A severe vulnerability has been found in libwebp, a code library used to render webp images, reports Stack Diary. Webp is a popular image format used by many sites on the Internet – but also by apps and some other software that use web views – and the vulnerability can be used, among other things, to run malicious code on affected devices. Worse yet, it is reportedly being actively exploited by malicious attackers.
Continue reading
Tag Archives: hackers
Officials found suspected Chinese malware hidden in various US military systems. Its intended use is disruption rather than surveillance, a ‘disturbing’ change in intent, experts say.
- Suspected Chinese malware has been identified in several US military systems.
- Unlike other surveillance malware from China, this malware seems intended to disrupt operations.
- The malware could also have the ability to disrupt normal civilian life and businesses.
Hackers can steal cryptographic keys by video-recording power LEDs 60 feet away
Key-leaking side channels are a fact of life. Now they can be done by video-recording power LEDs.
Continue readingWiFi protocol flaw allows attackers to hijack network traffic
Cybersecurity researchers have discovered a fundamental security flaw in the design of the IEEE 802.11 WiFi protocol standard, allowing attackers to trick access points into leaking network frames in plaintext form.
Continue reading
New Python malware backdoors VMware ESXi servers for remote access
A previously undocumented Python backdoor targeting VMware ESXi servers has been spotted, enabling hackers to execute commands remotely on a compromised system.
Continue reading
New Tesla Key Card Vulnerability Lets Hackers Silently Steal Your Ride – Review Geek
It’s no secret that Tesla has endured its share of potential problems regarding hackers accessing vehicles. However, a new report out of Austria shows a big vulnerability with Tesla’s NFC key cards that could let a hacker add a new card, then steal your car.
Continue reading
How Hackers Are Using Raspberry Pi to Hack ATMs – CloudSavvy IT
Cybercriminals are waging a war against banks, emptying their ATM machines of money. Their tools of choice are malware, a key from eBay, and a Raspberry Pi. Here’s how they’re doing it.
Evil Corp: A Deep Dive Into One of the World’s Most Notorious Hacker Groups
Evil Corp has carried out several sophisticated attacks since it first burst onto the online scene. But just how dangerous are they?
In 2019, the United States Justice Department filed charges against Russian national Maksim Yakubets, offering a $5 million reward for information leading to his arrest.
Continue reading
Anonymous Claims to Leak Data on the Texas GOP
Members of the hacker collective Anonymous claim to have leaked a large cache of data belonging to the Republican Party of Texas. The leak, the size of which is unclear, is said to include the “private documents” of the organization.
According to the hackers, those documents are part of the trove of data that was recently stolen from Epik, the controversial web registrar that has often been criticized for its hosting of far-right groups and individuals.
How To Protect Your YouTube Account From Getting Hacked – 9 Tips From a Hacker
Some good tips on here for protecting yourself outside YouTube as well…
YouTube Content Creators keep getting hacked, so here are 9 tips from an cybersec educator about how to protect your google and youtube account from getting hacked.
Continue reading