Hacking News

Latest hacking information from the underworld

Windows 10: If you want a highly secure device, follow these rules, says Microsoft

Microsoft has released a new document explaining the minimum hardware and firmware requirements to create a “highly secure” Windows 10 device. If you’ve got a Surface Pro 4, which has a sixth-generation Intel processor, it doesn’t meet Microsoft’s newly published standard. Read more

Windows 10: If you want a highly secure device, follow these rules, says Microsoft Read More »

Serious Tor browser flaw leaks users’ real IP addresses

A newly-discovered bug exposes the real-world IP addresses of those who are using the Tor browser, used by millions for anonymity and private browsing. The bug, called TorMoil by security firm We Are Segment, which discovered it, is triggered when a user clicks on a local file-based address, like file://, rather than http:// or https://.

Serious Tor browser flaw leaks users’ real IP addresses Read More »

Malware Dev Who Used Spam Botnet to Pay for College Gets No Prison Time

A Pittsburgh judge sentenced a malware dev to two years probation and no prison time for his involvement with a spam botnet. The man in question is Sean Tiernan, 29, of Santa Clara, California, and the FBI says he was in control of a botnet made up of over 77,000 computers infected with malware that

Malware Dev Who Used Spam Botnet to Pay for College Gets No Prison Time Read More »

WordPress patches SQL injection bug in security release

A bug discovered in WordPress allows attackers to trigger an SQL injection attack leading to be complete website hijacking. The vulnerability was discovered in the WordPress content management system (CMS) versions 4.8.2 and below. On Tuesday, WordPress announced the launch of version 4.8.3 as a security release which mitigates the security flaw. Read more

WordPress patches SQL injection bug in security release Read More »

Cisco Talos researchers have discovered 23 vulnerabilities in Circle with Disney monitoring software which could be used to hijack full families of devices. Circle with Disney is touted as “the smart way for families to manage content and time online, on any device.” The $99 Android and iOS-compatible product pairs wirelessly and can be used

Read More »

Four things we learned when Facebook, Google, Twitter testified in Russia inquiry

Tech giants Facebook, Google, and Twitter testified for the first time to senators on Tuesday as part of an ongoing congressional investigation into Russian meddling in the 2016 election. Representatives from the three tech titans spoke to what they know about alleged Russian interference using their platforms to buy ads, promote stories, and spread misinformation

Four things we learned when Facebook, Google, Twitter testified in Russia inquiry Read More »

The Entire Internet can be taken down with this BotNet According to the Researchers

This advanced threat has been declared as the Reaper botnet and performs other attacks look childish. Mira worked by affecting unsecured devices with default passwords to add them to the botnet. The Reaper runs by actively hacking and infiltrating millions of devices throughout the globe. News described it as “the contrast between checking for open doors and actively picking

The Entire Internet can be taken down with this BotNet According to the Researchers Read More »