Hackers

Sorry, Readers. Your Bluetooth Device Is A Security Risk

Security researchers say to turn Bluetooth off when you're not using it because it's an easy way for hackers to get to your personal information.       
Related topics: Bluetooth, Computer Security

Read More →

A Cheap And Cheerful Geiger Counter Build

Hackers often have broad interests across the sciences, of which nuclear topics are no exception. The Geiger counter remains a popular build, and could be a handy tool to have in a time of rising tensions between nuclear powers. [Leonora Tindall]...
Related topics: Computer Security

Read More →

Cryptojacking Malware Found In 11 Rubygem Language Repositories

Malware designed to surreptitiously infect victims’ computer systems and mine cryptocurrency on behalf of hackers has been found in 11 code libraries on programming language manager RubyGems. Hackers exploited RubyGems – a package manager for...
Related topics: Malware, Computer Security

Read More →

Daily Deal: How To Hack From Beginner To Ethical Hacking Bundle

The How to Hack from Beginner to Ethical Hacking Bundle has 8 courses designed to teach you the skills you need to become an ethical hacker. you’ll learn how to diagnose different kinds of cybersecurity attacks and how to defeat them. You'll...
Related topics: Computer Security

Read More →

These 4 Gmail Alternatives Put Your Privacy First

If you don’t want your email provider, its partners, or even hackers skimming your messages, choose one of these providers, which offer end-to-end encryption and other measures. Since its debut in 2004, Gmail has had the most popular email...
Related topics: Gmail, Computer Security

Read More →

No Rest For The Wicked: Ruby Gem Hacked To Siphon Passwords, Secrets From Web Devs

Developer account cracked due to credential reuse, source tampered with and released to hundreds of programmers An old version of a Ruby software package called rest-client that was modified and released about a week ago has been removed from the...

Read More →

Game On With These Open Source Arduino Buzzers

Planning a game of Hacker Jeopardy at your next meetup? You’re going to want some proper buzzers to complete the experience, but why buy when you can build? [Flute Systems] has released an open source DIY game buzzer system based on the...
Related topics: Open Source Software, Computer Security

Read More →

This Vpn Blocks Malware Using A Database Of 3.5 Million Known Threats

When you work online, security is pretty important. The last thing you want is client information or financial data to be stolen by a hacker on a coffee shop Wi-Fi network. For this reason, using a VPN is a wise move for any desk worker. The...
Related topics: Malware, Databases, Computer Security

Read More →

Airdrop Is Making Your Iphone Vulnerable To Hackers

Whether you’re checking text messages on your smartwatch or sharing selfies with a friend at a concert, it’s becoming easier and easier to send files ... Read more
Related topics: Iphone, Mobile Technology, Computer Security, Smartwatch, Selfies

Read More →

The Secret Way China Built Stealth Fighters (thanks To F-35 'dna')

Task and Purpose Technology, Asia Stolen...DNA. In 2007, Lockheed Martin dealt with something of a cyber Ocean’s 11 when Chinese hackers stole technical documents related to the development of the F-35.  On August 1st of last year, China...
Related topics: DNA, Genetics, Lockheed Martin

Read More →

Ios 12.4 Makes It Possible To Jailbreak Your Iphone Again

Apple’s most recent iOS update — 12.4 — has reopened a vulnerability that was previously patched, making  it easy to jailbreak iPhones and iPads. As reported by Motherboard, hacker Pwn20wnd exploited the flaw to release a public version of...
Related topics: Ios, IOS Jailbreaking, Iphone, Mobile Technology, Apple, Computer Security, Tablets

Read More →

Manage Your Security, Collaboration, And Business Goals With This $80 Bundle

There are countless threats looming all over the web, from hackers vying for your personal info to viruses that threaten your devices. Unfortunately, most people don’t give their security a second thought, making them, their colleagues, and...
Related topics: Computer Security

Read More →

Hackers Make Jailbreaking Iphones A Thing Again

In the iPhone's early days, hackers would "jailbreak" the iPhone in order to install third-party apps that weren't available through the App Store. It's been a while since anyone seriously needed to jailbreak their iPhone,...
Related topics: Computer Security, IOS Jailbreaking, Mobile Technology, Iphone

Read More →

Apple Accidentally Unpatches Vulnerability, Leading To New Ios 12.4 Jailbreak

Apple in iOS 12.4 mistakenly unpatched a vulnerability that was fixed in the iOS 12.3 update, leading to a new jailbreak available for iOS 12.4 devices, reports Motherboard. Hackers discovered the vulnerability over the weekend and Pwn20wnd...
Related topics: Apple, Computer Security, Ios, IOS Jailbreaking

Read More →

Teen Talktalk Hacker Ordered To Pay £400k After Hijacking Popular Instagram Account

Sanitised browser history sparked another investigation One of the crew who hacked TalkTalk has been ordered to hand over £400,000 after seizing control of a high-profile Instagram account following a hack on Aussie telco Telstra.…
Related topics: Instagram

Read More →

Pure Cringe: Uk Isp Has The Worst Excuse For Storing Passwords In Plaintext Ever

Virgin Media is one of the UK’s largest ISPs. Freaky Clown is one of the UK’s most respected and experienced ethical hackers. One of these knows a lot about information security. The other is Virgin Media. But wait, I’m getting ahead of...
Related topics: Computer Security

Read More →

An All-in-one Conference Video Streaming Box

When running a hacker camp or other event, one of the many challenges faced by the organisers concerns the production and distribution of event videos. As the talks are recorded they must be put online, and with a load of talks to be processed it...
Related topics: Tech Videos, Computer Security

Read More →

New Attack Exploiting Serious Bluetooth Weakness Can Intercept Sensitive Data

Enlarge Researchers have demonstrated a serious weakness in the Bluetooth wireless standard that could allow hackers to intercept keystrokes, address books, and other sensitive data sent from billions of devices. Dubbed Key Negotiation of...
Related topics: Bluetooth, Computer Security

Read More →

Facebook's Voice Transcripts Were More Invasive Than Amazon's

The Capital One hacker, a Bluetooth vulnerability, and more of the week's top security news.
Related topics: Facebook, Social Media, Amazon, Computer Security, Bluetooth

Read More →

Cruising Github For Slack Webhook Tokens

GitHub is an incredibly powerful tool for sharing source code, and its value to the modern hacker can’t be overstated. But there’s at least one downside to effortlessly sharing your source: it’s now much easier for the whole world...
Related topics: Github, Computer Security

Read More →
What is noozilla?
Noozilla is an independent news aggregation service with a categorization engine that categorizes millions of news stories by subject.