credentials and aggressively display pop-up advertisements to users. Discovered independently
Categories: Cyber India

Hackers Exploiting Three Microsoft Office Flaws to Spread Zyklon Malware

Wed, 17/Jan/2018 - 23:55
Security researchers have spotted a new malware campaign in the wild that spreads an advanced botnet malware by leveraging at least three recently disclosed vulnerabilities in Microsoft Office. Dubbed Zyklon, the fully-featured malware has resurfaced after almost two years and primarily found targeting telecommunications, insurance and financial services. Active since early 2016, Zyklon is
Categories: Cyber India

Skygofree — Powerful Android Spyware Discovered

Tue, 16/Jan/2018 - 22:12
Security researchers have unveiled one of the most powerful and highly advanced Android spyware tools that give hackers full control of infected devices remotely. Dubbed Skygofree, the Android spyware has been designed for targeted surveillance, and it is believed to have been targeting a large number of users for the past four years. Since 2014, the Skygofree implant has gained several
Categories: Cyber India

LeakedSource Founder Arrested for Selling 3 Billion Stolen Credentials

Tue, 16/Jan/2018 - 17:34
Canadian authorities have arrested and charged an Ontario man for operating a website that collected 'stolen' personal identity records and credentials from some three billion online accounts and sold them for profit. According to the Royal Canadian Mounted Police (RCMP), the 27-year-old Jordan Evan Bloom of Thornhill is the person behind the notorious LeakedSource.com—a major repository that
Categories: Cyber India

Flaw in Popular Transmission BitTorrent Client Lets Hackers Control Your PC Remotely

Tue, 16/Jan/2018 - 13:52
A critical vulnerability has been discovered in the widely used Transmission BitTorrent app that could allow hackers to remotely execute malicious code on BitTorrent users' computers and take control of them. The vulnerability has been uncovered by Google's Project Zero vulnerability reporting team, and one of its researchers Tavis Ormandy has also posted a proof-of-concept attack—just 40
Categories: Cyber India

New Mirai Okiru Botnet targets devices running widely-used ARC Processors

Mon, 15/Jan/2018 - 23:45
The cybersecurity threat landscape has never been more extensive and is most likely to grow exponentially in 2018. Although the original creators of Mirai DDoS botnet have already been arrested and jailed, the variants of the infamous IoT malware are still in the game due to the availability of its source code on the Internet. Security researchers have spotted a new variant of infamous Mirai
Categories: Cyber India

OnePlus Site’s Payment System Reportedly Hacked to Steal Credit Card Details

Mon, 15/Jan/2018 - 23:30
This year's first bad news for OnePlus users—a large number of OnePlus customers are reporting of fraudulent credit card transactions after buying products from the Chinese smartphone manufacturer's official online store. The claim initially surfaced on the OnePlus support forum over the weekend from a customer who said that two of his credit cards used on the company's official website was
Categories: Cyber India

Satori IoT Botnet Exploits Zero-Day to Zombify Huawei Routers

Mon, 15/Jan/2018 - 15:12
Although the original creators of the infamous IoT malware Mirai have already been arrested and sent to jail, the variants of the notorious botnet are still in the game due to the availability of its source code on the Internet. Hackers have widely used the infamous IoT malware to quietly amass an army of unsecured internet-of-things devices, including home and office routers, that could be
Categories: Cyber India

Fourth Fappening Hacker Admits to Stealing Celebrity Pics From iCloud Accounts

Sat, 13/Jan/2018 - 19:55
Almost three years after the massive leakage of high-profile celebrities' nude photos—well known as "The Fappening" or "Celebgate" scandal—a fourth hacker has been charged with hacking into over 250 Apple iCloud accounts belonged to Hollywood celebrities. A federal court has accused George Garofano, 26, of North Branford, of violating the Computer Fraud and Abuse Act, who had been arrested by
Categories: Cyber India

Skype Finally Adds End-to-End Encryption for Private Conversations

Sat, 13/Jan/2018 - 04:55
Good news for Skype users who are concerned about their privacy. Microsoft is collaborating with popular encrypted communication company Signal to bring end-to-end encryption support to Skype messenger. End-to-end encryption assured its users that no one, not even the company or server that transmits the data, can decrypt their messages. Signal Protocol is an open source cryptographic protocol
Categories: Cyber India

Warning: New Undetectable DNS Hijacking Malware Targeting Apple macOS Users

Fri, 12/Jan/2018 - 23:08
A security researcher has revealed details of a new piece of undetectable malware targeting Apple's Mac computers—reportedly first macOS malware of 2018. Dubbed OSX/MaMi, an unsigned Mach-O 64-bit executable, the malware is somewhat similar to DNSChanger malware that infected millions of computers across the world in 2012. DNSChanger malware typically changes DNS server settings on infected
Categories: Cyber India

New Intel AMT Security Issue Lets Hackers Gain Full Control of Laptops in 30 Seconds

Fri, 12/Jan/2018 - 20:04
It's been a terrible new-year-starting for Intel. Researchers warn of a new attack which can be carried out in less than 30 seconds and potentially affects millions of laptops globally. As Intel was rushing to roll out patches for Meltdown and Spectre vulnerabilities, security researchers have discovered a new critical security flaw in Intel hardware that could allow hackers to access
Categories: Cyber India

macOS Malware Creator Charged With Spying on Thousands of PCs Over 13 Years

Thu, 11/Jan/2018 - 15:54
The U.S. Justice Department unsealed 16-count indictment charges on Wednesday against a computer programmer from Ohio who is accused of creating and installing spyware on thousands of computers for more than 13 years. According to the indictment, 28-year-old Phillip R. Durachinsky is the alleged author of FruitFly malware that was found targeting Apple Mac users earlier last year worldwide,
Categories: Cyber India

[Bug] macOS High Sierra App Store Preferences Can Be Unlocked Without a Password

Thu, 11/Jan/2018 - 13:52
Yet another password vulnerability has been uncovered in macOS High Sierra, which unlocks App Store System Preferences with any password (or no password at all). A new password bug has been discovered in the latest version of macOS High Sierra that allows anyone with access to your Mac to unlock App Store menu in System Preferences with any random password or no password at all. <!-- adsense
Categories: Cyber India

Microsoft Releases Patches for 16 Critical Flaws, Including a Zero-Day

Thu, 11/Jan/2018 - 12:41
If you think that only CPU updates that address this year's major security flaws—Meltdown and Spectre—are the only ones you are advised to grab immediately, there are a handful of major security flaws that you should pay attention to. Microsoft has issued its first Patch Tuesday for 2018 to address 56 CVE-listed flaws, including a zero-day vulnerability in MS Office related that had been
Categories: Cyber India

WhatsApp Flaw Could Allow 'Potential Attackers' to Spy On Encrypted Group Chats

Thu, 11/Jan/2018 - 01:16
A more dramatic revelation of 2018—an outsider can secretly eavesdrop on your private end-to-end encrypted group chats on WhatsApp and Signal messaging apps. Considering protection against three types of attackers—malicious user, network attacker, and malicious server—an end-to-end encryption protocol plays a vital role in securing instant messaging services. The primary purpose of having
Categories: Cyber India

Wi-Fi Alliance launches WPA3 protocol with new security features

Tue, 09/Jan/2018 - 23:47
The Wi-Fi Alliance has finally announced the long-awaited next generation of the wireless security protocol—Wi-Fi Protected Access (WPA3). WPA3 will replace the existing WPA2—the network security protocol that has been around for at least 15 years and widely used by billions of wireless devices every day, including smartphones, laptops and Internet of things. However, WPA2 has long been
Categories: Cyber India