hijack
- News
DoubleAgent Attack Turns Anti-Virus Against System to Hijack PC
A new attack mechanism has been uncovered by Cybellum security researchers that can be used to hijack a PC by injecting malicious computer code via the very thing that people believe is protecting their system: the Anti-virus software. Instead of the typical malware which tries to hide itself, the new…
Read More » - News
QNAP Patches Firmware Update Injection Flaw
A while ago, F-Secure Corp.’s researchers found a flaw in QNAP’s operating system that could allow a hacker to gain full administrator access to your system, but luckily it has now been patched. That means that you should check you QNAP system if it has the latest firmware installed – but…
Read More » - News
No Need to Shoot Down Nuisance Drones – Hack Them Instead
The proliferation of consumer drones in the last decade has been a boon for remote-control flying enthusiasts and filmmakers, but not so much for public servants – like police and fire services – not to mention normal people, either concerned for their privacy or just annoyed over the flying devices…
Read More » - News
Tesla Model S Remotely Hacked By Researchers
Tesla’s Model S may be one of the most technologically advanced vehicles on the road, with its large suite of features and Autopilot system. Unfortunately, now researchers have managed to use this to their own advantage, identifying a number of security vulnerabilities in the electric car that could facilitate…
Read More » - News
Here’s How Steam Got Hacked Last Week
Did you think that email confirmations and generated code needed to log into unauthorized computers would stop hackers from hijacking your Steam account? Well, think again! But to be fair, it seems like the real problem was mainly down to the security team at Steam. Before you freak out, the…
Read More » - News
Secret Service Agencies Wanted to Put Malware on Your Android Phones
I don’t think it will be a shock to hear about yet another way government agencies try to spy on people, but they are getting bolder day after day it seems. A recently leaked document by Edward Snowden, dubbed IRRITANT HORN, reveals how agencies from the United States, United Kingdom,…
Read More » - News
Hackers Using New Phishing Technique to Exploit Router Flaws
There have been a number of unusual hacking techniques employed in Brazil recently. A group of hackers have used a “novel approach” to pull off a pharming attack by using phishing emails, as stated by security firm Proofpoint. A pharming attack usually requires access to an ISP’s or organisation’s DNS…
Read More » - News
Craigslist Knocked Offline
Craigslist was knocked offline yesterday (Sunday) and at the time of writing, it still hasn’t come back. The suspected DNS hijack was previously redirecting visitors to a website called Digital Gangster. The Next Web points out that this site was behind a famous 2009 Twitter hack and another hack which took…
Read More » - News
RickMote Controller App Lets You Rickroll Your Chromecast Neighbors
The Raspberry Pi has proven to be a useful tool for security researchers once again. This time, the Chromecast has been exploited, having found an interesting bug that lets you take control of any TV using the device. From a techy point of view, the Chromecast uses a ‘deauth’ command…
Read More » - News
GoZeuS Returns a Month after Authorities Take Measures Against the Malware
Though authorities had taken action against the GoZeuS and CryptoLocker malware which stole hundreds of thousands of banking logins from users and blackmail them for millions of pounds, it seems that the malwares are back. A month after the campaign, online criminals seem to have tried to rebuild the sophisticated…
Read More » - News
Australian Apple Devices Get Hijacked Using ‘Find My iPhone’ Feature
Apple’s Find My iPhone feature is one of the most important features of the company’s security, having the ability to find, lock and even erase and iPhone, iPad, iPod or Mac’s data in case it is stolen or lost. However, what would happen if it would somehow got ‘hijacked’? Some…
Read More » - News
No Privacy For Chrome Thanks To Speech Recognition Hack
An expert in speech recognition states that Google Chrome users are exposed to various attacks and malware infections that can hijack the computer’s microphone. With this, all conversations in the room can be recorded for extended periods of time. In order to gain access to the microphone however, users need…
Read More »