black hat asia 2014

Media organizations and journalists are under attack from hackers

Major media organizations and journalists are under attack from hackers, claimed Google security researchers Shane Huntley and Morgan Marquis-Boire at the Black Hat hackers conference in Singapore. Google researchers reported that 21 of the world’s top 25 news organizations have been the target of likely state-sponsored hacking attacks. According to the Google researchers, several countries…




Microsoft Can Search Your Email Without A Court Order

Microsoft Can Search Your Email Without A Court Order

Microsoft Can Search Your Email Without A Court Order. Microsoft employee who was arrested this week and charged with leaking the information about Windows 8 to the blogger, before the software was released in 2012. As part of its investigation, Microsoft accessed the blogger’s Hotmail account without a court order. Bellow Microsoft explanation: “During an investigation…




Justin Bieber's Twitter account hacked

Justin Bieber’s Twitter Account Hacked by Indonesian

Justin Bieber’s Twitter Account Hacked by Indonesian hackers. His Twitter account sent out the following tweet to his 19 million followers: “19 million my ass #biebermyballs.” The messages also had a link which led to an authorization page for application named ShootingStarPro. The hacker also started unfollowing some of the Twitter users who Bieber follows.…




Vulnerabilities in Cisco Wireless Routers

Vulnerabilities in Cisco Wireless Routers

Cisco has released patches to fix the serious security Vulnerabilities in Cisco Wireless Routers. The Vulnerabilities could allow a remote attacker to take complete control of the router. The Cisco Wireless LAN Controller (WLC) product family is affected by the following vulnerabilities: Cisco Wireless LAN Controller Denial of Service Vulnerability Cisco Wireless LAN Controller Unauthorized…




Internet Explorer 10 zero day vulnerability

Internet Explorer 10 zero day vulnerability

A new Internet Explorer 10 zero day vulnerability targets US Military Intelligence. Hackers are using Microsoft’s Internet Explorer (IE) 10 zero day vulnerability and targeting US military personnel’s in an active attack campaign, called as “Operation Snowman”. The exploit, known as CVE-2014-0322, was discovered by security researchers from FireEye and dubbed “Operation Snowman”. The vulnerability…




twitter

Twitter Unrestricted File Upload Vulnerability

Security expert Ebrahim Hegazy, Cyber Security Analyst Consultant at Q-CERT, has found a serious vulnerability in Twitter. The Twitter Unrestricted File Upload Vulnerability allows an attacker to upload files of any extension including PHP. When an application does not validate or improperly validates file types before uploading files to the system, called Unrestricted File upload vulnerability.…




cnn website hacked by sea

CNN’s Twitter, Facebook and website hacked by Syrian Electronic Army

A well-known CNN’s Twitter, Facebook and website hacked by Syrian Electronic Army hacker group,aligned with President Bashar al-Assad, who successfully attacked The New York Times, Huffington Post, and Twitter, BBC, National Public Radio, Al-Jazeera, Microsoft, Xbox, Skype and responsible for cyber-attacks against various other U.S media companies in the past. The affected accounts included CNN’s main Facebook…




hire a hacker

CBI arrests Indian mastermind behind Hire a Hacker service on FBI tip-off

For the first time in history, Indian Law Enforcement Agency ‘Central Bureau of Investigation’ (CBI) has arrested a Cyber criminal behind Hire a Hacker service after getting a tip-off from the US Federal Bureau of Investigation (FBI). 33-Year-old Amit Vikram Tiwari, son of an Indian Army colonel and an engineering dropout, who allegedly ran two websites…