Satoshi Nakamoto Blog

Category : Hacking News

Hacking News ring camera security camera Smart Home surveillance camera hacking Technology News two factor authentication two-factor authentication

Ring Makes 2-Factor Authentication Mandatory Following Recent Hacks

satoshi
Smart doorbells and cameras bring a great sense of security to your home, especially when you’re away, but even a thought that someone could be...
cyber espionage cyber security Hacking News Iranian computers Iranian Hackers Malware attack secure vpn server VPN hacking VPN Vulnerability

Iranian Hackers Exploiting VPN Flaws to Backdoor Organizations Worldwide

satoshi
A new report published by cybersecurity researchers has unveiled evidence of Iranian state-sponsored hackers targeting dozens of companies and organizations in Israel and around the...
business security cyber espionage cybersecurity Enterprise Security Espionage Act Hacking News Huawei

U.S. Charges Huawei with Stealing Trade Secrets from 6 Companies

satoshi
The US Department of Justice (DoJ) and the Federal Bureau of Investigation (FBI) charged Huawei with racketeering and conspiring to steal trade secrets from six...
Hacking News Online Security Privacy software security Software vulnerabilities Video Conferencing Software Zoom

Zoom Bug Could Have Let Uninvited People Join Private Meetings

satoshi
If you use Zoom to host your remote online meetings, you need to read this piece carefully. The massively popular video conferencing software has patched...
cyber security Firefox firefox browser Hacking News Mozilla Developers Mozilla Security type confusion vulnerability web browser security zero day vulnerability

Critical Firefox 0-Day Under Active Attacks – Update Your Browser Now!

satoshi
Attention! Are you using Firefox as your web browsing software on your Windows, Linux, or Mac systems? If yes, you should immediately update your free...
Apple bug bounty program apple iwatch Bug Bounty Program Hacking News iOS hacking iOS vulnerability ipad hacking watchOS

Apple Opens Its Invite-Only Bug Bounty Program to All Researchers

satoshi
As promised by Apple in August this year, the company today finally opened its bug bounty program to all security researchers, offering monetary rewards to...
credit card credit card hacking data breach hacking debit card Hacking News Point of Sale Point-of-sale Malware Point-of-sale system POS Malware

Hackers Stole Customers’ Payment Card Details From Over 700 Wawa Stores

satoshi
Have you stopped at any Wawa convenience store and used your payment card to buy gas or snacks in the last nine months? If yes,...
British hacker Cyber Attack Cyber Crime Cyber Criminal hacking group Hacking News The Dark Overload

British Hacker Accused of Blackmailing healthcare Firms Extradited to U.S.

satoshi
A British man suspected to be a member of ‘The Dark Overlord,’ an infamous international hacking group, has finally been extradited to the United States...
cyber security cyber security professionals cyber security tools Cybersecurity Predictions Enterprise Security Hacking News website security

Top 5 Cybersecurity and Cybercrime Predictions for 2020

satoshi
We distilled 30 independent reports dedicated to cybersecurity and cybercrime predictions for 2020 and compiled the top 5 most interesting findings and projections in this...
adobe cyber security data breach Hacking News Magento Magento Hacking Magento Security magento themes Magento Vulnerability

Magento Marketplace Suffers Data Breach Exposing Users’ Account Info

satoshi
If you have ever registered an account with the official Magento marketplace to bought or sold any extension, plugin, or e-commerce website theme, you must...
Android cyber security data collection Facebook Hacking News Privacy Privacy Breach Twitter

Malicious Android SDKs Caught Accessing Facebook and Twitter Users Data

satoshi
Two third-party software development kits integrated by over hundreds of thousands of Android apps have been caught holding unauthorized access to users’ data associated with...
cyber security Hacking News remote code execution server security virtual network computing VNC protocol vnc viewer Vulnerability

Dozens of Severe Flaws Found in 4 Popular Open Source VNC Software

satoshi
Four popular open-source VNC remote desktop applications have been found vulnerable to a total of 37 security vulnerabilities, many of which went unnoticed for the...
cyber security data breach Hacking News Personal Data Privacy T-Mobile Telecom company Telecom hacking

T-Mobile Suffers Data Breach Affecting Prepaid Wireless Customers

satoshi
Are you a T-Mobile prepaid customer? If yes, you should immediately create or update your associated account PIN/passcode as additional protection. The US-based telecom giant...
Cryptocurrency cryptocurrency malware cyber security Hacking News Monero monero cryptocurrency

Official Monero Site Hacked to Distribute Cryptocurrency Stealing Malware

satoshi
What an irony — someone hacked the official website of the Monero cryptocurrency project and quietly replaced legitimate Linux and Windows binaries available for download...