Hackers breach Healthcare.gov system

A government system Healthcare.gov used by insurance agents and brokers to help customers sign up for healthcare plans was breached. The Centers for Medicare and Medicaid Services confirmed the breach in a late Friday announcement: Earlier this week, CMS staff detected anomalous activity in the Federally Facilitated Exchanges, or FFE’s Direct Enrollment pathway for agents and…




black hat asia 2014

Media organizations and journalists are under attack from hackers

Major media organizations and journalists are under attack from hackers, claimed Google security researchers Shane Huntley and Morgan Marquis-Boire at the Black Hat hackers conference in Singapore. Google researchers reported that 21 of the world’s top 25 news organizations have been the target of likely state-sponsored hacking attacks. According to the Google researchers, several countries…




Justin Bieber's Twitter account hacked

Justin Bieber’s Twitter Account Hacked by Indonesian

Justin Bieber’s Twitter Account Hacked by Indonesian hackers. His Twitter account sent out the following tweet to his 19 million followers: “19 million my ass #biebermyballs.” The messages also had a link which led to an authorization page for application named ShootingStarPro. The hacker also started unfollowing some of the Twitter users who Bieber follows.…




Internet Explorer 10 zero day vulnerability

Internet Explorer 10 zero day vulnerability

A new Internet Explorer 10 zero day vulnerability targets US Military Intelligence. Hackers are using Microsoft’s Internet Explorer (IE) 10 zero day vulnerability and targeting US military personnel’s in an active attack campaign, called as “Operation Snowman”. The exploit, known as CVE-2014-0322, was discovered by security researchers from FireEye and dubbed “Operation Snowman”. The vulnerability…




twitter

Twitter Unrestricted File Upload Vulnerability

Security expert Ebrahim Hegazy, Cyber Security Analyst Consultant at Q-CERT, has found a serious vulnerability in Twitter. The Twitter Unrestricted File Upload Vulnerability allows an attacker to upload files of any extension including PHP. When an application does not validate or improperly validates file types before uploading files to the system, called Unrestricted File upload vulnerability.…




cnn website hacked by sea

CNN’s Twitter, Facebook and website hacked by Syrian Electronic Army

A well-known CNN’s Twitter, Facebook and website hacked by Syrian Electronic Army hacker group,aligned with President Bashar al-Assad, who successfully attacked The New York Times, Huffington Post, and Twitter, BBC, National Public Radio, Al-Jazeera, Microsoft, Xbox, Skype and responsible for cyber-attacks against various other U.S media companies in the past. The affected accounts included CNN’s main Facebook…




hire a hacker

CBI arrests Indian mastermind behind Hire a Hacker service on FBI tip-off

For the first time in history, Indian Law Enforcement Agency ‘Central Bureau of Investigation’ (CBI) has arrested a Cyber criminal behind Hire a Hacker service after getting a tip-off from the US Federal Bureau of Investigation (FBI). 33-Year-old Amit Vikram Tiwari, son of an Indian Army colonel and an engineering dropout, who allegedly ran two websites…




ethical hacking

Ethical Hacking

Due to growing of IT hacking activity worldwide, people are becoming more and more concerned about their security system failures. Throughout your business or everyday life you probably came across with such issues as hacking, system security, data protection etc. The ‘cancer’ of modern technology, hacking, is having rapid development and expanding its targets absorbing…