News 

Dropbox employee’s password reuse led to theft of 60M+ user credentials

Dropbox disclosed earlier this week that a large chunk of its users’ credentials obtained in 2012 was floating around on the dark web. But that number may have been much higher than we originally thought. Credentials for more than 60 million accounts were taken, as first reported by Motherboard and confirmed by TechCrunch sources. The revelation of a password breach at Dropbox is an evolution of the company’s stance on the 2012 incident — the company initially said that user emails were the only data stolen. * Read the full…

Read More
News 

Hackers Trick Facial-Recognition Logins With Photos From Facebook (What Else?)

Facial recognition makes sense as a method for your computer to recognise you. After all, humans already use a powerful version of it to tell each other apart. But people can be fooled (disguises! twins!), so it’s no surprise that even as computer vision evolves, new attacks will trick facial recognition systems, too. Now researchers have demonstrated a particularly disturbing new method of stealing a face: one that’s based on 3-D rendering and some light Internet stalking. * Read the full article there

Read More
Info 

10 Best Password Cracking Tools Of 2016 | Windows, Linux, OS X

Password cracking is an integral part of digital forensics and pentesting. Keeping that in mind, we have prepared a list of the top 10 best password cracking tools that are widely used by ethical hackers and cybersecurity experts. These tools–including the likes of Aircrack, John the Ripper, and THC Hydra–use different algorithms and protocols to crack the passwords on a Windows, Linux, and OS X system. * Read the full article here

Read More
News 

Cloud hacking trick allows undetectable changes to VM memory

Hacking researchers have uncovered a new attack technique which can alter the memory of virtual machines in the cloud. The team, based at Vrije Universiteit, Amsterdam, introduced the attack, dubbed Flip Feng Shui (FFS) in a paper titled Flip Feng Shui: Hammering a Needle in the Software Stack. They explained hackers could use the technique to crack the keys of secured VMs or install malicious code without it being noticed. * Read the full article here

Read More
News 

Hackers Can Now Steal Data by Listening to the Sound of a Computer’s Hard Drive

The DiskFiltration hack, demonstrated by security researcher Mordechai Guri of Israel’s Ben-Gurion University, works by controlling the actuator in a hard drive which moves back and forth across the drive’s platters to read and write data. Think of it as the arm on a record player, but constantly moving back and forth at tremendous speeds. * Read the full article here

Read More
News 

Linux TCP bug lets attackers remotely hijack web traffic

Researchers from the University of California, Riverside (UCR) have identified the vulnerability as CVE-2016-5696. It is considered as a “subtle flaw” available in the form of ‘side channels’ in Linux operating system since late 2012. The flaw can enable attackers to infer the TCP sequence numbers associated with a particular connection to track users’ online activity as well as terminate existing connections and even inject false material during a communication. * Read the full article here

Read More
Skip to toolbar