169
28 Views

Bug bounty programs involve organizations sending out recognition and financial rewards, that are offered to those who can identify and



Bug bounty: Hack the US Air Force and Get Paid on Latest Hacking News.

152
26 Views

Russia: Everyone Using A Messaging App Must Be Identifiable

logicfish Security headline government privacy russia All https://packetstormsecurity.com   Discuss    Share
253
21 Views
If you own an eCommerce website built on WordPress and powered by WooCommerce plugin, then beware of a new vulnerability that could compromise your online store.

Simon Scannell, a researcher at RIPS Technologies GmbH, discovered an arbitrary file deletion vulnerability in the popular WooCommerce plugin that could allow a malicious or compromised privileged user to gain full control over the


193
51 Views

Hackers Breach StatCounter To Hijack Bitcoin Transactions

logicfish Security headline hacker bank cybercrime fraud All https://packetstormsecurity.com   Discuss    Share
223
36 Views

Apache Struts Vulnerability Would Allow System Takeover

logicfish Security headline flaw apache All https://packetstormsecurity.com   Discuss    Share
163
29 Views

HSBC Bank suffered data breach, Wordpress and WooCommerce flaws can expose sites to takeover and StatCounter script compromised to hijack Bitcoin transactions from major cryptocurrency exchange on episode 158 of our daily podcast.



Latest Hacking News Podcast #158 on Latest Hacking News.

236
21 Views

Alert: Track Midterm Election Day Misinformation Right Here

logicfish Security headline government usa cyberwar All https://packetstormsecurity.com   Discuss    Share
158
34 Views

Android Fans Get Fat November Security Patch Bundle

logicfish Security headline phone flaw google patch All https://packetstormsecurity.com   Discuss    Share
154
91 Views

Zico2: 1 is  a VM challenge hosted at vulnhub. You can download it at vulnhub.com and install it in virtualbox.



Zico2: 1 Vulnhub Hacking Challenge Walkthrough on Latest Hacking News.

254
49 Views

[Jada Pinkett Smith and Juliette Lewis]

By now you’ve no doubt seen various recaps of yesterday’s “Red Table Talk” episode featuring Leah Remini and Jada Pinkett Smith, including our own. As we said yesterday, Leah made the most of her appearance, and a huge new audience was exposed to Scientology’s controversies.

But for us, one [...]

199
22 Views

Microsoft Edge users now need to be extra cautious while surfing since a new exploit is coming. An exploit developer



Exploit Developer Discovers Zero-Day Microsoft Edge Vulnerability Triggering RCE Attacks on Latest Hacking News.

255
26 Views
We all have something to hide, something to protect. But if you are also relying on self-encrypting drives for that, then you should read this news carefully.

Security researchers have discovered multiple critical vulnerabilities in some of the popular self-encrypting solid state drives (SSD) that could allow an attacker to decrypt disk encryption and recover protected data without knowing the


150
47 Views

Intel CPU’s have now become the target for another side-channel vulnerability posing a security threat. The vulnerability, termed ‘PortSmash’, appears



PortSmash Side-Channel Vulnerability – Another Threat For Intel CPUs on Latest Hacking News.

243
32 Views

This Tool Shows Exposed Cameras Around Your Neighborhood

logicfish Security headline privacy flaw All https://packetstormsecurity.com   Discuss    Share
153
21 Views

Verified twitter accounts hijacked for fake Elon Musk bitcoin scam, Icecast vulnerabilities pose risk to streaming radio stations and disk encryption bypass flaws impact popular SSD drives on today's Latest Hacking News Podcast.



Latest Hacking News Podcast #157 on Latest Hacking News.

250
50 Views

  A highly-anticipated summit between Leah Remini and Jada Pinkett Smith took place on Jada’s Facebook series, “Red Table Talk,” which was released this afternoon. The 20-minute episode was billed in pre-show publicity as a way for the two women to reconcile after a public spat between them over Scientology.

Well, come on, it [...]

241
48 Views

Flaws In Self-Encrypting SSDs Let Attackers Bypass Encryption

logicfish Security headline flaw backdoor cryptography All https://packetstormsecurity.com   Discuss    Share
246
35 Views

Magecart Infiltrates U.K. Online Retailer Kitronik POS

logicfish Security headline cybercrime fraud backdoor All https://packetstormsecurity.com   Discuss    Share
201
31 Views

Supreme Court Rejects Industry Challenge Of 2015 Net Neutrality Rules

logicfish Security headline government usa fraud All https://packetstormsecurity.com   Discuss    Share
190
116 Views

Quaoar is a boot2root virtual machine that is available at Vulnhub. This box was created for the Hackfest 2016 CTF.



 Quaoar – Vulnhub Hacking Challenge Walkthrough on Latest Hacking News.

254
52 Views

[Catherine Fraser, arguing that it’s not a public road]

Like the rest of the country, voters in Riverside County, California will be going to the polls tomorrow for a highly anticipated midterm election. But besides governors and members of Congress on the ballot, there will be local elections going on. And in Riverside County, that [...]

190
18 Views

Mozilla has recently fixed multiple security flaws in its Thunderbird 60.3 email client. These vulnerabilities also include a critical security



Mozilla Patched Multiple Security Vulnerabilities in Thunderbird 60.3 on Latest Hacking News.

160
21 Views

A researcher from Semmle discovered multiple security flaws in the XNU kernel of Apple operating systems. Since all Apple operating



Apple Patched Multiple XNU Kernel Vulnerabilities In MacOS And iOS on Latest Hacking News.

191
25 Views

A new side-channel vulnerability named PortSmash discovered, Kraken V2 ransomware released as RaaS model and CIA communications reportedly compromised via Google search on episode 156 of our daily podcast.



Latest Hacking News Podcast #156 on Latest Hacking News.

254
44 Views

[The future L. Ron Hubbard Hall]

Rod Keller has a great report for us today on David Miscavige’s next precious object, the planned performance hall in Clearwater right next to the Super Power building…

L. Ron Hubbard Hall is coming to downtown Clearwater, faster than most observers thought possible, but slower than Scientology has been [...]

182
31 Views

Last month, we heard of multiple iOS 12 lock screen bypass methods discovered by Jose Rodriguez. Using these techniques, an



Group FaceTime Feature Triggers iOS 12.1 Lock Screen Bypass on Latest Hacking News.

251
26 Views
A team of security researchers has discovered another serious side-channel vulnerability in Intel CPUs that could allow an attacker to sniff out sensitive protected data, like passwords and cryptographic keys, from other processes running in the same CPU core with simultaneous multi-threading feature enabled.

The vulnerability, codenamed PortSmash (CVE-2018-5407), has joined the list of other


243
53 Views

Intel CPUs Fall To New Hyperthreading Exploit That Pilfers Keys

logicfish Security headline flaw cryptography intel All https://packetstormsecurity.com   Discuss    Share
175
68 Views

30 Spies Dead After Iran Cracked CIA Comms Network With, Er, Google Search

logicfish Security headline government usa data loss cyberwar spyware iran All https://packetstormsecurity.com   Discuss    Share
163
24 Views

Last month, Facebook suffered a massive hack. The attack allegedly affected millions of accounts. A month has passed since the



Private Messages From Hacked Facebook Accounts Found Online For Sale on Latest Hacking News.

253
68 Views

[Nibs and his Dad]

We were inspired last week when author Alec Nevala-Lee chose the date of his book release to make public for the first time a really amazing document from Scientology’s early history. And since we had a book of our own come out this week, we thought we’d do the same.

In [...]

Newsletter
Sign up for our newsletter


Unsubscribe at Anytime | Privacy Policy
Welcome, DisDroidians

Sign up and post your links!

sponsored
Most Viewed Stories
Latest Comments
Statistics
Disdroid.co.uk - ranking and value