black hat asia 2014

Media organizations and journalists are under attack from hackers

Major media organizations and journalists are under attack from hackers, claimed Google security researchers Shane Huntley and Morgan Marquis-Boire at the Black Hat hackers conference in Singapore. Google researchers reported that 21 of the world’s top 25 news organizations have been the target of likely state-sponsored hacking attacks. According to the Google researchers, several countries…




Justin Bieber's Twitter account hacked

Justin Bieber’s Twitter Account Hacked by Indonesian

Justin Bieber’s Twitter Account Hacked by Indonesian hackers. His Twitter account sent out the following tweet to his 19 million followers: “19 million my ass #biebermyballs.” The messages also had a link which led to an authorization page for application named ShootingStarPro. The hacker also started unfollowing some of the Twitter users who Bieber follows.…




Internet Explorer 10 zero day vulnerability

Internet Explorer 10 zero day vulnerability

A new Internet Explorer 10 zero day vulnerability targets US Military Intelligence. Hackers are using Microsoft’s Internet Explorer (IE) 10 zero day vulnerability and targeting US military personnel’s in an active attack campaign, called as “Operation Snowman”. The exploit, known as CVE-2014-0322, was discovered by security researchers from FireEye and dubbed “Operation Snowman”. The vulnerability…




twitter

Twitter Unrestricted File Upload Vulnerability

Security expert Ebrahim Hegazy, Cyber Security Analyst Consultant at Q-CERT, has found a serious vulnerability in Twitter. The Twitter Unrestricted File Upload Vulnerability allows an attacker to upload files of any extension including PHP. When an application does not validate or improperly validates file types before uploading files to the system, called Unrestricted File upload vulnerability.…




ethical hacking

Ethical Hacking

Due to growing of IT hacking activity worldwide, people are becoming more and more concerned about their security system failures. Throughout your business or everyday life you probably came across with such issues as hacking, system security, data protection etc. The ‘cancer’ of modern technology, hacking, is having rapid development and expanding its targets absorbing…