Tag : exploit

Latest Posts

0 SHARES

Bug Found in The Division That Lets Players do Unlimited Damage

Tom Clancy’s The Division has enjoyed enormous popularity since its release, despite the almost constant existence of issues that have plagued players. Now, a new exploit has been found in the shooter that effectively breaks the…

0 SHARES

FBI Doesn’t Want To Tell How It Tracked People Across The Tor Network

The FBI are known for their digital prowess, although they may require some help when it comes to breaking into an iPhone. One of their most recent successes was the tracking of people using the Tor…

0 SHARES

Stagefright Vulnerability Now a Serious Threat to Android Devices

  The Stagefright vulnerability in Android is nothing new, however for a long time it was (mostly) harmless due to difficulties in reliably using the flaw for malicious purposes Unfortunately for Google and Android users, researchers…

0 SHARES

Two Year Old Java Vulnerability Reappeared Thanks to Broken Patch

Back in 2013, Oracle released a patch for a critical security flaw in Java. Now it has been found that this patch was ineffectual and easily bypassed, once again making PCs and servers running even the latest…

0 SHARES

ASUS Agrees to Regular Security Audits

ASUS are a well-known brand for technology, creating everything from laptops to gaming mice. One thing people may not realise is that ASUS are also a maker of wireless technology, something that has unfortunately gotten them into trouble…

TMZ

0 SHARES

TMZ Falls Victim to Malvertising Campaign

Malicious online activity in the form of hacks, malware and viruses have seen an exponential increase over the past 5 years, the rise in the number of consumers online coupled with a lax understanding concerning the dangers…

0 SHARES

Fully Patched Adobe Flash Hit by New Zero-Day Update

Just as day follows night, and just as UbiSoft thinks up new and amazing game elements to strip away and charge microtransactions for, another zero-day exploit has been discovered for Adobe Flash. But this isn’t any…

0 SHARES

WinRAR at Risk of Huge New Zero Day Vulnerability

WinRAR has a base of some 500 million users worldwide, those same users might want to take a look at a new Zero Day Vulnerability which has been detected within the newest version of the software. According…

0 SHARES

Android Lollipop Lock Screen Can be Bypassed Using Really Long Password

Any Android Lollipop device that is not using the latest build of the mobile operating system is vulnerable to having its lock screen bypassed by inputting a long string of characters as password. The bypass was…

0 SHARES

Nintendo 3DS YouTube App Exploit to Disable Region Locking

Nintendo has been heavily criticized for region locking the Wii U and 3DS compared to Microsoft and Sony who adopt a region-free policy. Even more absurd, the 3DS’ predecessor played titles from all regions without any…

0 SHARES

Intel Processors Vulnerable to Rootkit Exploit Since 1997

A researcher from the Battelle Memorial Institute has revealed that every Intel x86-based processor – and possibly some AMD processors – since 1997 are vulnerable to a rootkit exploit that could grant hackers access to the…

0 SHARES

US Wont Regulate Hacking Software – For Now

We all know about hackers. They’ve been in the news a lot in the last few years, from the Xbox and Sony Christmas Day hacks to the large databases of customer details being hacked on a…

0 SHARES

95% of Android Devices Vulnerable to Dangerous Exploit

Researchers from cybersecurity firm Zimperium have discovered a vulnerability within Android that allows hackers to access and control a device remotely, with 95% of smartphones and tablets running the operating system (between versions 2.2 and 5.1)…

0 SHARES

Four New Bugs Have Been Found in Internet Explorer

I know most of you don’t even use Internet Explorer and we all know how it was humiliated throughout the years. However, since the new Microsoft Edge might be using some IE code, it’s worth pointing…

0 SHARES

Hacking Team Release Ludicrous Statement

This story is so preposterous that I am going to play a little game called; “who are the hypocrites here.” Hacking Team, who recently fell to a cyber attack have released a statement claiming to be…

0 SHARES

See How Hackers Can Take Control of Your Chrysler Vehicles

I know that there have been a lot of movies where hackers can take control of vehicles and crash them, but can it really be done in real life? Well, a pair of hackers have just…

0 SHARES

Security Giant Kaspersky Lab Just Got Hacked

One of the best security experts in the field, the guys over at Kaspersky Lab, got hacked this Wednesday. They say that the method employed was so complex and stealthy that they believe the hackers originate…

0 SHARES

Cheater Faces In-Game Death Penalty

Guild Wars 2 is a popular massively multiplayer online role-playing game (MMORPG) which is sold over 3 Million copies worldwide. It’s also one of the places where usage of exploits is not tolerated. DarkSide, in-game character faced…

0 SHARES

Researchers Find iOS Flaw That Can Crash Any Device in Range

Researchers from the security firm Skycure have found a new flaw in the IOS system that effectively allows you to put any iOS 8 device in range into a never-ending boot cycle. The flaw was demonstrated…

0 SHARES

Simda Botnet Taken Down After Affecting 777,000 PC’s Worldwide

Sidma has been around for the past 6 months, causing pain to PC owners across the world. It infected 128,000 computers each month – a phenomenal rate for a botnet. The bot changed into a new…

Activision

0 SHARES

Activision Finally Patches Call of Duty: Advanced Warfare ‘XS1 Goliath Scorestreak’ Exploit

Activision has finally released a new update for all Call of Duty: Advanced Warfare platforms that also fixes an exploit where players could have had unlimited health using the XS1 Goliath scorestreak. Alongside the exploit, the…

0 SHARES

Battlefield 4 Final Stand Revealed to Come with an Exploit to Catch Cheaters

DICE has recently revealed that the latest DLC for Battlefield 4, Final Stand, has an exploit intentionally left in the game by the development team. The company explained that they inserted the exploit in order to…

0 SHARES

Hackers Using New Phishing Technique to Exploit Router Flaws

There have been a number of unusual hacking techniques employed in Brazil recently. A group of hackers have used a “novel approach” to pull off a pharming attack by using phishing emails, as stated by security…

0 SHARES

Jamie Oliver’s Website Hacked and Used as Malware Distributor

The website of celebrity chef Jamie Oliver, which has an average of 10 million visitors per month, has been hacked. The hackers inserted a string of code that redirects visitors to a WordPress site that uses…

0 SHARES

$12,500 for Reporting Facebook Bug That Allowed You To Delete Anyone’s Photos

Researcher Laxman Muthiya discovered that Facebook had extraordinarily simple bug that essentially gave anyone the ability to delete any photo on Facebook. Literally, any photo – this could have given someone the ability to delete every single…

0 SHARES

Yet Another Zero-Day Vulnerability Found In Adobe Flash

Adobe Flash is quickly becoming a liability. Another zero-day vulnerability (CVE-2015-0313) has been found in Adobe Flash Player, the third such problem this year. This time, Adobe itself has drawn attention to the issue, warning that…

Nintendo

0 SHARES

30-Minute Legend Of Zelda Speedrun is a New World Record

A Legend of Zelda player has beaten the game in a record-breaking 30 minutes and 29 seconds. The speedrun was completed by Darkwing_Duck_sda, just 8 seconds faster than his previous best of 30 minutes and 37…