Hacked: Hacking Finance

Hacked: Hacking Finance


Navigation
CategoryBugs
Featured

Bugs

Automaker Fiat Chrysler Announces Bug Bounty Program

Posted on July 13th, 2016.

The latest bug bounty program from an automobile manufacturer comes from Fiat Chrysler, more than a year after two white hat hackers proved that they could remotely compromise and take control of its popular selling vehicle, the Jeep Cherokee. White hat hackers can now start picking away at cybersecurity flaws in the vehicle software...

Featured

Bugs

Zero Day Offer To Attack Windows For Profit Part Of A Rising Trend

Posted on June 12th, 2016.

SpiderLabs, a team of ethical hackers that fights cybercrime, recently posted a blog about a recent zero day offer to attack Windows that demonstrates how such offerings are marketed and becoming more common. Zero day is a disclosed software vulnerability that hackers can exploit to attack computer programs, data, additional computers or...

Featured

Breaches

FBI: Newfound iPhone Unlocking Technique Won’t Work On Newer Devices

Posted on April 8th, 2016.

The technique the FBI used to unlock an Apple iPhone used in the San Bernardino, Calif. terror attack cannot be used on new devices, FBI Director James Comey told students at Kenyon College in Ohio recently, according to AppleInsider.com. Comey did not reveal the process the FBI used to unlock the phone, but he said it would not work on...

Featured

Bugs

Video: Stagefright Returns; 500 Million Android Devices at Risk

Posted on March 17th, 2016.

A new variant of the dreaded Android-based Stagefright bug has been successfully exploited by security researchers who showed a proof-of-concept of phone getting hacked remotely. The newly discovered Stagefright bug affects users running Android Lollipop, versions 5.0 and 5.1. Israeli software security research company NorthBit has, in a...

Featured

Bugs

DoD Invites Hackers to Hack the Pentagon

Posted on March 4th, 2016.

The Department of Defense has announced that it will invite hackers to test the cybersecurity infrastructure of the Pentagon in a bug bounty program – the first ever in the history of the federal government. A pilot program by the Department of Defense will see ‘vetted’ hackers test their hacking prowess on the department’s public...

Featured

Bugs

German Hospitals Targeted in Ransomware Cybercrime

Posted on February 29th, 2016.

   Following the recent high-profile case of a Hollywood hospital falling prey to ransomware, several German hospitals are under siege with computer systems offline due to the actions of ransomware cybercriminals. Ransomware is easily among the most widespread, high-profile strains of malware lately which can be particularly nasty...

Featured

Bugs

It’s 2016 and Sony Says: The PlayStation Network Is Down

Posted on January 5th, 2016.

Sony has confirmed that the PlayStation Network (PSN) a vast resource that includes the multiplayer platform, the PlayStation Store and other social features are all currently experiencing downtime. It’s a new year and yet some things don’t change. Sony seems to be running into the same old problems. The company has acknowledged that its...

Featured

Bugs

UConn Website Compromise Plugs Malware Download Prompt

Posted on December 28th, 2015.

The University of Connecticut’s website was the target of a cyberattack on Sunday, prompting visitors with a dialog box to download a malicious program pretending to be an updated version of Adobe’s Flash Player. The official website of the University of Connecticut was the subject of a compromise late Sunday, according to the...

Featured

Activism

Top Secret Document Indicates NSA Knew Of Juniper Vulnerabilities In 2011

Posted on December 24th, 2015.

Juniper Networks, a Sunnyvale, Calif-based network hardware manufacturer that last week reported finding an unauthorized code in its firmware making it possible for hackers to access its devices, could have been vulnerable for several years, based on a top-secret document released by Intercept, a website dedicated to transparency in...

Featured

Bugs

Malicious Attackers Add Malware to Guardian’s Cybercrime Article

Posted on December 11th, 2015.

If anything, this particular revelation shows the dark sense of warped humor by malware peddlers and cybercriminals on the internet. The Guardian, a prominent UK publication had published an article which headlined “Cybercrime: Is it out of Control?” that claimed cybercriminals getting more audacious over time. Sure enough,...

Featured

Bugs

Researcher: Even LastPass Will Be Hacked

Posted on November 19th, 2015.

It seems we live in an era where all the things will, indeed, be compromised. Creativity in hacking is at an all-time high, and for perhaps the first time, a generation exists which does not immediately associate hacking with ill-conceived films from the end of the 20th century. As further proof of this observation, Hacked offers the...

Featured

Bugs

New Ransomware Targets Linux Powered Websites

Posted on November 9th, 2015.

A new strain of ransomware targeting Linux-powered websites and servers is discovered in the wild and continues the trend and threat posed by any other ransomware – encrypt a victim’s information and data in exchange for a ransom fee. Ransomware is among the most notorious and damaging strains of malware in recent times with the most...

Featured

Bugs

CryptoWall 4.0: Why the Ransomware Presents a Bigger Threat than Its Predecessor

Posted on November 6th, 2015.

CryptoWall 4.0 is a harder ransomware to protect against than its predecessor, CrptoWall 3.0, according to Heimdal Security. This is pretty serious news, considering CryptoWall 3.0 has raked in an estimated $325 million from hundreds of thousands of victims by demanding ransom payments in bitcoin since the ransomware debuted less than a...

Featured

Bugs

Shady SEO Campaign Spews Malware via a Google Search

Posted on October 19th, 2015.

A team of security researchers have uncovered a malicious SEO campaign that targets unsuspecting users through compromised URLs via script injections. A malware-laced SEO campaign has infected popular keyword searches on Google such as Java JRE, Windows 8 and MSN to affect hundreds of thousands of searches that routinely occur every...

Featured

Breaches

Hackers Figure Out How to Remotely Talk to Siri

Posted on October 15th, 2015.

An exploit like this was bound to happen. Voice recognition technology may have been an idea since Star Trek or before, but it’s only really come to the consumer front in the past few years with the rise of Android and iOS, both of which have voice-activated virtual assistants. Now hackers have, brilliantly, figured out how to...

Featured

Bugs

Malware Peddling Vigilantes behind Linux.Wifatch Speak Up

Posted on October 7th, 2015.

  The group of black/white-hat (?) hackers who infected over 10,000 Linux routers with malware to fend off the really bad malware have come forward in speaking to Symantec, the security software company that originally revealed the mysterious malware. Linux.Wifatch recently made plenty of headlines when security researchers at...

Featured

Bugs

Kemoge: A Vicious New Malware That Could Take over Your Android Device

Posted on October 7th, 2015.

  A new malicious adware dubbed “Kemoge” has been discovered to operate in the wild by security researchers. The malware is spotted spreading worldwide quickly, and it allows the complete compromise and takeover of the targeted Android device. Security researchers at FireEye have uncovered a new Android malware that is aggressively...

Featured

Breaches

Nuclear Facilities are in ‘Denial’ to the risk of a ‘Serious Cyber Attack’

Posted on October 6th, 2015.

A new report makes the damning claim that nuclear power plants around the world have an “element of denial” about the risks of cyberattacks and are ignorant of their inherent cybersecurity flaws. Cybersecurity risks concerning nuclear facilities are on an upward scale. The growing risks are due to the increasing reliance on...

Featured

Bugs

YiSpecter Malware Targets All iOS Devices: More than 100 Apps are Compromised

Posted on October 5th, 2015.

A new ad-based malware dubbed “YiSpecter” is now infecting iPhones and iPads that are both jailbroken and non-jailbroken by abusing private APIs within the iOS system, discovers a security firm. Security firm Palo Alto Networks has uncovered a new malware that appears to originate from an advertising company in China by...

Featured

Breaches

Report: Publicly Disclosed Data Breaches are Increasing, Dramatically

Posted on October 3rd, 2015.

The 2015 Internet Organized Crime Threat Assessment (IOCTA) has revealed that the number of “publically disclosed” data breaches this year has increased significantly, leading to secondary crimes wherein the breached data is used for extortion, identity theft, fraud and other similar offences. The 2015 law enforcement-centric IOCTA...