Category: Other


United Airlines cockpit door access codes accidentally posted online

United Continental Holdings Inc, the company that owns United Airlines and United Express, sent out an alert email to employees on Saturday about a breach in cockpit-door security procedures after a flight attendant mistakenly posted some information (including access codes) on a public website, Wall Street Journal reported. On some commercial aircraft, there is a keypad next to the flight deck door...

750 total views, 2 views today


Security concerns increasing over car hacking, Volkswagen starts an automotive cyber security company

In July 2015, Fiat Chrysler Automobiles (FCA) issued a recall for 1.4 million vehicles (including 2014-2015 Jeep Grand Cherokee and Cherokee SUVs, 2015 Dodge Challenger sports coupes and other models) in order to patch a software vulnerability which allowed security researchers to remotely hack vehicles and take control of significant functions (including brakes) using cellular connection while they were 10 miles away. The hack also shocked...

936 total views, no views today


Research revealed that deleted WhatsApp messages aren’t actually deleted!

An iOS security expert discovered that your WhatsApp messages aren’t actually deleted even you try to delete them by selecting ‘Clear All Chats’ option.  The same issue also exists on Apple’s popular instant messaging service called iMessage. Jonathan Zdziarski’s research revealed that the latest version of WhatsApp, the most popular cross-platform instant messaging client with some one billion users, leaves forensic...

1,119 total views, no views today


Foreign VPN service unavailable since an upgrade of China’s Great Firewall

Cyber security analysts on Thursday defended China’s Internet management after an overseas VPN (virtual private network) company on Wednesday announced some of its users in China have been unable to use the service since an upgrade of the Great Firewall, China’s Internet infrastructure. Cyber services should observe the network governance of the country for safety, analysts urged. Astrill claimed in a...

3,288 total views, no views today


The FBI used Metasploit to unmask TOR users

The Tor network has been getting a lot of attention lately and one of the most frequent questions people ask is, “Is it less anonymous than we think?” Multiple ways of unmasking Tor network users revealed recently such as exploiting a Firefox vulnerability or analysing Cisco’s ‘Netflow’ data. And according to ‘Wired’ report, one of them called “Decloaking Engine”  is used by FBI to help...

6,370 total views, no views today


Automakers aim to drive away car computer hackers

Against the team of hackers, the poor car stood no chance. Meticulously overwhelming its computer networks, the hackers showed that — given time — they would be able to pop the trunk and start the windshield wipers, cut the brakes or lock them up, and even kill the engine. Their motives were not malicious. These hackers worked on behalf of the...

1,552 total views, no views today


Dirtbox devices on spy planes used to target criminals, but also collecting data from thousands of other phones

The Justice Department is scooping up data from thousands of mobile phones through devices deployed on airplanes that mimic cellphone towers, a high-tech hunt for criminal suspects that is snagging a large number of innocent Americans, according to people familiar with the operations. The U.S. Marshals Service program, which became fully functional around 2007, operates Cessna aircraft from at least five...

1,572 total views, no views today


MasterCard with a built-in fingerprint scanner is coming in 2015

  MasterCard partnered with Zwipe to create the world’s first credit card that combines biometric authentication and contactless payment technology. Financial institution Sparebanken DIN of Norway conducted a live pilot of the Zwipe MasterCard over the last few months. For security purposes, the fingerprints of the user are stored in the Zwipe MasterCard instead of an external database. The biometric authentication technology...

3,610 total views, no views today


Facebook doubles ad-hacking bounty

  Facebook has doubled the cash it will pay out to folks who report holes in its advertising code. The bounty will rise in a bid to entice hackers to report bugs found in its ads code following an internal security audit that squashed an undisclosed number of vulnerabilities. Security engineer Collin Greene said the Zucker-empire will double bug pay-outs until...

1,758 total views, no views today


Your mobile phone may be giving away your personal information

When popular Chinese handset maker Xiaomi Inc admitted that its devices were sending users’ personal information back to a server in China, it prompted howls of protest and an investigation by Taiwan’s government. The affair has also drawn attention to just how little we know about what happens between our smartphone and the outside world. In short: it might be in...

1,646 total views, no views today


Bad guys have a new and hard to detect way to steal your ATM pin code

Now bad guys have a new and hard to detect way to steal your ATM pin code. And all they need is an easy-to-buy  iPhone case (FLIR one) that turns the phone into an infrared thermal camera. Watch the video to find out how they manage to steal ATM pin codes and how to prevent. 1,619 total views, no views today

1,619 total views, no views today


Hackers infected Belgian Charleroi airport servers with malware, turned them into botnet nodes.

De Standaard, a Belgian newspaper reported yesterday that hackers infected several Belgian Charleroi airport network servers with malware and turned them into botnet. Since the malware had full access to the compromised infrastructure and infected servers pass all kinds of information about the airport and its users,  it is also suspected that airport and customer data have been stolen. Authorities believe that the...

2,390 total views, no views today


GCHQ targeting internet-connected computers in 27 countries with port scanning program HACIENDA

For the past five years, British spying nerve-center GCHQ has been port scanning internet-connected computers in 27 countries – in a exhaustive hunt for systems to potentially exploit. That bombshell comes amid fresh leaks detailing the dragnet surveillance programs operated by the Five Eyes nations: America, UK, Canada, Australia and New Zealand. German publisher Heise reports that the HACIENDA program scans...

2,921 total views, no views today


Russian hackers stole 1.2 billion passwords

  Russian hackers stole 1.2 billion Internet credentials from major US companies and others around the world in what is likely the biggest data breach ever, security researchers said Tuesday. The US firm Hold Security said the gang which it dubbed “CyberVor” collected confidential user names and passwords were stolen from some 420,000 websites, ranging from household names to small Internet...

1,397 total views, no views today


WiFi connected light bulbs hacked, vulnerability exposed WiFi passwords

Researchers from British security firm Context have discovered that the LIFX light bulb, a WiFi enabled multi-color and energy efficient LED light bulb, could be used by a hacker to capture the WiFi details and decrypt the credentials from a distance of 30 meters without any authentication. LIFX light bulbs connect to a WiFi network and using different wireless network protocols  in order to allow them...

2,258 total views, no views today


Millions of dynamic DNS users suffered outages after Microsoft’s takedown of No-IP

(See the Update section at the bottom for the latest status.) No-IP is a dynamic DNS service which allows users to set up dynamic DNS using their own domain name.  It works by mapping users IP addresses to a No-IP domain name ( for example) and allows users to connect to a system using a memorable sub-domain if they forget their IP address or even if an...

2,415 total views, no views today


Loophole in PayPal service allows users to double money in their account endlessly

Security researcher Razvan Cernaianu (from security firm ‘Cyber Smart Defence’) found and reported a method which allows PayPal users to double the money in their PayPal account endlessly. Cernaianu described the loophole he found in the PayPal service  as ‘much worse’ than a web vulnerability. Also impact level of the vulnerability is classified as critical. He explained details of the vulnerability he found as follows...

1,500 total views, no views today


NSA collecting faces from social media, emails, video conferences and other communications.

According to The New York Times, National Security Agency’s reliance on facial recognition technology has grown significantly over the last four years and N.S.A. is collecting huge numbers of images of people from emails, text messages, social media, video conferences and other communications. The New York Times posted the details and NSA’s efforts about a new software to exploit the flood of images as follows;...

1,511 total views, no views today


UK government proposes life sentences for serious cyberattacks

(The Guardian) – The UK government has said it wants to hand out life sentences to anyone found guilty of a cyberattack that has a catastrophic effect, under plans announced in the Queen’s speech. Any hackers that manage to carry out “cyberattacks which result in loss of life, serious illness or injury or serious damage to national security, or a significant risk...

2,147 total views, no views today


Arkansas State University data breach leaves 50,000 individuals potentially impacted

(Arkansas State University News) The Arkansas Department of Human Services has informed Arkansas State University about a data breach in the College of Education and Behavioral Science’s Department of Childhood Services (CHS) that could cause exposure of personally identifiable information. A-State Chief Information Officer Henry Torres said DHS notified the campus late Wednesday that the breach involved a database related to...

2,439 total views, no views today