The main page Gizmodo was changed. Hackers have made all the users to be redirected to another web-page with the help of optional script.
The group of attackers compromised the well-known design Gizmodo`s reputation. Attackers tried to hack the site in order to spoil their reputation. Hackers changed the page of Brazilian web-portal Gizmodo by adding the script with the help of which guests of the site were redirected to an absolutely another page. The page on which the users were redirected was located in Sweden, under the domain name .se. The sheathing for server control was loaded on a site.
Read moreCanada accused China on Tuesday of hacking into the computers of its research and development arm, which Beijing strongly denied.
China partners each year with thousands of Canadians firms to roll out new technologies, and took advantage of this arrangement to engage in a cyber attack, Ottawa said. "Recently, the government of Canada, through the work of the Communications Security Establishment, detected and confirmed a cyber intrusion on the IT infrastructure of the National Research Council of Canada by a highly sophisticated Chinese state-sponsored actor," said a government statement.
Read moreInformation security is the process of protecting the availability and privacy, but you should be aware that not all your applications are safe. Most of all anti-virus programs were forged by hackers. Experts from Trend Micro conducted research and made the conclusion that applications attack Android users more and more.
The company examined the most popular apps in Google Play and found that more than 77% of these applications are fake. Unlicensed programs are almost identical to the original, but at the same time they are very dangerous. According to the research of the Japanese company, called Trend Micro a huge number of fake software were found.
Read moreBoffins get your mobe to spill the beans using Google text-to-speech kit. Researchers from the Chinese University of Hong Kong have developed bizarre malware that dictates contacts, emails and other sensitive text data in order to steal it.
In the novel attack a seemingly innocuous app that required no permissions called a bad guy's phone number and blabbered the stolen data out of the speakers and down the microphone using Google Voice Services (GVS). It affected 'nearly all' Android devices and could not be detected by VoicEmployer malware or victims, provided savvy hackers conducted the attack in the wee hours with the volume turned down.
Read moreAttackers are exploiting a vulnerability in distributed search engine software Elasticsearch to install DDoS malware on Amazon and possibly other cloud servers.
Elasticsearch is an increasingly popular open-source search engine server developed in Java that allows applications to perform full-text search for various types of documents through a REST API (representational state transfer application programming interface). Because it has a distributed architecture that allows for multiple nodes, Elasticsearch is commonly used in cloud environments. It can be deployed on Amazon Elastic Compute Cloud (EC2), Microsoft Azure, Google Compute Engine and other cloud platforms.
Read moreHackers have enrooted harmful programs in computer, which steal personal information from guests.
Secret Service of the USA has found keyloggers in hotels and advised all heads of hotel and restaurant business to check personal computers, which visitors can use. To steal personal and bank information on visitors, malefactors enrooted malware, which remembers pressing of keys on the keyboard. Some people, suspected in compromising computers of many large hotels in Fort Worth and Dallas areas were arrested in Texas. Sometimes the suspects used stolen credit cards to register as guests of the hotels.
Read moreThe Yo app is in the top 10 in the App Store in the USA plus it got 1 million dollars of investments.
The app was noted even by Elon Musk who had called it the best messenger. It appears that the app was hacked by three students from college. Firstly, cracking allows to recognize any phone number of the app user (hackers have already learnt phone number of app founder, and talked to him). Secondly, they can send "Yo" to any user in any quantity. Thirdly, cracking allows sending the push-notice to any user, with any text (guys decided not to do it). Generally, hackers have already reported to the author about the problem and he has confirmed the fact of cracking.
Read moreNokia paid millions of euros to a blackmailer to protect an encryption key of the Symbian phones in 2008.
The National Bureau of Investigation confirms that the case is still unsolved. The matter is investigated as aggravated extortion, says Detective Superintendent Tero Haapala. Journalists said that the blackmailers had acquired the encryption key for a core part of Nokia's Symbian software and threatened to make it public. Had it done so anyone could then have written additional code for Symbian including possible malware which would have been indistinguishable from the legitimate part of the software, MTV said.
Read moreMalefactors can send a harmful code to devices, transmitting packages of data through radio or television channels.
So called smart TV are vulnerable to carrying out drive-by of attacks in which course the exploit is applied to interception of a digital television signal instead of IP-address data. About it in the research report Yossef Oren and Anzhelos Keromitis from Network Security Lab at the Colombian university. "For attack it isn't necessary either the IP address, or the server. Access on a roof to the antenna is needed only, and you can't almost be traced," scientists emphasize.
Read moreDutch group of hackers named doulCi can activate blocked by means of Activation Lock function iPhones, using false iCloud servers.
Team DoulCi published a workaround that requires users to plug a bricked device into their computer and alter the "hosts" file inside. The iPhone or iPad is then tricked into connecting to the hacked server, which unlocks the gadget. Then the device is enough to be connected to iTunes and to dump Activation Lock regularly. DoulCi system works only partially: in attempt to unblock iPhone by their method, GSM module remains disconnected because hackers have no corresponding activation keys, however they promise to correct a problem shortly. The user gets access only to device operating system and Wi-Fi.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland