Facebook Releases "Fizz" — A New Open Source #TLS 1.3 Implementation Library Designed For High Performance and Security
https://thehackernews.com/2018/08/fizz-tls-ssl-library.html …
Facebook Also Uses Fizz to Secure Trillions of Connections Everyday
https://thehackernews.com/2018/08/fizz-tls-ssl-library.html …
Facebook Also Uses Fizz to Secure Trillions of Connections Everyday
Apple Chip Maker TSMC Blames #WannaCry Ransomware Attack for Production Halt
https://thehackernews.com/2018/08/tsmc-wannacry-ransomware-attack.html
https://thehackernews.com/2018/08/tsmc-wannacry-ransomware-attack.html
👍1
Hacker Leaked #Snapchat Source Code On GitHub
https://thehackernews.com/2018/08/snapchat-hack-source-code.html
—by @Swati_THN
https://thehackernews.com/2018/08/snapchat-hack-source-code.html
—by @Swati_THN
👏1
New WhatsApp vulnerabilities could let malicious users modify private/group chats and spread fake news or misinformation. Check out the video demonstration to learn how the 3 "unpatched attacks" work!
https://thehackernews.com/2018/08/whatsapp-modify-chat-fake-news.html
https://thehackernews.com/2018/08/whatsapp-modify-chat-fake-news.html
Security researchers release open source—Social Mapper—facial recognition tool that tracks people across social media networks, including: Facebook, Instagram, Twitter, LinkedIn, Google+, VKontakte, Weibo & Douban.
https://thehackernews.com/2018/08/social-mapper-osint.html
https://thehackernews.com/2018/08/social-mapper-osint.html
🤔1
Researchers Developed AI-Powered (Artificial Intelligence) Stealthy "DeepLocker" Malware to Demonstrate Future Threats
https://thehackernews.com/2018/08/artificial-intelligence-malware.html
https://thehackernews.com/2018/08/artificial-intelligence-malware.html
Flaws in Pre-Installed Apps Expose Millions of Android Devices to Hackers. Affected Android handsets are from Asus, ZTE, LG, Essential, Vivo, Sony, Nokia, Oppo, Sky, Leagoo, Plum, Orbic, MXQ, Doogee, Coolpad, and Alcatel.
https://thehackernews.com/2018/08/android-app-hack.html
https://thehackernews.com/2018/08/android-app-hack.html
👍1
Google is tracking of billions of Android, iPhone users’ minute-by-minute locations without permissions—even with 'Location History' turned off, report revealed
https://thehackernews.com/2018/08/google-mobile-location-tracking.html
https://thehackernews.com/2018/08/google-mobile-location-tracking.html
Researchers introduce "Man-in-the-Disk" — a new attack vector that potentially expands the Android attack surface for millions of devices
. Using it against vulnerable apps could allow attackers to silently infect phones with malicious apps or launch DoS attacks
https://thehackernews.com/2018/08/man-in-the-disk-android-hack.html
. Using it against vulnerable apps could allow attackers to silently infect phones with malicious apps or launch DoS attacks
https://thehackernews.com/2018/08/man-in-the-disk-android-hack.html
👍1
Remote hackers can compromise your entire network just by sending you a Fax message
. Check out video demonstration and learn how the 'Faxploit' attack works.
https://thehackernews.com/2018/08/hack-printer-fax-machine.html
. Check out video demonstration and learn how the 'Faxploit' attack works.
https://thehackernews.com/2018/08/hack-printer-fax-machine.html
Adobe releases August 2018 #security updates to patch a total of 11 vulnerabilities in its #FlashPlayer, Creative Cloud Desktop Application, #Adobe Experience Manager, Adobe Acrobat and Reader.
PATCH NOW! https://thehackernews.com/2018/08/adobe-patch-updates.html
PATCH NOW! https://thehackernews.com/2018/08/adobe-patch-updates.html
Microsoft releases security patch updates for a total 60 vulnerabilities, of which 19 are rated as critical and 39 important.
https://thehackernews.com/2018/08/microsoft-patch-updates.html
August 2018 Patch Tuesday also addresses two publicly disclosed vulnerabilities that are under active attack.
https://thehackernews.com/2018/08/microsoft-patch-updates.html
August 2018 Patch Tuesday also addresses two publicly disclosed vulnerabilities that are under active attack.
Foreshadow Attacks — Three new speculative execution side-channel vulnerabilities discovered in Intel CPUs. In addition to the data stored in the OS kernel memory, new flaws could also reveal sensitive information from VMs, hypervisors and SMM memory.
https://thehackernews.com/2018/08/foreshadow-intel-processor-vulnerability.html
https://thehackernews.com/2018/08/foreshadow-intel-processor-vulnerability.html
Former Microsoft Engineer has been sentenced to 18-months in prison and three years of supervised release after pleading guilty to money laundering charges in connection with the Reveton ransomware attacks.
https://thehackernews.com/2018/08/microsoft-reveton-ransomware.html
https://thehackernews.com/2018/08/microsoft-reveton-ransomware.html
Watch Out! Cybercriminals using a new 'simple yet effective' technique to bypass #Microsoft Office 365 anti-phishing protections
https://thehackernews.com/2018/08/microsoft-office365-phishing.html
https://thehackernews.com/2018/08/microsoft-office365-phishing.html
Instagram Got Hacked — In a Widespread Hacking Campaign Attackers Locked Thousands of Users Out of Their Accounts.
Some Victims Claimed They Even Had Two-factor Authentication Enabled.
https://thehackernews.com/2018/08/hack-instagram-accounts.html
Some Victims Claimed They Even Had Two-factor Authentication Enabled.
https://thehackernews.com/2018/08/hack-instagram-accounts.html
👍2
Google Patches A Chrome Browser Bug (CVE-2018-6177) That Could Have Allowed Remote Hackers to Find Out Everything Facebook like Sites Know About You.
PoC Released. Make sure you have installed the latest version of Google Chrome.
https://thehackernews.com/2018/08/google-chrome-vulnerability.html
PoC Released. Make sure you have installed the latest version of Google Chrome.
https://thehackernews.com/2018/08/google-chrome-vulnerability.html
👍1
New #PHP Exploitation Technique Could Leave Thousand of Websites at Risk of Hacking, Including #WordPress Blogs
https://thehackernews.com/2018/08/php-deserialization-wordpress.html
https://thehackernews.com/2018/08/php-deserialization-wordpress.html
That's embarrassing! A 16-year-old school boy hacked Apple Servers—not once, but numerous times—and downloaded 90GB of secure files.
Teen claims to have hacked the company because he is a huge Apple fan and dreams of working there.
Read more at
https://thehackernews.com/2018/08/apple-hack-servers.html
Teen claims to have hacked the company because he is a huge Apple fan and dreams of working there.
Read more at
https://thehackernews.com/2018/08/apple-hack-servers.html
👍1
Critical Sandbox Bypass Vulnerabilities in Ghostscript Interpreter Could Expose Many Systems and Software to Remote Code Execution Attacks
https://thehackernews.com/2018/08/ghostscript-postscript-vulnerability.html
https://thehackernews.com/2018/08/ghostscript-postscript-vulnerability.html
⚡Important — a new critical RCE vulnerability (CVE-2018-11776) discovered in the "Apache Struts" framework that could let remote hackers take over affected web servers.
https://thehackernews.com/2018/08/apache-struts-vulnerability.html
https://thehackernews.com/2018/08/apache-struts-vulnerability.html
👍1