Hacking News

Latest hacking information from the underworld

Face ID just got Hacked with the help of a mask by a security firm

Apple uses the Tenth Anniversary iPhone X Phone to replace Touch ID. Because the award handset features an edge-to-edge protection and has very slim bezels, Apple had to get up with a way to reinstate the fingerprint scanner that powers Touch ID. So the group in Cupertino decided to use a facial identification system to […]

Face ID just got Hacked with the help of a mask by a security firm Read More »

Security researchers were able to bypass the iPhone X’s Face ID system using a specially crafted mask

Bkav (security firm) said that it was able to bypass the iPhone X’s Face ID system using a specially crafted mask, although Apple attempts to specifically prevent that fraud, but normal users have no obvious reasons to be concerned about the claimed attempts. Read more

Security researchers were able to bypass the iPhone X’s Face ID system using a specially crafted mask Read More »

How did someone hijack your Gmail? Phishing, keylogger or password reuse, we’re guessing

Google has teamed up with computer scientists at the University of California, Berkeley, to find out how exactly hijackers take over its users’ accounts.The eggheads peered into online black markets where people’s login details are bought and sold to get an idea of the root cause of these account takeovers and the subsequent theft of

How did someone hijack your Gmail? Phishing, keylogger or password reuse, we’re guessing Read More »

Evil pixels: researcher demos data-theft over screen-share protocols

It’s the kind of thinking you expect from someone who lives in a volcano lair: exfiltrating data from remote screen pixel values.The idea comes from Pen Test Partners’ Alan Monie, taking a break from sex toy hacks and wondering how to get data over a connection like RDP (remote desktop protocol) when the target had

Evil pixels: researcher demos data-theft over screen-share protocols Read More »

Not even ordering pizza is safe from the browser crypto-mining scourge

A total of 2,531 of the top 3 million websites (1 in 1,000) are running the Coinhive miner, according to new stats from analytics firm Red Volcano. BitTorrent sites and the like were the main offenders but the batch also included the Ecuadorian Papa John’s Pizza website [see source code]. Read more

Not even ordering pizza is safe from the browser crypto-mining scourge Read More »

You know what’s coming next: FBI is upset it can’t get into Texas church gunman’s smartphone

FBI agents investigating the murder-suicide of 26 people in a church in Sutherland Springs, Texas, on Sunday, have said they can’t yet unlock the shooter’s smartphone. In a press conference on Tuesday, special agent Chris Combs said that investigations into the motives and actions of the gunman was ongoing, but that his mobe was a

You know what’s coming next: FBI is upset it can’t get into Texas church gunman’s smartphone Read More »