Hi,
I know that Windows 7 support has ended back in January this year. I saw a comment that said if you keep using it still you will get hacked.
How true is that comment?
How will I get hacked if I don't go to malicious websites and use NOD32?
Also, can my PC get hacked just by being on idle...
Cloud service, VoIP and remote management software provider Citrix has reportedly been hit by an Irianian-linked hacker group. A little less than week ago, Citrix posted a notice on their website saying the FBI believed "international cyber criminals gained access to the internal Citrix...
Security researchers from Pen Test Partners claim they've found serious security vulnerabilities in high end car alarm services from Viper and Pandora. In a quick demonstration, the researchers showed an potential attacker could pull up behind a moving vehicle with one of the commercial security...
A developer and hacker who goes by "Ben" on Twitter has allegedly shoehorned Windows 10 for ARM into an Nintendo Switch. This is reportedly the same hacker who helped get Windows 10 running on the Lumia 950 and the Raspberry Pi 3, but the Switch doesn't appear to be quite as functional as those...
Apple's Developer Enterprise Program has gotten quite a bit of scrutiny after both Facebook and Google seemingly violated the program's guidelines. Now, Reuters reports that "software pirates" are abusing the program to distribute modified versions of apps that enable users to "stream music...
IEEE Spectrum reports that engineers from Carnegie Mellon University won a DARPA challenge to develop a machine that finds, and fixes, software exploits in bytecode all by itself. "Mayhem," as they call it, reportedly found over 14,000 unique vulnerabilities within the entire Debian Linux...
Chinese hackers Zhu Hua and Zhang Shilong have been indicted by the U.S. Department of Justice as part of a Chinese state-sponsored hacking group called "Advanced Persistent Threat" or "APT 10." They are accused of hacking into scores of technology companies, the military, U.S. Department of...
The Wall Street Journal is reporting that the U.S. Navy and Air Force are the focus of new cyberattacks as the hackers search the computer systems of contractors to find classified advanced military technology. A Chinese hacking group known as Temp.Periscope or Leviathan is using email phishing...
Over a period of 5 years, Chinese intelligence officers Zha Rong and Chai Meng, along with other co-conspirators sought to involve co-opted company insiders to hack and steal sensitive commercial aviation and technological data from firms in the United States and abroad. The intelligence...
The Librarian of Congress and US Copyright Office has proposed adding new rules that would make hacking DRM legal if done to repair devices purchased legally. Devices such as smartphones, tractors, cars, computers, and more can have their firmware hacked to facilitate repairs to the devices...
By now most of us have heard about the Dark Web and know you can buy all sorts of illegal stuff there. However, I bet you didn't know how little you have to spend to be a scammer. It's unbelievable how low the prices are for hacking tools. Prices range from less than 2GBP to more than 38,000GBP...
A few months ago, a Reddit user by the name of crankyrecursion noticed that the A320 addon from FlightSimLabs contained a file called "test.exe." This file turned out to be used to extract a users passwords from Google Chrome if a pirated key was used, and send your passwords back to...
Researchers from Chinese Cyber Security Firm 360 Netlab have discovered that over $20 million dollars worth of Ethereum has been stolen from users with misconfigured Ethereum applications since March of this year. Just to add a little flavor to the conversation, there were only 3.96 Etherium on...
Reuters is reporting that a relatively small South Korean cryptocurrency exchange has been hacked to the tune of about $37M worth of virtual currency. This has sent Bitcoin to a two month low price.
In a statement on its website on Monday, Coinrail said its system was hit by “cyber intrusion”...
The DOJ has charged nine Iranian citizens with the hacking of hundreds of universities, companies, and others. They stole research, proprietary data and intellectual property. The hacking was done under the auspices of the Mabna Institute in Tehran on behalf of the Islamic Revolutionary Guard...
We reported earlier this month that hacker group fail0verflow had gotten Linux to run on the Nintendo Switch due to a flaw in the boot ROM of the Nvidia Tegra X1 SOC. Now fail0verflow has upped the ante by posting a video on Twitter of a fully working Linux GUI on the switch. Slashgear is...
Hacker group fail0verflow has gotten Linux to run on the Nintendo Switch. According to a report on TechCruch, fail0verflow says there is a flaw in the boot ROM of Nvidia's Tegra X1 SoC. When the console boots, it excecutes code in the ROM with instructions about the boot process. The boot ROM is...
It's not a new thing for hackers to abuse stolen digital code-signing certificates, but the scope and scale of it appears to be much more wide spread than security researchers thought. The University of Maryland found 72 compromised certificates after analyzing field data collected by Symantec...
Eddie Tipton, who was suspected of hacking the Iowa offices of the Multi-State Lottery Association was sentenced to 25 years in prison today. Red flags were first raised in 2010 when Tipton tried to collect a 16.5 million Hot Lotto ticket. In addition to Iowa, Tipton admitted to fixing games in...
In a press release from the US Department of Justice, a Russian citizen Maxim Senakh was sentenced to 46 months in prison for conspiracy to commit wire fraud and to violate the Computer Fraud and Abuse Act. Senakh was using malware to infect tens of thousands of servers in order to generate...
Wikileaks released new documents today from the "Dumbo" project of the CIA. This tool is run of a USB stick, and allows identifying, controlling and manipulating monitoring systems on a target computer running Windows. The tool identifies microphones and webcams, that are either locally...
Google has created a machine learning platform called the Cloud Vision API that can categorize images looking at them. It also can pick out faces in a crowd and identify them, identify inappropriate content, determine that a house on lakefront property is different than a lake ecosystem...
Tech dirt has the, well, the dirt, on some very early stage legislation working its way through congress. It would give victims of hacking legal protection to hack their attackers back.
When I first read this article, I got a bad vibe from it, as it sounded like vigilante justice, but...
Apparently CIA's archive of tools used to compromise targeted systems was recently circulated in an unauthorized manner among former CIA contractors and hackers, one or more of which provided the information to Wikileaks. This leak outlines how CIA has been able to compromise platforms like...