Hacking produced by chain | Wed, 08/09/17 @ 03:27 am | 0 replies
I'm a bloody idiot, says programmer after failing to turn on two-factor authentication<br /> <br /> <br /> The chap behind Chrome Web Developer, a popular third-party extension that was briefly hijacked to inject ads into browsers, today confirmed he was the victim of a phishing attack.<br /> <br /> Chris Pederick, a Brit living abroad in San Francisco, California,...
Hacking produced by chain | Mon, 03/14/16 @ 12:47 am | 0 replies
<br /> Google on Thursday announced that it was expanding its Project Shieldprogram, offering to protect news and human rights websites from distributed denial of service attacks for free.<br /> Project Shield uses Google's security infrastructure to detect and filter DDoS attacks, which flood websites with Internet traffic or service requests in order to impair their functioning or...
Hacking produced by chain | Wed, 01/07/15 @ 10:54 pm | 0 replies
A new critical security vulnerability in the BASH shell, the command-line shell used in many Unix and Linux operating systems, leaves a large number of systems at security risk. The bug also affects Mac OS X. CVE Number: CVE-2014-6271 Technical Details: Here is technical details of the vulnerability, posted by Florian Weimer in Seclists: "Bash supports exporting not just shell variables,...
Hacking produced by chain | Wed, 01/07/15 @ 10:37 pm | 0 replies
George Chatzisofroniou has published a new Method for Hacking WPA/WPA2 Security using a WiFi social engineering tool designed to steal credentials from users of secure wireless networks. The administrator at the University of Greece developed the WiFiPhisher tool which is used to discover and replicate WPA-protected networks, sans password. The tool, can be downloaded from GitHub here and works...