Chinese Hackers Rampant on Social Media

For many years the Tibet region of the Republic of China has been experiencing conflict. The threat continues online, where Chinese State-sponsored hackers target groups viewed as a threat to the nation; usually pro-democracy movements. The Tibetan community’s exclusive social networking site, unitib.com, is the most recent alleged ally of the Free Tibet movement to be targeted by Chinese hackers. …

TOR Announces Bug Bounty Program

In a somewhat revolutionary step, the non-profit organization responsible for TOR has announced what they call the ‘Bug Bounty Program.’ As the largest, most popular tool designed to grant anonymity online; it comes as no surprise that cyber security is a huge part of the functioning of the TOR network. The Bug Bounty Program, in a nutshell, is an incentive …

Backspace: Linux Hacking Made Easy

A potentially disturbing bug has surfaced within certain Linux operating systems, which allows anyone full access to your password protected machine with very little effort. Discovered by a team of two security research professionals from the University of Valencia, the ‘hack’ involves simply pressing the backspace button 28 times during grub username authentication.  This bizarre bug is found in Grub2 …

MacKeeper Antivirus Hacked

Recently Internet users were treated to some disturbing online posts that covered the disastrous hacking of MacKeeper Antivirus – exposing 21 GB of data and 13 million users’ personal information. The extent of the potential damage caused by the exposure is almost unlimited, with password hashes, phone numbers, IP addresses among the leaked information. MacKeeper Antivirus is marketed as software that …

Attack on the Internet DNS

During the early stages of last week, two separate attacks were carried out against the Internet’s DNS Root Servers, by the same person. The first of these Distributed Denial of Service (DDoS) attacks occurred on the last day of November and lasted 160 minutes while the next day, the second attack lasted almost an hour. There are 13 of these …

Remote Access to Samsung Galaxy

In an article posted on The Hacker News, readers are made aware of the fact that remote access to Samsung Galaxy phones is highly achievable for the smarter hackers out there. Samsung Galaxy users who own a S6, S6 Edge or Note 4 are particularly susceptible to malicious attack. It turns out that there is a fatal flaw in Samsung’s baseband chip, …

Update on the JP Morgan Hack

According to a post on The Hacker News, the United States government has charged three cyber criminals with what has become known as the largest hacking case in financial history. Three hackers have been accused of malicious attacks on several financial institutions, the biggest of which is JP Morgan. The JP Morgan hack has officially been dubbed “the largest theft of …