Tagged With exploits

0

The Sony hack was the worst corporate cyberattack ever, and now anyone with $US30,000 in Bitcoin and the ability to use Tor can buy the type of exploit used to hack Sony on underground cyberweapon websites, according to ex-hacker Jon Miller.

7

You probably don't know Nir Goldshlager, but he sure could have known you until recently. That's because Nir discovered a major privacy flaw in Facebook's OAuth, the system developers use to access all sorts of information every time you hit that little "allow" button. Nir gained access to virtually anyone's entire Facebook account.

23

Got a Samsung Galaxy SIII? Maybe a Galaxy Note II? Well listen up because there's a new boogeyman on the loose. According to a thread at XDA Developers, there's an exploit out there that can let Android malware apps get at all your physical memory, for the purposes of stealing your data or deleting it or whathaveyou.

3

Don't panic. You might have trouble finding GIFs to describe your feelings for a little bit, because there's a exploit spreading on Tumblr that's effectively shutting down your favourite sites. And, if you so much as click on the wrong post, shutting down your own.