Hacking News

Latest hacking information from the underworld

Hackers snag a $1 laptop by exploiting flaw in point-of-sale systems

Security researchers have devised a way to offer steep discounts or steal goods by hacking vulnerable point-of-sale systems. The researchers at cybersecurity firm ERPScan, which has a commercial stake in the space, found that SAP’s point-of-sale (POS) systems don’t authenticate or check internal commands, allowing anyone with access to the store’s network unrestricted access to […]

Hackers snag a $1 laptop by exploiting flaw in point-of-sale systems Read More »

Nigeria ranked first in Internet-based criminal activities in Africa

The Nigerian Communications Commission (NCC) disclosed that Nigeria currently ranks third globally in cybercrimes. Nigeria comes behind the United Kingdom and the United States of America. Prof. Umar Danbatta, the Director General of NCC disclosed this at the ongoing 2017 Annual General Conference of the Nigerian Bar Association in Lagos, Nigeria. Mr Danbatta stated that the number of internet users

Nigeria ranked first in Internet-based criminal activities in Africa Read More »

Security Lacking in Previous AppleAVEDriver iOS Kernel Extension

An obscure Apple kernel extension patched in July in iOS 10.3.3 was originally built without security measures in place, according to the researcher who privately disclosed the flaws. Today at the Hack in the Box security conference in Singapore, Zimperium zLabs’ Adam Donenfeld was scheduled to disclose details on seven flaws he found in the AppleAVEDriver.kext, a

Security Lacking in Previous AppleAVEDriver iOS Kernel Extension Read More »

Cryptocurrency Mining Malware Hosted in Amazon S3 Bucket

As Bitcoin’s price continues to soar beyond $4,000 USD per, cyber criminals are responding in kind by using techniques long reserved for adware, click-fraud and spying to now drop cryptocurrency miners onto compromised computers. The latest incident comes from a rash of drive-by downloads that are being used to install coin-mining malware called Zminer, according to

Cryptocurrency Mining Malware Hosted in Amazon S3 Bucket Read More »

FBI charges Chinese national with distributing malware used in OPM hack

The FBI has filed charges against a Chinese malware broker named Yu Pingan, alleging that he provided hackers with malware, including the Sakula trojan, to breach multiple computer networks belonging to companies in the US. Yu was arrested on August 21 at Los Angeles International Airport, the Justice Department confirmed to ZDNet. The FBI’s criminal complaint alleges

FBI charges Chinese national with distributing malware used in OPM hack Read More »

​Victoria launches cybersecurity strategy

The Victorian government has launched a new five-year cybersecurity strategy to build resiliency against cyber threats and ensure government information, services, and infrastructure are protected and personnel are ready should the situation arise. Under the Cyber Security Strategy released on Friday, the state government is aiming to protect sensitive citizen and other data against loss, malicious alteration,

​Victoria launches cybersecurity strategy Read More »

No coding skills required: This Android app allows wannabe cyber criminals to build custom ransomware

A ransomware development kit that doesn’t require any coding skills is being sold on underground forums. All a wannabe cyber criminal needs to build their own file-locking malware is an Android phone. Downloadable from hacking discussion boards for free, the Trojan Development Kit (TDK) apps comes with an easy to use interface that allows criminals

No coding skills required: This Android app allows wannabe cyber criminals to build custom ransomware Read More »

Google opens up on Titan security: Here’s how chip combats hardware backdoors

Google has detailed how its custom Titan security chip will prevent cyberattacks that use firmware-based attacks. As Google explained when it unveiled its tiny Titan chip, it would use it to give each server in its cloud its own identity. Now, it’s provided a more detailed rundown of what that means and how Titan will serve

Google opens up on Titan security: Here’s how chip combats hardware backdoors Read More »