HackRead



Hackers used Samsung website to access Sprint’s customer data

By Waqas Sprint Corporation, an American telecommunications company has announced that it has suffered a data breach after unknown hackers accessed customer accounts credentials using the Samsung.com “add a line” website. Originally, the company was informed about the breach on June 22nd, 2019. The personal information which was accessed in the incident included full names, phone numbers, […] Thi...

Hacker gets $30,000 for reporting hack Instagram account flaw

By Waqas The flaw allowed anyone with knowledge of brute force attack to hack Instagram accounts without raising any suspicion. How to hack Instagram account? This is something that every Tom, Dick, and Harry wants to know since with over a billion users, Instagram is the world’s largest photo and video-sharing social networking service. While people are […] This is a post from HackRead.com Read ...

How to secure your website – InfoSec tips for newbie website owners

By David Balaban And Again About Hosting Security! Today, there are still many people who think that the Internet is as a comprehensive encyclopedia of the world. However, their number is decreasing. There are more and more people who rightfully consider the Internet as a means of earning money. It can attract a large number of new customers […] This is a post from HackRead.com Read the original ...

Agent Smith Android malware has infected 25 million devices so far

By Waqas Agent Smith malware exploits Android vulnerabilities to target unsuspected users for credential stealing. The IT security researchers at CheckPoint have discovered a new variant of smartphone malware whose primary target is Android devices and so far the malware has infected more than 25 million Android devices. Dubbed “Agent Smith” by researchers; the malware identifies and […] This is ...

Twitter is down – Twitter’s website & app suffering outage (Updated)

By Waqas As surprising as it may sound, Facebook is up but Twitter is down. The online news and social networking site Twitter is down right now after suffering a massive outage. This comes as a surprise since Twitter has a proven track record of maintaining its service even when social media giants like Facebook and Instagram […] This is a post from HackRead.com Read the original post: Twitter i...

10 ways to keep yourself secure online against cyber attacks

By Uzair Amir Have you ever received emails from unknown sources claiming to offer insurance, lottery tickets or advertisements? You may have noticed that such emails always have a link that they prompt you to click. What lies on the other side of the link can be any one of many ways to phish users into giving away […] This is a post from HackRead.com Read the original post: 10 ways to keep yours...

Unprotected MongoDB leaks 188m users’ data from sensitive search engine

By Waqas Another day, another data breach; this time, a security researcher has discovered a massive trove of data hosted on an unprotected MongoDB database available for anyone to access without any authentication. Discovered by Comparitech’s researcher Bob Diachenko on June 18, 2019; the database contained personal sensitive information of over 188 million people. According to Diachenko’s […] T...

Cyber ​​attacks cost $45 billion in 2018 with Ransomware at top

By Waqas An estimated 2 million cyberattacks took place in 2018 costing more than $45 billion in damages worldwide. The worse part is that while cyberattacks are surging authorities are struggling to tackle the growing threat, said study released on Tuesday. Ransomware attacks According to the Internet Society’s Online Trust Alliance (OTA), which compiles data from the […] This is a post from Hac...

Vulnerability in Zoom video conference app lets Mac’s camera hijacking

By Waqas The vulnerability in the Zoom video conference app lets attackers hijack Mac’s camera by merely using malicious websites. The Zoom video conference app is currently being used by millions of users around the world and that makes it a lucrative target for cybercriminals. Jonathan Leitschuh, an IT security researcher has discovered a critical zero-day vulnerability […] This is a post from ...

10 Powerful But Not Yet Promoted Antivirus for PC, Mac, Android, iPhone

By Lesley Haught The vulnerability of the regular computer user is at an all-time high. Not even the strongest of world governments have been able to stay safe from attacks, unauthorized accesses, and data leakages attempted by hackers, malware programs. The big question, then, that every computer and Internet user needs to ask is – is the current […] This is a post from HackRead.com Read the ori...

Man who carried out DDoS attacks against PSN & Xbox jailed

By Waqas The cybercriminal was also involved in several other cybercrimes including swatting and deleting databases of targeted websites. Austin Thompson, a DDoS attacker going by the online handle of Derp Trolling has been sentenced to 2.25 years (27 months) in prison for conducting DDoS attacks on gaming giants back in 2013 to 2014. In November last […] This is a post from HackRead.com Read the...

Cloudflare’s recent 502 Bad Gateway outage blamed on bad software

By Waqas If you are visiting a website and it is displaying “502 Bad Gateway” error it is not your fault but an issue with Cloudflare. Cloudflare, the world’s largest “Content Delivery Network” (CDN) on the internet has suffered a service disruption causing “502 Bad Gateway” error on thousands of Cloudflare-proxied domains since this morning including CoinDesk. […] This is a post from HackRead.co...

Mobile app building is simple and affordable – the Appy Pie way!

By Owais Sultan Steve Jobs had it right! There is an app for everything and businesses today, big and small, are realizing it. Mobile apps, in their limited time of existence, have made a massive impact on the industry and creating mobile apps is not limited to just the big leagues. This is a post from HackRead.com Read the original post: Mobile app building is simple and affordable – the Appy Pi...

Popular Android Zombie game phish users to steal Gmail credentials

By Waqas The app made its way to Google Play Store was also found phishing users for Facebook credentials. Scary Granny ZOMBY Mod: The Horror Game 2019 is the latest game on Google Play Store that is condemned by the digital security fraternity for sneakily stealing personal data from unsuspecting users. The game, which has been downloaded […] This is a post from HackRead.com Read the original po...

Crooks steal $28M in crypto using Google Adwords & spoofed domains

By Uzair Amir Authorities arrested six suspects including five males and one female in simultaneous raids carried out in a joint operation. The raids and subsequent arrests were carried out to trace $28 million worth of stolen Bitcoin. The raids were conducted as part of a 14-month long, large-scale, global police investigation involving European law enforcement agencies including […] This is a p...

Office 365 Phishing Protection – Is Native Microsoft Protection Safe?

By Waqas For the last couple of years, there has been a surge in phishing attacks against businesses and unsuspecting users. What’s worse is that phishing, which was previously merely a fraudulent attempt to obtain sensitive information, is now spreading malicious content including ransomware. While tech and cybersecurity companies are focusing on providing top-notch security to their […] This is...

ViceLeaker Android malware steals call recordings, photos, videos & texts

By Waqas Israeli Citizens are the Primary Target of New Android Mobile Spying Campaign Using ViceLeaker Malware, says Kaspersky. Kaspersky Lab researchers discovered an Android malware campaign active since 2016 and still going strong. Dubbed ViceLeaker; researchers claim that it is the product of a group of hackers that is specifically targeting Middle Eastern and Israeli citizens. […] This is a...

New Windows 10 bug causes PCs to take longer to shut down

By Uzair Amir Windows 10 bug: If you have a device connected via cable to the USB Type-C input, you may have to wait another minute to turn off your computer – The bug exists in USB Type-C Connector System Software Interface (UCSI) software. The new bug in Windows 10 is not a serious one, but it somewhat […] This is a post from HackRead.com Read the original post: New Windows 10 bug causes PCs to...

New attack spreads LokiBot & NanoCore malware in ISO image files

By Waqas Both NanoCore and LokiBot are Info-stealing Trojans. Security researchers at the San Francisco-based firm Netskope have discovered a new malware campaign distributing the info-stealer malware LokiBot and NanoCore via ISO image file attachments that appear to be an invoice. It is noteworthy that LokiBot malware was discovered back in October 2017 and is equipped with […] This is a post fr...

7 Easy-to-Use Java Performance Tuning Tips

By Owais Sultan Are you looking for easy-to-use Java performance tuning tips because you want to learn more developer knowledge and experience because of the current over-complicated process of optimization techniques? With a bit of practice, there are a few easy ways to learn best practices that allow you to build and optimize a well-designed and executed application. […] This is a post from Hac...

How Phishing Has Evolved in 2019

By David Balaban Phishing attacks host every kind of malware and ransomware attack but what’s worse is that these attacks are on the rise. Starting in 2012, ransomware took the Internet by storm, thanks to latest phishing techniques. Unsuspecting and unprepared users, both individuals and businesses, found their screens frozen, their data no longer their own, and the […] This is a post from HackR...

Cellular networks worldwide hit by hackers in espionage attempt

By Uzair Amir Cybereason, an Israeli-US security firm based in Boston, has reported that certain nation-state hackers managed to compromise the systems of no less than ten cellular carriers across the globe to steal metadata of specific users. Without naming anyone, the company claims that the targeted users and the attackers both belong to China. The campaign is […] This is a post from HackRead....

Researchers exploit LTE flaws to send 50,000 fake presidential alerts

By Waqas Researchers managed to cover a 50,000 seat football stadium using only four malicious portable stations. A group of security researchers from the University of Colorado Boulder has published a paper detailing the findings of their latest research revealing that LTE vulnerabilities can help attackers send out fake presidential alerts. To do this, they only need […] This is a post from Hac...

9 risky apps that you need to monitor on your kids’ smartphone

By Owais Sultan Parents should know if their under 18 child has these apps on their smartphone – No underage child should use these apps. Apart from being a great invention, smartphones are also taken as a most apt tool for killing time. Kids between the age of 11-19 spend 90 percent of their times on their cell […] This is a post from HackRead.com Read the original post: 9 risky apps that you ne...

New cryptomining botnet malware hits Android devices

By Uzair Amir The new malware exploits Android Debug Bridge (ADB) ports. In a research conducted by the Tokyo-based cybersecurity and threat defense firm Trend Micro, it was revealed that there is a new cryptomining malware bot that’s particularly targeting Android devices. The miner exploits the Android Debug Bridge port system of the device that performs the function […] This is a post from Hac...

Hackers using pirated software to spread new cryptomining Mac malware

By Waqas If you download pirated content from torrent platforms, you can be a victim of this Mac malware. There is a new variant of cryptomining malware that is specifically targeting Apple’s Mac devices and those users who prefer downloading pirated software from torrent platforms. Dubbed Bird Miner by researchers; this cryptocurrency mining malware is actually a […] This is a post from HackRead...

Hackers exploit Raspberry Pi device to hack NASA’s mission system

By Waqas According to the report, the hack took place back in 2018 after an unauthorized Raspberry Pi device connected to NASA’s JPL servers was targeted by hackers Note: The headline of this article has been changed. The previous one stated that hackers used a Raspberry Pi device to hack into NASA’s system which was not correct. […] This is a post from HackRead.com Read the original post: Hacker...

New Android malware bypass 2FA & steal one-time passwords

By Uzair Amir These apps were designed to pass as BtcTurk, a Turkish cryptocurrency exchange. Researcher Lukas Stefanko at the Slovakian security firm ESET has discovered Android malware in new apps that can bypass the SMS-based two-factor authentication (2FA) without using SMS permissions. The malicious apps are available on the very reliable platform Google Play Store. Don’t buy […] This is a p...

Cellebrite claims its new tool unlocks almost any iOS or Android device

By Waqas Cellebrite is the same company which helped the FBI to unlock iPhone device of San Bernardino shooter. Renowned Law Enforcement contractor, the Israel-based forensics firm Cellebrite has claimed that they have developed a perfect tool to hack almost every high-end Android and iOS device, which is definitely good news for law enforcement agencies. In a […] This is a post from HackRead.com...

How I Discovered My First Vulnerability

By David Balaban I have read a couple of books recently about different vulnerabilities in order to be able to better protect my projects/websites. Today, I want to share a story about how I managed to use this knowledge in practice. Disclaimer This material is posted for educational purposes only. The author is not responsible for its usage […] This is a post from HackRead.com Read the original ...

Actress Bella Thorne posts her nudes to tackle threats from hackers

By Uzair Amir Bella Throne will not be bullied by cybercriminals. Stealing private photographs of celebrities and threatening to post them online unless they give in to the demands of the hacker has become a common norm among cybercriminals for making quick bucks. But, not all the celebs could be intimidated and Bella Thorne is one of them. […] This is a post from HackRead.com Read the original p...

Alex Jones claims malware planted child porn on InfoWars servers

By Waqas Alex Jones is now offering $1 million to catch attacker who behind the malware attack. Alex Jones, the founder of InfoWars, and his lawyer Norm Pattis claimed on Friday that someone sent malware on InfoWars servers and which ended up planting child pornography content on the servers. To catch and convict the real culprit, Jones […] This is a post from HackRead.com Read the original post:...