- Hacking -

Last update 09.10.2017 13:52:27

Introduction  List  Kategorie  Subcategory 0  1  2  3  4  5  6  7  8  Hacker techniques



16.3.19

EPIC Promises to Fix Game Launcher after Privacy Concerns

Hacking

Bleepingcomputer

16.3.19

Students Hack School System to Change Grades and Attendance

Hacking

Bleepingcomputer

16.3.19

Leading Israeli Candidate for PM Targeted by Iranian Hackers

Hacking

Securityweek

16.3.19

Default Account in Cisco CSPC Allows Unauthorized Access

Hacking

Securityweek

15.3.19

Purveyor of Cracked Netflix, Hulu, Spotify Accounts Arrested

Hacking

Threatpost

14.3.19

Beware of Bitcoin Investment Emails Pushing Clipboard Hijackers

Hacking

Bleepingcomputer

9.3.19

Smart Car Alarms Ironically Expose Millions of Vehicles to Remote Hijacking

Hacking

Bleepingcomputer

9.3.19

RSAC 2019: The Dark Side of Machine Learning

Hacking

Threatpost

8.3.19

Man Admits to Hacking Minnesota Databases Over Cop Acquittal

Hacking

Securityweek

7.3.19

Pirate matryoshka

Hacking

Securelist

2.3.19

MageCart Group Evolves Tactics To Better Steal Your Credit Cards

Hacking

Bleepingcomputer

27.2.19

Card-Skimming Scripts Hide Behind Google Analytics, Angular

Hacking

Threatpost

27.2.19

Modern browser APIs can be abused for hijacking device resources

Hacking

Net-security

27.2.19

Increasing security measures are driving cybercriminals to alter their techniques

Hacking

Net-security

26.2.19

How to Attack and Defend a Prosthetic Arm

Hacking

Securelist

25.2.19

Prosecutors Seek 3-Year Sentence in 'Celebgate' Hacking Case

Hacking

Securityweek

23.2.19

Hacking Virtual Reality – Researchers Exploit Popular Bigscreen VR App

Hacking

Thehackernews

20.2.19

Insights on modern adversaries and their tactics, techniques, and procedures

Hacking

Net-security

18.2.19

Toyota PASTA Car-Hacking Tool will be soon on GitHub

Hacking

Securityaffairs

15.2.19

Hackers Target WordPress Sites via WP Cost Estimation Plugin

Hacking

Securityweek

15.2.19

Hacker Breaches Dozens of Sites, Puts 127 Million New Records Up for Sale

Hacking

Thehackernews

14.2.19

Attackers Completely Destroy VFEmail’s Secure Mail Infrastructure

Hacking

Threatpost

13.2.19

Hacker deleted all data from VFEmail Servers, including backups

Hacking

Securityaffairs

13.2.19

Indictment: Hackers Charged With Making Threats to Schools

Hacking

Securityweek

13.2.19

Hackers Destroyed VFEmail Service – Deleted Its Entire Data and Backups

Hacking

Thehackernews

6.2.19

RDP Servers Can Hack Client Devices: Researchers

Hacking

Securityweek

6.2.19

70 real-life hackers and cybersecurity practitioners share their personal insights

Hacking

Net-security

5.2.19

Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs

Hacking

Thehackernews

5.2.19

RDP Servers Can Hack Client Devices: Researchers

Hacking

Securityweek

29.1.19

Authorities Seize Hacked Server Marketplace

Hacking

Securityweek

25.1.19

Hackers Using RDP Are Increasingly Using Network Tunneling to Bypass Protections

Hacking

Securityweek

24.1.19

PHP PEAR official site hacked, tainted package manager distributed for 6 months

Hacking

Securityaffairs

23.1.19

Hacker threatened a family using a Nest Camera to broadcast a fake missile attack alert

Hacking Securityaffairs

23.1.19

Hacker Uses Nest Camera to Broadcast Hoax Nuke Alert

Hacking Securityweek

23.1.19

Someone Hacked PHP PEAR Site and Replaced the Official Package Manager

Hacking Thehackernews

23.1.19

Hacker Uses Nest Camera to Broadcast Hoax Nuke Alert

Hacking

Securityweek

23.1.19

Most out of date applications exposed: Shockwave, VLC and Skype top the list

Hacking

Net-security

22.1.19

Ex-Employee Hacks WPML WordPress Plugin Site and Spams Users

Hacking

Bleepingcomputer

21.1.19

Former Employee Hacks Popular WordPress Plugin’s Website

Hacking

Securityweek

18.1.19

Portuguese Hacker Linked to 'Football Leaks' Held in Hungary

Hacking Securityweek

17.1.19

New Magecart Group Targets French Ad Agency

Hacking Securityweek

17.1.19

Hackers infect e-commerce sites by compromising their advertising partner

Hacking

Thehackernews

17.1.19

Fortnite Hacked Via Insecure Single Sign-On

Hacking

Threatpost

17.1.19

Magecart Returns with Advertising Library Tactic

Hacking

Threatpost

17.1.19

Compromised ad company serves Magecart skimming code to hundreds of websites

Hacking

Net-security

16.1.19

Fortnite Flaws Allowed Hackers to Takeover Gamers' Accounts

Hacking Thehackernews

16.1.19

Two Hackers Charged with Hacking SEC System in Stock-Trading Scheme

Hacking Thehackernews

15.1.19

New Variant of BEC Seeks to Divert Payroll Deposits

Hacking

Securityweek

15.1.19

Hack a Tesla Model 3, get cash and the car

Hacking

Net-security

15.1.19

Godaddy Injecting JavaScript That May Break Customer Sites

Hacking

Bleepingcomputer

15.1.19

Hack Allows Escape of Play-with-Docker Containers

Hacking

Threatpost

11.1.19

Hackers Using Zero-Width Spaces to Bypass MS Office 365 Protection

Hacking Thehackernews

7.1.19

unCAPTCHA AI Cracks Google reCAPTCHAs with 90% Accuracy

Hacking

Threatpost

4.1.19

Town of Salem RP Game hacked, more than 7.6M Players affected

Hacking Securityaffairs

3.1.19

Microsoft's Bali Data Bank to Help Users Manage Their Data

Hacking Bleepingcomputer

3.1.19

Website of Dublin Tram System Hacked

Hacking Securityweek

3.1.19

Thousands of Google Chromecast Devices Hijacked to Promote PewDiePie

Hacking Thehackernews

3.1.19

Hackers Hijack Smart TVs to Promote PewDiePie

Hacking Threatpost

3.1.19

Hacker Streaming PewDiePie Videos on Exposed Chromecast DevicesHacking Bleepingcomputer

30.12.18

Shared Tweeting Privileges Easy to Get by Spoofing Phone Numbers

Hacking

Bleepingcomputer

30.12.18

Hackers bypassed vein based authentication with a fake hand

Hacking

Securityaffairs

28.12.18

Guardzilla Home Cameras Open to Anyone Wanting to Watch Their Footage

Hacking

Threatpost

28.12.18

35C3 Day One: Security, Art and Hacking

Hacking

Threatpost

28.12.18

Hijacking Online Accounts Via Hacked Voicemail Systems

Hacking

Threatpost

25.12.18

Orange LiveBox Modems Targeted for SSID and WiFi Info

Hacking Bleepingcomputer
23.12.18 Info on Over 500,000 Students and Staff Exposed in San Diego School District HackHacking Bleepingcomputer

18.12.18

Hackers have become increasingly deft at stealing student data

Hacking

Net-security

17.12.18

PewDiePie Hackers Launch Second Printer Siege, According to Reports

Hacking

Threatpost

15.12.18

Logitech Keystroke Injection Flaw Went Unaddressed for Months

Hacking

Net-security

14.12.18

Logitech Keystroke Injection Flaw Went Unaddressed for Months

Hacking

Net-security

13.12.18

France's Travel Alert Registry HackedHacking Securityweek

11.12.18

Secure Messaging Applications Prone to Session HijackingHacking Securityweek

11.12.18

Highly Active MuddyWater Hackers Hit 30 Organizations in 2 MonthsHacking Securityweek

11.12.18

Linux.org Redirected to NSFW Page Spewing Racial Epithets

Hacking

Threatpost

10.12.18

Expert devised a new WiFi hack that works on WPA/WPA2

Hacking

Securityaffairs

10.12.18

Mitigating the risk of Office 365 account hijacking

Hacking

Net-security

10.12.18 Linux.org Defaced via DNS Hijack Hacking Securityweek
9.12.18STOLEN PENCIL campaign, hackers target academic institutions. Hacking Securityaffairs
9.12.18Pressing F7 in the Command Prompt Lists Previously Entered Commands Hacking Bleepingcomputer
6.12.18Warning! Unprivileged Linux Users With UID > INT_MAX Can Execute Any Command Hacking Thehackernews

6.12.18

Adobe Flash Zero-Day Leveraged Via Office Docs in Campaign

Hacking

Threatpost

4.12.18

YouTuber PewDiePie Promoted Via 50K Hacked Printers

Hacking

Threatpost

3.12.18Hacker hijacks printers worldwide to promote popular YouTube channel Hacking Securityaffairs

1.12.18

Someone Hacked 150,000 Printers to Promote PewDiePie YouTube Channel

Hacking

Thehackernews

27.11.18

Experts demonstrate how to exfiltrate data using smart bulbs

Hacking

Securityaffairs
19.11.18

Stopping the Infiltration of Things

Hacking

Threatpost

19.11.18Million password resets and 2FA codes exposed in unsecured Vovox DBHacking PBWCZ.CZ
19.11.186,500+ sites deleted after Dark Web hosting provider Daniel’s Hosting hackHacking PBWCZ.CZ
18.11.18Many ATMs Can be Hacked in Minutes: ReportHacking PBWCZ.CZ

16.11.18

Gmail Bugs Allow Changing From: Field and Spoofing Recipient's Address

Hacking Bleepingcomputer
15.11.18

Connected Wristwatch Allows Hackers to Stalk, Spy On Children

Hacking

Threatpost

9.11.18689,272 plaintext records of Amex India customers exposed onlineHacking PBWCZ.CZ
8.11.18Evernote Flaw Allows Hackers to Steal Files, Execute CommandsHacking PBWCZ.CZ
8.11.18Hackers Target Telegram, Instagram Users in IranHacking PBWCZ.CZ
7.11.18Hey there! How much are you worth?Hacking PBWCZ.CZ
3.11.18FIFA was hacked again, this is the second hack in a yearHacking PBWCZ.CZ
23.10.18Hackers Deface Website of Saudi Investment ForumHacking PBWCZ.CZ
23.10.18Saudi Future Investment Initiative website defaced by the hackersHacking PBWCZ.CZ
18.10.18After 2016 Hack, Illinois Says Election System SecureHacking PBWCZ.CZ
17.10.18A simple message containing certain symbols could crash the Sony PlayStation 4Hacking PBWCZ.CZ
10.10.18Hackers can compromise your WhatsApp account by tricking you into answering a video callHacking PBWCZ.CZ
8.10.18Expert presented a new attack technique to compromise MikroTik RoutersHacking PBWCZ.CZ
4.10.18Tesco Bank Fined by UK Regulator Over HackingHacking PBWCZ.CZ
24.9.18Hackers Target Real Estate Deals, With Devastating ImpactHacking PBWCZ.CZ
24.9.18Firefox DoS issue crashes the browser and sometimes the Windows OSHacking PBWCZ.CZ
18.9.18Wisconsin Officials Prepare for Potential Election HackersHacking PBWCZ.CZ
18.9.18MageCart Attackers Compromise Cloud Service Firm FeedifyHacking PBWCZ.CZ
18.9.18EOSBet Gambling application hacked, crooks stole $200,000 worth of EOSHacking PBWCZ.CZ
12.9.18Researchers show how to clone Tesla S Key Fobs in a few secondsHacking PBWCZ.CZ
11.9.18Other 3,700 MikroTik Routers compromised in cryptoJacking campaignsHacking PBWCZ.CZ
10.9.18Attackers Made 9,000 Unauthorized Database Queries in Equifax Hack: ReportHacking PBWCZ.CZ
4.9.18Experts warn of 7,500+ MikroTik Routers that are hijacking owners’ trafficHacking PBWCZ.CZ
4.9.18Compromising Proxy Call Session Control Function (P-CSCF) using VoLTEHacking PBWCZ.CZ
4.9.18Parental control spyware app Family Orbit hacked, pictures of hundreds of monitored children were exposedHacking PBWCZ.CZ
4.9.18John McAfee’s Bitfi cryptocurrency wallet was hacked by a security duoHacking PBWCZ.CZ
4.9.18TrendMicro links Urpage hacking crew to other threat actorsHacking PBWCZ.CZ
29.8.18Man Accused of Hacking Into Bank Account, Stealing $300,000Hacking PBWCZ.CZ
28.8.18Google Tells Toomey Hackers Tried to Infiltrate Staff EmailHacking PBWCZ.CZ
24.8.18Intel Simplifies Microcode Update License Following ComplaintsHacking PBWCZ.CZ
22.8.18Dark Tequila AñejoHacking PBWCZ.CZ
21.8.18Anonymous Hackers Target Spain Sites in Catalonia ProtestHacking PBWCZ.CZ
21.8.18Anonymous collective brought down Spain sites to support CataloniaHacking PBWCZ.CZ
16.8.18Hundreds of Instagram accounts were hijacked in a coordinated attackHacking PBWCZ.CZ
15.8.18Foreshadow: New Speculative Execution Flaws Found in Intel CPUsHacking PBWCZ.CZ
14.8.18Key Reuse opens to attacks on IPsec IKE, Cisco, Huawei, ZyXEL products are affectedHacking PBWCZ.CZ
13.8.18 Nigerian Man Found Guilty on Charges Related to HackingHacking PBWCZ.CZ
12.8.18 DNS Hijacking targets Brazilian financial institutionsHacking PBWCZ.CZ
9.8.18Leaked GitHub API Token Exposed Homebrew Software RepositoriesHacking PBWCZ.CZ
8.8.18 BGP Hijacking Attacks Target US Payment ProcessorsHacking PBWCZ.CZ
8.8.18 Hacking WiFi Password in a few steps using a new attack on WPA/WPA2Hacking PBWCZ.CZ
7.8.18New Method Discovered for Cracking WPA2 Wi-Fi PasswordsHacking PBWCZ.CZ
6.8.18Ex-Tesla Worker Accused of Hacking Seeks $1M in CounterclaimHacking PBWCZ.CZ
6.8.18TCM Bank: website misconfiguration exposed applicant data for 16 monthsHacking PBWCZ.CZ
3.8.18Student Charged in Elaborate Digital Money Theft SchemeHacking PBWCZ.CZ
23.7.18Half a Billion Enterprise Devices Exposed by DNS RebindingHacking PBWCZ.CZ
23.7.18 Software Supply Chain Increasingly Targeted in Attacks: SurveyHacking PBWCZ.CZ
19.7.18 Charitable Hackers Collaborate in Deep Web ForumsHacking PBWCZ.CZ
18.7.18Trump Says 'Might' Ask Putin to Extradite Accused Russian HackersHacking PBWCZ.CZ
18.7.18Hacker Offers Access to Machine at International Airport for $10Hacking PBWCZ.CZ
12.7.18German Hosting Firm DomainFactory HackedHacking PBWCZ.CZ
12.7.18Two More Traders Convicted in Newswire Hacking SchemeHacking PBWCZ.CZ
12.7.18 A tainted version of Arch Linux PDF reader package found in a user-provided AURHacking PBWCZ.CZ
12.7.18Do you want penetrate an airport network? An RDP access to internal machine goes for $10 on the dark web.Hacking PBWCZ.CZ
11.7.18HP iLO servers running outdated firmware could be remotely hackedHacking PBWCZ.CZ
11.7.18GoDaddy-owned hosting company Domainfactory hackedHacking PBWCZ.CZ
5.7.18Gentoo Publishes Incident Report After GitHub HackHacking PBWCZ.CZ
26.6.18Misconfigured Java web server component Jolokia expose website at cyber attacksHacking PBWCZ.CZ
24.6.18According to the experts, North Korea is behind the SWIFT attacks in Latin AmericaHacking PBWCZ.CZ
20.6.18Ex-CIA employee Joshua Adam Schulte charged with leaking Vault 7 dumpsHacking PBWCZ.CZ
14.6.18World Cup: US Spy Warns Russians Will Hack Phones, ComputersHacking PBWCZ.CZ
9.6.18Hackers Can Hijack, Sink Ships: ResearchersHacking PBWCZ.CZ
6.6.18 26 Million Users Hit by Ticketfly HackHacking PBWCZ.CZ
2.6.18Visa payments DOWN: Millions affected by a service disruptionHacking PBWCZ.CZ
2.6.18Ticketfly website was compromised, the hacker also stole customers’ dataHacking PBWCZ.CZ
29.5.18The Cobalt Hacking crew is still active even after the arrest of its leaderHacking PBWCZ.CZ
28.5.18Hackers defaced screens at Mashhad airport in Iran protesting the governmentHacking PBWCZ.CZ
27.5.18A bug in T-Mobile site allowed anyone see any customer’s account detailsHacking PBWCZ.CZ
24.5.18Experts warn: it is too easy to steal WiFi access key from TalkTalk ‘s Super RoutersHacking PBWCZ.CZ
20.5.18Misconfigured CalAmp server allowed hacker to take over a lot of vehiclesHacking PBWCZ.CZ
17.5.18 Mexican central bank confirmed that SWIFT hackers stole millions of dollars from Mexican BanksHacking PBWCZ.CZ
16.5.18Hackers Divert Funds From Mexico Banks, Amount Unclear: OfficialHacking PBWCZ.CZ
11.5.18Mining passwords from dozens of public Trello boardsHacking PBWCZ.CZ
11.5.18A Simple Tool Released to Protect Dasan GPON Routers from Remote HackingHacking PBWCZ.CZ
11.5.18 Hackers Found Using A New Way to Bypass Microsoft Office 365 Safe LinksHacking PBWCZ.CZ
11.5.18Tech giant Telstra warns cloud customers they’re at risk of hack due to a SNAFUHacking PBWCZ.CZ
9.5.18Are you using Python module ‘SSH Decorator’? Newer versions include a backdoorHacking PBWCZ.CZ
9.5.18Nintendo Switches Hacked to Run Linux—Unpatchable Exploit ReleasedHacking PBWCZ.CZ
30.4.18PDF Files Can Silently Leak NTLM CredentialsHacking PBWCZ.CZ
28.4.18 How to use weaponized PDF documents to steal Windows credentialsHacking PBWCZ.CZ
27.4.18F-Secure experts devised a Master Key that unlocks millions of hotel roomsHacking PBWCZ.CZ
26.4.18Do Not Disturb app will protect your device from evil maid attacksHacking PBWCZ.CZ
26.4.18Hotel Rooms Around the World Susceptible to Silent BreachHacking PBWCZ.CZ
18.4.18Honeypot Shows the Power of Automation in the Hands of HackersHacking PBWCZ.CZ