ReVuln Ltd. , a small security company headed by Donato Ferrante and
Luigi Auriemma, post a video that demonstrates that how attacks can gain
root on the appliances.
Samsung Smart TV contain a vulnerability which allows remote attackers
to swipe data from attached storage devices.
In this demonstration readers will see how it is possible to use a 0-day
vulnerability to retrieve sensitive information, root access, and
ultimately monitor and fully control the device remotely.
Auriemma said, “We have tested different Samsung televisions of the
latest generations running the latest version of their firmware.
Saudi Arabia's national oil company "Aramco" is the country’s largest
oil production facility and is a significant exporter in the
Organization of the Petroleum Exporting Countries. They said that a
cyber attack against it in August which damaged some 30,000 computers
was aimed at stopping oil and gas production at the biggest OPEC
exporter.
The interior ministry said it was carried out by organised hackers from
several different foreign countries and Aramco employees and contractors
were not involved.
“The main target in this attack was to stop the flow of oil and gas to
local and international markets.
Anonymous hackers once again hit Egyptian Government Websites and taken
down. Hackers react under operation named #OpEgypt and hit 30 websites
with DDos attack. Hacktivist using the handle @AnonymousGrupo claimed
the responsibility of attack.
Attacked websites include, The Egyptian Presidency website, The Egyptian
Cabinet, Trade Agreements Sector (TAS), Maritime Transport site,
Central Agency for Public Mobilization and Statistics, parliament
website, Income Tax and many more.
At the time of writing, many sites has been restored, but a few
like http://www.presidency.gov.eg/ is still under maintenance.
A Gold Coast, Australian medical centre computers are infected with some
ransom malware by a group of Russian hackers. The hackers encrypted the
practice’s patient database, demanding payment of $4000 for the files
to be decrypted.
"Cyber criminals based mainly throughout Eastern Europe look for rich
targets, places with identifying information to extort," Mr Phair,
director of the Centre for Internet Safety and a former investigator
with the Australian High-Tech Crime Centre.
There have been 11 similar offences in Queensland this year, according
to police.
"H4ksniper" hacker claiming responsibility for disrupting three South
African government websites. This morning after hack, website of The
social development department opened to a black page with a window
containing the animated graphic “Website hacked by H4ksniper”.
Another message on the deface page was "Hello South Africa :D , Bad News
For You IM BACK ! ..You Messed With Us & Now You Must Suffer..From
Morocco with love."
On asking, hacker said that the reason of hack is " We all know that SA
is the first supporter of the [República Árabe Saharaui Democrática]
RASD and the enemy of Morocco since a long time and we are hackers....
Hacker Supporting Anonymous Group, with his nickname - "PV~E.rr0r" hack
516 websites. Deface page shows a very cool animated Anonymous logo
with text "We unite as one but no one can divide us. Expect us!"
Because hacker intention was not to harm the website, so he has not
change or delete any file, rather he just just upload his deface page on
each site at "/Err0r.html" .
In a message, Hacker told The Hacker News that purpose of hacking
website is just to show their admins that they are vulnerable and need
more security
A new version of the Zeus botnet was used to steal about $47 million
from European banking customers in the past year. This Zeus variant
Trojan is blamed for attacks that stole more than 36 million Euros ($47
million U.S. dollars) from an estimated 30,000 consumer and corporate
accounts at European banks.
Dubbed "Eurograbber" is more than just another banking Trojan. It's an
exploitation of fundamental online banking authentication practices that
could strike any institution.
With the phone number and platform information, the attacker sends a
text message to the victim's phone with a link to a site that downloads
what it says is "encryption.
It's known, drones are privileged vehicles for reconnaissance and
attacks, technology has achieved level of excellence and their use is
largely diffused, that's why defense companies are providing new
solution to make them increasingly effective.
But the incredible amount of technological components could be itself a
point of weakness, last year in fact an U.S. stealthy RQ-170 Sentinel
drone was captured by Iranian military near the city of Kashmar.
The vehicle was used in reconnaissance mission, it took off from near
Afghanistan, exactly from Kandahar airfield.
In this hours government of Teheran has announced to have captured..
No comments:
Post a Comment