Étiquette : hacking (Page 12 of 16)

‘GODLESS’ Mobile Malware Uses Multiple Exploits to Root Devices

With root privilege, the malware can then receive remote instructions on which app to download and silently install on mobile devices. This can then lead to affected users receiving unwanted apps, which may then lead to unwanted ads. Even worse, these threats can also be used to install backdoors and spy on users.

Source : TrendLabs Security Intelligence Blog‘GODLESS’ Mobile Malware Uses Multiple Exploits to Root Devices – TrendLabs Security Intelligence Blog

Sexual preference. Relationship status. Income. Address. These are just some details applicants for the controversial dating site BeautifulPeople.com are asked to supply before their physical appeal is judged by the existing user base, who vote on who is allowed in to the “elite” club based on looks alone. All of this, of course, is supposed to remain confidential. But much of that supposedly-private information is now public, thanks to the leak of a database containing sensitive data of 1.1 million BeautifulPeople.com users.

Source : BeautifulPeople.com Leaks Very Private Data of 1.1 Million ‘Elite’ Daters — And It’s All For Sale – Forbes

Nos serveurs sont attaqués des dizaines de fois par jour. Tous les trois mois environ, un hacker trouve le moyen de déjouer les systèmes de sécurité. La dernière intrusion date d’il y a une semaine. Des pirates sont parvenus à véhiculer un malware au travers du nom de domaine 20minutes.ch. Un fichier Flash infecté en était à l’origine. Ce script tentait d’installer le virus d’un site tiers grâce aux lacunes des ordinateurs des utilisateurs. Ce logiciel malveillant, le cheval de Troie Gozi, a finalement été retiré par notre service informatique.

Source : 20 Minutes

The attack comes five weeks after Ukraine’s power grid was successfully disrupted in what’s believed to be the world’s first-known hacker-caused power outage. Researchers still aren’t sure if the malware known as BlackEnergy was the direct cause of the blackout, but they have confirmed the malicious package infected at least three of the regional power authorities that were involved in the outage. Researchers have since said the attack was extremely well coordinated.

Source : Israel’s electric authority hit by “severe” hack attack (Updated) | Ars Technica

The High-Bandwidth Digital Copy Protection (HDCP) version 2.2 or higher is still believed to be secure today, but there are signs that pirates have found a way to bypass the protection. Earlier this year the first 4K Netflix leak surfaced. After that it went quiet. However, a few days ago something changed, as many more releases started to appear online.

Source : Pirates Can Now Rip 4K Content From Netflix and Amazon – TorrentFreak

« Older posts Newer posts »

© 2025 no-Flux

Theme by Anders NorenUp ↑