Uber released a statement on Friday announcing that it suffered a data breach in 2014 that affected 50 000 Uber drivers across the United States. The Uber’s database was accessed by an unauthorized third party. Uber says that 50 000 driver partner names and driver’s license numbers
Two days ago I posted an article about a Facebook vulnerability that allows deleting any photo. The person who discovered the vulnerability said on it’s personal blog that Facebook payed him $12500 for reporting this vulnerability. If you want to read about the vulnerability that Laxman Muthiyah
This vulnerability allowed (it was fixed recently) malicious users to delete any photo album available on Facebook. This exploit of the Facebook Graph API allowed hackers to delete any photo album owned by a user or a page or group from Facebook. The main utility of the
A few months ago was discovered a worrying vulnerability of standard USB which does not seem to be repaired, called BadUSB. Until now such information was only theoretical and no one has developed a software which can uses this security hole, but a well-known hacker Samy Kamkar has
A critical vulnerability has been found in glibc, the GNU C library, that affects almost all Linux systems dating back to 2000. Attackers can use this flaw to execute code and remotely gain control of Linux machines. The Red Hat Product Security has been made aware of
Approximately 60% of leaders in security believe that hackers have exceeded cybersecurity capabilities within their organization, said in a study conducted by IBM. Over 80% of security leaders believe that the challenges of external threats is increasing, while 60% agree that oraganizatiile are exceeded in this cyber war,
Cyber threats have an enviable diversity and a proof of ingenuity of hackers is ransomware, a malware which encrypts your data in the “hard drive” and you can not regain access unless you pay an amount of money as a reward. Few threats act in a way so
The myth which says that Apple’s operating system, OS X is more protected against hacker attacks than other operating systems was once again dismissed. A critical vulnerability that could affect Mac users proved so dangerous that led the Cupertino company to publish for the first time in
Dangerous malware such as Uroburos, spyware on Android smartphones and a growing number of cases involving malware attacks on mobile devices – 2014 was marked by cyber espionage, hacker attacks and cyber campaigns. Number of 3.5 million new strains of malware has been exceeded for the first
US investigators have established that cyber attack on Sony Pictures was conducted by North Korea, according to official sources in Washington, film studio was forced to cancel the launch of the film “The Interview”, a decision widely criticized by Hollywood on Tuesday. A group of computer pirates who showed