Hacking News

Latest hacking information from the underworld

Telstra launches Sydney cybersecurity centre

Telstra has launched its Sydney-based cybersecurity centre, with the telecommunications provider also announcing a new “secure internet initiative”. With the latest security operations centre (SOC) officially open for customers from Thursday, Telstra now has centres live in Sydney, Melbourne, and Canberra ahead of launching more across the globe, Telstra CEO Andy Penn told ZDNet. “There will […]

Telstra launches Sydney cybersecurity centre Read More »

Zerodium now offers up to $500,000 for messaging app zero days

Zerodium has increased the financial reward for researchers who submit valid zero-day flaws with the introduction of a new pricing structure. The premium exploit seller is particularly keen to get its hands on unknown vulnerabilities which can be used to exploit popular messaging apps, such as iMessage, Telegram, WhatsApp, Signal, Facebook, Viber, and WeChat, alongside traditional SMS/MMS

Zerodium now offers up to $500,000 for messaging app zero days Read More »

Ransomware 2.0: Spora now steals your credentials and logs what you type

A vicious strain of ransomware has been upgraded to enable it to steal browsing information and record keystrokes from infected PCs. Spora ransomware — one of the most common families of the file-locking malware — appears to be following in the footsteps of Cerber, which recently gained the ability to steal passwords and currency from Bitcoin wallets. Read

Ransomware 2.0: Spora now steals your credentials and logs what you type Read More »

US election hack: Microsoft wins latest round in court against Fancy Bear phishers

Microsoft has won its motion for a permanent injunction against the alleged Russian government hacking group known as Fancy Bear or APT28. Fancy Bear is thought to be responsible for the hacks on the Democratic National Committee (DNC) during the US elections last year. US intelligence believe the group hacked the DNC and leaked emails to WikiLeaks to

US election hack: Microsoft wins latest round in court against Fancy Bear phishers Read More »

ROPEMAKER exploit enables attackers to modify email content—after It’s sent!

A new email exploit, called Ropemaker has been discovered by security researchers at email and cloud security firm Mimecast, the exploit enables an attacker to modify the content in an email—after it’s been sent to the recipient and made it through the necessary filters. Ropemaker stands for Remotely Originated Post-delivery Email Manipulation Attacks Keeping Email Risky,

ROPEMAKER exploit enables attackers to modify email content—after It’s sent! Read More »

Windows 10 tip: Keep your Microsoft account secure and private

Signing in to Windows 10 with a Microsoft account allows you to easily sync settings and files between devices. It’s not mandatory (you can sign in using a local account or an Active Directory account on a corporate domain instead), but using a Microsoft account is convenient for anyone who regularly switches between Windows devices.

Windows 10 tip: Keep your Microsoft account secure and private Read More »

Data leak vulnerabilities patched in Fuze TPN portal

Fuze has patched a series of vulnerabilities which placed user data and networks at risk Researchers from Rapid7 disclosed the security flaws on Tuesday. In a security advisory, the company said the three issues at hand relate to access controls and authentication in the TPN Handset Portal, which is part of the Fuze platform. Read more

Data leak vulnerabilities patched in Fuze TPN portal Read More »

Over 500 Android apps with a combined 100 million down

More than 500 Android apps, collectively downloaded over 100 million times from the Google Play store, could have been used to secretly distribute spyware to users, thanks to a malicious advertising SDK (software development kit). Mobile apps — especially free ones — commonly use advertising SDKs to deliver ads to their customers through existing advertising networks,

Over 500 Android apps with a combined 100 million down Read More »

Stabbing fruits to breaking your skull: robot bugs make hacking too easy

Researchers have demonstrated how easy it is to hack consumer and industrial robots to do everything from spy to injure in the hopes of waking up vendors that dismiss security in their product cycles. On Tuesday, the security team at IOActive revealed security flaws in robotic products developed by Universal Robots, the UR3, UR5, and

Stabbing fruits to breaking your skull: robot bugs make hacking too easy Read More »