Security

Zero-day vulnerability in Internet Explorer using targeted attacks

Symantec has reported the use of targeted attacks by hackers in a new zero-day vulnerability in the browser Internet Explorer . This vulnerability is still open, and the attackers who exploit it could run on the computers of victims of their own malicious code. September 17, Microsoft announced a new zero-day vulnerability in the browser(…)

Indian Kumar has found a way to remove someone else’s Facebook photo

Specialist in IT-security Arul Kumar of India found a critical vulnerability in Facebook Support Dashboard that allowed to delete photos that belong to other users. According to Kumar, the “hole” can be operated in any browser, any version, but the easiest way – using a mobile platform. One of the functions of Support Dashboard – send requests(…)

Syrian electronic army does not recognize the data leak

Syrian Electronic Army (SEA), which has attracted the interest of the public after a number of successful break-ins. Members of the SEA on Friday denied the fact of data leakage, as well as the fact of hacking. “In any case, we do not hold any confidential or private data on a public server. We have(…)

Vietnam has introduced full-fledged Internet censorship

The controversial law banning Internet users to discuss current events, came into force in Vietnam. The legislation known as Decree 72 prohibits the use of blogs and social networks to discuss news articles, but only for personal calls on private topics. The law also requires that foreign Internet companies placed their local servers in Vietnam.(…)

Cisco: Hackers from Syrian Electronic Army use third party services for attacking mass-media

According to experts, those portals whose content is generated by third parties, journalists are at greater risk of being compromised. As the recent report by researchers from Cisco, a group of hackers calling themselves the Syrian Electronic Army, most likely use services of third parties to carry out attacks on the websites of various media.(…)

Vulnerability in Paypal allows you to remove someone else’s account

The administration of the service has eliminated the vulnerability and promised to pay $ 5,000 for the founder of the vulnerability. According to information security researcher Ionut Cernica of the company Vulnerability Lab, payment service Paypal contained a dangerous vulnerability that could allow an attacker to remove someone else’s account. “As a result, several tests(…)

Hacker posted a message on the wall of Zuckerberg

Unemployed Palestinian hacker Shriteh Khalil (Khalil Shreateh) wanted to make a little money on the awards program for Point of Vulnerability to Facebook. He found a bug that allows you to post messages on the wall of any user of Facebook, even if he/she is not your friend, and regardless of the privacy settings. To(…)

ESET: Banking Trojan used government server in the attack

Experts of the international anti-virus company ESET found a banking trojan aimed at users in Brazil. A feature of this was the use of threats in the cyber vulnerability of the government’s mail server. To steal confidential data threats established a special extension for the browser Google Chrome . This extension allows an attacker to(…)

The Pirate Bay released a browser – PirateBrowser

On its 10th anniversary site The Pirate Bay gifted to themselves and all of its users: the PirateBrowser proprietary browser -based on Firefox Portable. “The browser can bypass censorship” which comes complete with a Tor client , and also includes some additional components for easy access to the website The Pirate Bay in the countries(…)

Chinese hackers broke into the water utility-bait

Install bait (Honeypot) and catch hackers “live bait” – a standard practice to gather information about the enemy and training counterattacking actions. Experts from the antivirus company Trend Micro launched the open access bait under the guise of communal SCADA-systems for managing water supplies. The bait worked – and the catch was unusually bold: a(…)