Canada’s Notorious Hacker to Compensate Victims: A Tale of Cybercrime and Restitution

Categories: Tech News|Tags: , , , , , , , , , , , , , , , , |

Canada's Notorious Hacker to Compensate Victims: A Tale of Cybercrime and Restitution. Matthew Philbert of Ottawa, recognized as Canada's most infamous hacker, has conceded to a series of cybercrimes, including fraud, unauthorized computer use, handling and distributing computer passwords, and computer data tampering. This acknowledgment comes as a rare instance where those defrauded

Hacking Satellite Internet with Basic TV Equipment: Uncovering the Vulnerability in Broadband Communications

Categories: Tech News|Tags: , , , , , , , , , , , , , |

Hacking Satellite Internet with Basic TV Equipment: Uncovering the Vulnerability in Broadband Communications. A recent demonstration at Black Hat 2020 by an Oxford University researcher revealed how hackers could spy on satellite internet traffic using home TV equipment worth just $300. This vulnerability in satellite broadband communications allows cyber attackers to intercept unencrypted

The Guide to Ethical Hacking

Categories: Tech News|Tags: , , , , , , , , , , |

Ethical hacking. The Guide to Ethical Hacking: Ethical Hacking and hackers have a horrible reputation, but some hackers are making the internet a friendlier, & safer place. Whether they use their superpowers for good or evil, some hackers have genius skills. But can hacking really be a good thing? (Depends, one mans hacker hero

Hackers attack Confluence Servers, hijack power for cryptocurrency mining

Categories: Tech News|Tags: , , , , , , |

Hackers attack Confluence Servers, hijack power for cryptocurrency mining. Illicit Monero mining is the goal. According to Trend Micro, attackers are harnessing CVE-2019–3396, a bug present in the Widget Connector macro in Atlassian Confluence Server, which permits path traversal and remote code execution via server-side injection. Atlassian released a patch on March 20, 2019, to resolve the security

Hackers breached 3 US antivirus companies, researchers reveal

Categories: Tech News|Tags: , , , |

Hackers breached 3 US antivirus companies, researchers reveal. Source code, network access being sold online by "Fxmsp" collective. In a report published Thursday, researchers at the threat-research company Advanced Intelligence (AdvIntel) revealed that a collective of Russian and English-speaking hackers are actively marketing the spoils of data breaches at three US-based antivirus software vendors. The

Bluetooth harvester signals hacking group’s growing interest in mobile

Categories: Tech News|Tags: , , , |

Bluetooth harvester signals hacking group’s growing interest in mobile. ScarCruft's new interest in mobile devices suggests the group's continuing evolution. A Korean-speaking hacking group in operation since at least 2016 is expanding its arsenal of hacking tools to include a Bluetooth-device harvester in a move that signals the group’s growing interest in mobile devices.

Researchers demonstrate new ways to hack your stupidly complex smart home

Categories: Tech News|Tags: , , , |

Researchers demonstrate new ways to hack your stupidly complex smart home. It seems that some homes may be too smart for their own good. On Monday, March 5, researchers at the San Francisco RSA conference presented to an assembled crowd of journalists and cybersecurity experts an unexpected approach for hacking into the device-enabled homes of the modern

Go to Top