Category Archives: Hackers News

Hackers News

Spammers using Facebook Messenger to Spread Locky Ransomware

If you came across any Facebook Message with an image file (exactly .SVG file format) send by any of your Facebook friends, just avoid clicking it.

An ongoing Facebook spam campaign is spreading malware downloader among Facebook users by taking advantage of innocent-looking SVG image file to infect computers.

If clicked, the file would eventually infect your PC with the nasty Locky Ransomware,

Dangerous Rootkit found Pre-Installed on nearly 3 Million Android Phones

Here’s some bad news for Android users again.

Nearly 3 Million Android devices worldwide are vulnerable to man-in-the-middle (MITM) attacks that could allow attackers to remotely execute arbitrary code with root privileges, turning over full control of the devices to hackers.

According to a new report from security rating firm BitSight, the issue is due to a vulnerability in the insecure

Elon Musk Plans to Launch 4,425 Satellites to provide Global Internet from Space

Big tech companies, including Facebook, Google, and Microsoft, are in the race of bringing Internet connectivity to unconnected parts of the world through wireless devices, flying drones, high-altitude balloons, and laser beams.

But, SpaceX founder Elon Musk has big plans for bringing low-cost Internet service worldwide, and it all starts in space.
<!– adsense –>
Private rocket launch

3 Mobile UK Hacked – 6 Million Customers' Private Data at risk

Three, one of UK’s biggest mobile operators, has become the latest victim of a massive data breach that reportedly left the personal information and contact details of 6 Million of its customers exposed.

The company admitted the data breach late Thursday, saying that computer hackers gained access to a Three Mobile customer phone upgrade database containing the account details of nearly 6

New Hack: How to Bypass iPhone Passcode to Access Photos and Messages

Setting a passcode on your iPhone is the first line of defense to help prevent other people from accessing your personal details.

However, it’s pretty much easy for anyone with access to your iPhone to bypass the passcode protection (doesn’t matter if you configured Touch ID or not) and access your personal photos and messages.

A new critical security flaw discovered in iOS 8 and newer,

Microsoft Joins The Linux Foundation — Turns Love Affair Into a Relationship

You won’t believe your eyes while reading this, but this is true. Microsoft just joined the Linux Foundation as a high-paying Platinum member.

Microsoft’s love with open source community is embracing as time passes. At its first Connect event in 2013, the company launched Visual Studio 2013. A year later, Microsoft open sourced .NET, and last year, it open sourced the Visual Studio Code

This $5 Device Can Hack your Password-Protected Computers in Just One Minute

You need to be more careful next time while leaving your computer unattended at your office, as it cost hackers just $5 and only 30 seconds to hack into any computer.

Well-known hardware hacker Samy Kamkar has once again devised a cheap exploit tool, this time that takes just 30 seconds to install a privacy-invading backdoor into your computer, even if it is locked with a strong password.

This Hack Gives Linux Root Shell Just By Pressing 'ENTER' for 70 Seconds

A hacker with little more than a minute can bypass the authentication procedures on some Linux systems just by holding down the Enter key for around 70 seconds.

The result? The act grants the hacker a shell with root privileges, which allows them to gain complete remote control over encrypted Linux machine.

The security issue relies due to a vulnerability (CVE-2016-4484) in the

Pre-installed Backdoor On 700 Million Android Phones Sending Users' Data To China

Do you own an Android smartphone? You could be one of those 700 Million users whose phone is secretly sending text messages to China every 72 hours.

You heard that right. Over 700 Million Android smartphones contain a secret ‘backdoor’ that surreptitiously sends all your text messages, call log, contact list, location history, and app data to China every 72 hours.

Security researchers from