Address Bar Spoofing Bugs Found in Safari, Chrome for Android

Researchers have discovered address bar spoofing vulnerabilities in the Safari and Google Chrome for Android web browsers. Cybercriminals can exploit the bugs in phishing attacks. The flaw affecting Apple’s Safari was identified by researchers at UK-based security firm Deusen. The bug, for which experts created a simple proof-of-concept (PoC) webpage, affects the latest version of Safari on both OS X and iOS. The PoC from Deusen displays the URL “dailymail.co.uk” in the browser’s address bar for a webpage hosted on deusen.co.uk. This spoofing vulnerability can be very useful for phishing attacks. “The [PoC] code is very simple: webpage reloads every 10 milliseconds using the setInterval() function, just before the browser...

Continue reading

Hacker group that hit Twitter, Facebook, Apple and Microsoft intensifies attacks

The hackers that targeted Twitter, Facebook, Apple and Microsoft developers two years ago have escalated their economic espionage efforts as they seek confidential business information and intellectual property they can use for financial gain. The group, which security researchers from Kaspersky Lab and Symantec call Wild Neutron or Morpho, has broken into the networks of more than 45 large companies since 2012. After the 2013 attacks against Twitter, Facebook, Apple and Microsoft were highly publicized, the group went underground and temporarily halted its activity. However, its attacks resumed in 2014 and have since intensified, according to separate reports released Wednesday by Kaspersky Lab and Symantec. Symantec identified 49 organ...

Continue reading

Intelligent Machines: What does Facebook want with AI?

These days study into artificial intelligence research is no longer the preserve of universities - the big technology firms are also keen to get involved. Google, Facebook and others are busy opening AI labs and poaching some of the most talented university professors to head them up. Prof Yann LeCun is a hugely influential force in the field of Deep Learning and is now director of AI research at Facebook. He spoke to the BBC about what the social network is doing with the technology and why he thinks Elon Musk and Stephen Hawking are wrong in their predictions about AI destroying humanity and here are his thoughts. [b]What is artificial intelligence?[/b] It is the ability of a machine to do things that we deem intelligent behavi...

Continue reading

Email Phishing Scams

A spoofed email message is often the cornerstone of any well-executed phishing scam. From the earliest days of phishing, fraudulent email messages have been used to catch Internet users unawares. Phishing attacks picked up steam during the heyday of AOL. Instant messages and email messages were used to carry out those attacks. Although many things have changed, many others have remained the same. To this very day, major online entities like PayPal and eBay have to grapple with the problem of email phishing. Several online banks have been targeted as well. Learn more about how email phishing works, what it looks like and how avoid falling victim to it below. [b]What is Email Phishing?[/b] Email phishing refers to the act of creating an...

Continue reading

Any Car can be hacked via Internet

If you are driving your car and it goes out of control where you could not stop various things happening in your car like AC vents our the cold, chilling air at the maximum, changing radio channels, wiper fluid blurring out on the glass, turning on of wipers. This is not normal; soon you will realize your car system is hacked. In past there had been some hackers experimenting on hacking car’s controls through a software code. The experience of driving a hacked SUV vehicle through an unseen force was quite enthralling. In last hacking event the famous hacker’s duo Charlie Miller and Chris Valasek were seen in their trademark track suits at the car’s display screen. They both were known for their car research on hacking cars sy...

Continue reading
Ehack.org