Attackers can abuse Facebook’s phone search feature to find valid phone numbers and the name of their owners, according to security researchers. The attack is possible because Facebook doesn’t limit the number of phone number ...
Tags: Facebook, highlightedpost, Mark Zuckerberg, Phone number search, privacy
Hackers have compromised two servers used by the FreeBSD Project to build third-party software packages.Anyone who has installed such packages since Sept.19 should completely reinstall their machines,the project's security team warned. ...
Tags: hackers, FreeBSD, third-party software packages, SSH Keys
Cyber criminals are increasingly using .eu domain names in their attack campaigns, according to data from multiple security companies. “Numerous malicious .eu domains have been registered during November which are being used to ...
Tags: cyberattacks, cybercrime, highlightedpost, malware
Facebook has restricted the rate at which users can perform phone number searches on its mobile website in order to block a recently disclosed method of harvesting phone numbers. “The ability to search for a person by phone number ...
Tags: Accounts, Facebook, highlightedpost, Mark Zuckerberg, Passwords, security
Some cloud providers fail to detect and block malicious traffic originating from their networks, which provides cyber criminals with an opportunity to launch attacks in a botnet-like fashion, according to a report from security consultancy ...
Tags: cloud provider, network, security consultancy, BAE System
The hacktivist collective Anonymous celebrated Guy Fawkes Day on Monday by claiming it had stolen data from Symantec and ImageShack servers and had found a zero-day flaw in ZPanel. Fawkes was arrested over an alleged Nov. 5, 1605 botched ...
IDG News Service-The Romanian domain names of Google,Yahoo,Microsoft,Kaspersky Lab and other companies were hijacked on Wednesday and were redirected to a hacked server in the Netherlands. The hijacking occurred at the DNS(Domain Name ...
Tags: Attackers hijack, hacked server, Netherlands, security breach
The recent cyberattack that infected Israeli police computers with malware was likely part of a year-long cyberespionage operation with targets in Israel and the Palestinian territories,according to security researchers from antivirus ...
Tags: Israeli, cyberattack, malware, RAT
About 200 Android applications hosted on Google Play create spoofed SMS messages on the devices on which they are installed,according to security researchers from antivirus vendor Symantec. This technique can theoretically be used for SMS ...
Tags: Android applications, Google, SMS
Romanian national Manole Razvan Cernaianu,known online as TinKode,received a two-year suspended prison sentence for hacking into computer systems owned by Oracle,NASA,the U.S.Army and the U.S.Department of Defense and was ordered to pay ...
Tags: NASA, TinKode, Oracle, computer-related offenses
Despite an increasing number of successful cyberattacks launched by East Asian hackers against companies and government institutions around the world in recent years,Eastern European cybercriminals remain a more sophisticated threat to the ...
Infoworld - When it comes to IT security, FUD (fear, uncertainty, and doubt) is more than just the tool of overhyping vendors hoping to sell their next big thing. It is the reality that seasoned IT security pros live in, thanks in large ...
Tags: IT security, FUD, Paul Ferguson, antivirus scanner
A new Web-based social engineering attack that relies on malicious Java applets attempts to install backdoors on Windows, Linux and Mac computers, according to security researchers from antivirus vendors F-Secure and Kaspersky Lab. The ...
Tags: Desktop Apps, US, engineering attack, electronic technology