213 Topics
| |
In my [DaniWeb report](http://www.daniweb.com/hardware-and-software/tablets-and-mobile-devices/news/462936/apple-iphone-5s-the-worlds-first-64-bit-smartphone) on the launch of the new iPhone 5s from Apple, I stated that you could "forget the fingerprint scanner built into the new circular home button" but I knew all along that was never going to be the case. In context, I was focusing upon what … | |
Last week, the NoSQL database host MongoHQ suffered a breach which exposed customer files, email addresses and password data to the attackers. The ripples from that breach are still being felt, as users of the Sunrise calendar app on the iPhone found out this morning. Luckily that password data was … | |
While the News International [phone hacking scandal](http://www.guardian.co.uk/media/phone-hacking) that saw the demise of the News of the World newspaper cannot have escaped your attention in the US or UK, news from India concerning the latest 'tumble and clone' developments could leave the mobile phone calls of more than just celebrities at … | |
How can I prevent a XSS attack but allow user to post iframe and img? My page is php based but I allow users to submit text and have allowed only iframes and imgs with strip_tag How do I prevent a user from launching an xss attack? | |
UK home shopping pioneers Lakeland have sent an email to all customers past and present to warn them that the retailers website has been hacked. What Managing Director Sam Rayner calls a "sophisticated and sustained attack" took place late on Friday 19th July. Measures were taken at the time to … | |
Within days of the New York Times website suffering an outage which was widely reported as being down to another cyber attack, although the NYT itself insists it was actually an internal issue following system maintenance, media sites belonging to CNN, Time and the Washington Post have been attacked by … | |
Security researchers at ESET [have revealed](http://www.welivesecurity.com/2013/05/16/targeted-threat-pakistan-india/) that a prolonged and highly targeted data stealing attack aimed at Pakistan, using fake PDF documents, appears to have originated in India. Using a code signing certificate (issued to what looks like a legitimate company 'Technical and Commercial Consulting Pvt. Ltd') to sign malicious … | |
Back in December 2011, reports were circulating regarding a data breach at one of the big Chinese social networking sites, Tianya.cn that suggested the login credentials of some 40 million users were potentially exposed. Clear text usernames and password combinations were stolen by hackers during the breach, although a Tianya … | |
New research by [Varonis](http://www.varonis.com/) has revealed that only 25% of those companies questioned were able to answer yes to the question: "Are you able to detect when files containing sensitive data are uploaded to a third party cloud service?" Which left a staggering three-quarters of businesses in the dark about … | |
Konami, the Japanese games developer responsible for such genre defining classics as Metal Gear Solid and Silent Hill, has confirmed that tens of thousands of customer accounts have been put at risk due to a breach of the Konami ID portal site. During a period between the 13th June and … | |
is it posssible to hack into any network using only the knowledge of html and css??? | |
Although the Opera web browser client is no longer the big 'little player' that it used to be having long since been eclipsed by the likes of Chrome and Firefox in the Internet Explorer alternatives stakes, it can still claim more than 300 million users and a place as world’s … | |
The news that, following a number of pretty high-profile password compromise cases, Twitter is adopting a two-factor authentication for account access is to be welcomed. 2FA, as it is known, applies the better security concept of something you know combined with something you own into the access equation. The thing … | |
Hello everyone! Webdesign isn't my thing but i know enough to help maintain a website for a church, it is a small scale and all i do is post events and upload pictures. a few days ago the site's ftp account got hacked and all the files been modified. i … | |
Hello, I am curious about how to root an Android phone without using any one click methods. A Google search returns only how to use programs to do this for you. Obviously there is a security vulnerability that is exploited, but I'd like to know in detail how this is … | |
It has been just over a month now since North Korea gloated about its successful nuclear weapon test. A test which prompted the imposition of new UN sanctions against Pyongyang, and if the Korean Central News Agency (KCNA) which acts as a state mouthpiece for the Democratic People's Republic of … | |
Does any one know of a registry hack whereby one could add a 'move/copy to folder...' to the right click menu when in Windows Photoviewer? It is insanely useful in Windows Explorer and this would save me time and headaches :) Using 7 Ultimate. Also, I miss all the extras … | |
Apple hacking PWN2OWN supremo and security researcher Charlie Miller is preparing to reveal just how to hack an Apple MacBook battery. Yep, you read that right: Apple battery hacking could be coming to a MacBook near you soon. Well, near you if you happen to be in Las Vegas for … | |
A recent survey, conducted by IT risk management specialists nCircle, suggests that as many as 50% of IT security professionals think that the organisations they work for are a potential target for state-sponsored hackers. A number that Tim Keanini, nCircle Chief Research officer, thinks is rather on the low side … | |
It's never easy calculating the true cost of inadequate security to business, not least as there are so many variables and such reticence when it comes to full disclosure for fear of brand damage. However, the latest [Information Security Breaches Survey](http://www.pwc.co.uk/audit-assurance/publications/uk-information-security-breaches-survey-results-2012.jhtml) (ISBS) from PwC/Infosecurity Europe has had a good bash … | |
[ATTACH=RIGHT]16244[/ATTACH]Ron Bowes has been accused of hacking Facebook. But when he put the information for over a 100 million [URL="http://www.facebook.com"]Facebook[/URL] users into a 2.8 GB torrent stream on his website Skullsecurity.org, he didn't need to hack anything to get it - it was already publicly available on Facebook. All he … | |
New research shows that hackers are becoming increasingly lazy in their search for online exploits, with 98% of Remote File Inclusion and 88% of SQL injection attacks now being fully automated. It comes as no surprise whatsoever to DaniWeb administrators and moderators that your average cybercriminal is looking for the … | |
| My computer has been severely hacked. Well 2 laptops actually. And it looks like my router also. Problems noted here: 1. Email accounts routinely hacked even after changing passwords and using keypass in the securist way. Suspected keyloggin occuring somewhere in the stream. 2. Something causing my typing to be … |
hello guys, unfortunly my website got hacked few hours ago, and after investigations I found the was a c99.php file on my server so i deleted it and stopped any upload proccess and change back my chmod to default I want to ask how to prevent php files from being … | |
Apple, Facebook and Twitter have all been the target of hackers recently, and now Evernote has admitted to a potential breach that has forced it to reset the passwords of approximately 50 million registered users. Evernote, a kind of web scrapbook that enables you to take notes, save web pages … | |
My site has just been hacked and I suspect that it was a remote file inclusion attack. These are my server specs: Windows Server 2008 R2 running ColdFusion 9 (9.0.1.274733) and IIS 7.5 This is the source code of the page that appeared after my site was hacked: <!-- # … | |
I'm trying to find a solution to protect all the software developed in the company I work in. Till now we've been working with hardlocks, but we are trying to cut on expences and wanting to develop our own software protection system. I know that there some free tools, like … | |
Earlier this year Jonathan Evans, the Director General of MI5 (the UK Security Service), warned that cyber attacks against UK plc were as much of a security challenge as terrorism as far as Britain was concerned. He claimed that UK businesses were being targeted at an 'astonishing' rate driven by … | |
Gary McKinnon, an unassuming 46 year old Londoner who suffers from Asperger's syndrome and depression, is an unlikely man to be making headlines the world over once again. Indeed, across the last decade McKinnon has almost seemed to be a permanent fixture in news media feeds online and off, a … | |
What is your Favourite Hack/Programming movie ? |
The End.