A security researcher published on Friday another attack on Facebook’s Instagram photo-sharing service that could allow a hacker to seize control of a victim’s account. The attack was developed by Carlos Reventlov around a ...
Tags: Apple, cyber attack, Facebook, Instagram, iPhone, social network
A group of hackers has released a file containing unique identification data for over 1 million Apple iOS devices and claim that the information is part of a larger database stolen from the compromised laptop of an FBI agent. "During ...
Tags: group of hackers, database, unique identification data, FBI agent
Attackers can abuse Facebook’s phone search feature to find valid phone numbers and the name of their owners, according to security researchers. The attack is possible because Facebook doesn’t limit the number of phone number ...
Tags: Facebook, highlightedpost, Mark Zuckerberg, Phone number search, privacy
Microsoft has patched 20 vulnerabilities in Word, Office, Windows, SharePoint Server, SQL Server and other products in its portfolio, including a critical bug in the company’s popular Word programme and another already used to attack ...
Tags: Bugs, Microsoft, Patches, Steve Ballmer, Trojan, vulnerabilities
Facebook has restricted the rate at which users can perform phone number searches on its mobile website in order to block a recently disclosed method of harvesting phone numbers. “The ability to search for a person by phone number ...
Tags: Accounts, Facebook, highlightedpost, Mark Zuckerberg, Passwords, security
The hacktivist collective Anonymous celebrated Guy Fawkes Day on Monday by claiming it had stolen data from Symantec and ImageShack servers and had found a zero-day flaw in ZPanel. Fawkes was arrested over an alleged Nov. 5, 1605 botched ...
Adobe has shut down Connectusers.com,a community forum site for users of its Adobe Connect Web conferencing platform,because the site's user database was compromised. On Tuesday,a hacker named"ViruS_HimA"claimed that he hacked into"one of ...
Tags: Adobe, Connectusers.Com, database compromised, hacker
The recent cyberattack that infected Israeli police computers with malware was likely part of a year-long cyberespionage operation with targets in Israel and the Palestinian territories,according to security researchers from antivirus ...
Tags: Israeli, cyberattack, malware, RAT
IDG News Service - Adobe has shut down Connectusers.com, a community forum site for users of its Adobe Connect Web conferencing platform, because the site's user database was compromised. On Tuesday, a hacker named "ViruS_HimA" claimed ...
Tags: Confirms, Connectusers, community forum
A 16-year-old security researcher from India plans to present a malware application for Windows Phone 8 at the upcoming MalCon security conference in New Delhi,India,on Nov.24. According to a brief description of the presentation on the ...
Tags: MalCon security conference, malware application, Windows Phone 8
IDG News Service-Security researcher Tavis Ormandy discovered critical vulnerabilities in the antivirus product developed by U.K.-based security firm Sophos and advised organizations to avoid using the product on critical systems unless the ...
Tags: critical vulnerabilities, Sophos, Antivirus Product, critical systems
About 200 Android applications hosted on Google Play create spoofed SMS messages on the devices on which they are installed,according to security researchers from antivirus vendor Symantec. This technique can theoretically be used for SMS ...
Tags: Android applications, Google, SMS
CSO-In Windows 8,Microsoft has greatly improved the operating system's ability to detect malware before it has a chance to run,experts say.Windows 8 should also make it more difficult for people to unknowingly install malware in the first ...
IDG News Service-Security researcher Zoltan Balazs has developed a remote-controlled piece of malware that functions as a browser extension and is capable of modifying Web pages,downloading and executing files,hijacking accounts,bypassing ...
Tags: malware, browser extension, remote-controlled, Balazs
Computerworld - Google today awarded $60,000 to a security researcher who cracked Chrome at the search firm's second "Pwnium" hacking contest. The researcher, a teenager who goes by the nickname "Pinkie Pie," was a returning winner: Last ...
Tags: Google, security researcher, Protection