Tag Archives: Hack
Researchers from the Georgia Tech Information Security Center (GTISC) have discovered two security weaknesses that permit installation of malware onto Apple mobile devices using seemingly innocuous applications and peripherals, uncovering significant security threats to the iOS platform.
White House sources partly confirmed an alarming report that U.S. government computers — reportedly including systems used by the military for nuclear commands — were breached by Chinese hackers.
Frustrated by their inability to stop sophisticated hacking attacks or use the law to punish their assailants, an increasing number of U.S. companies are taking retaliatory action.
Using an inexpensive phone and open source software, the researchers were able to track the location of cell phone users without their knowledge on the Global System for Mobile Communications (GSM) network, the predominant worldwide network.
Zappos.com an online clothing and shoe retailer owned by Amazon.com warned it’s users of a Massive Data Breach exposing details for 24 million of it’s customers.
A war of words and website hacks appears to be underway between Israeli and Saudi hackers.
The hacking group “AntiSec” part of the larger group Anonymous has released even more information on officials and former officials that subscribe to Strafor. Stratfor provides clients information on national and international affairs.
New zero-day Yahoo Messenger exploit allows malware to spread via hijacked status updates | Naked Security. Wow, what can you expect from a company that is nearly broke and only hanging on to existence by the skin of it’s teeth. … Continue reading
Android glitch allows hackers to bug phone calls | The Register. Othersources: UPI, NetworkWorld, TGDaily In what appears to be the 2nd big security GAFF of the week for the Android phone and OS.
Mitsubishi hack may have compromised nuclear, military data | TG Daily. 10.25.2011 Update More details are now emerging on this HACK as it appears the hackers may have gained access to some very sensitive data. Other Sources: Sophos
Recent Facebook Media Posts
Malware communicates at a distance of 65 feet using built-in mics and speakers. http://wp.me/p3wmuX-1eY
Army Scores a Super-Stealthy Drone That Looks Like a Bird http://wp.me/p3wmuX-1eI
Google brings automatic voice search to computers running Chrome http://wp.me/p3wmuX-1eG
Bridgestone’s Airless tires nearly ready for your Car. http://wp.me/p3wmuX-1eB