Satoshi Nakamoto Blog

Tag : hacker news

Cyber Crime cybercriminals cybersecurity email scams Hacking News phishing attack Phishing Scam

Hacker Ordered to Pay Back Nearly £1 Million to Phishing Victims

A prolific hacker who carried out phishing scams against hundreds of companies worldwide has been ordered to pay back more than $1.1 million (over £922,000)...
Google google adsense online ad fraud online advertisement Online Privacy Privacy Sandbox

Google Proposes ‘Privacy Sandbox’ to Develop Privacy-Focused Ads

Google today announced a new initiative—called Privacy Sandbox—in an attempt to develop a set of open standards that fundamentally enhances privacy on the web while...
HTTPS encryption interception tool Kazakhstan Online Security Privacy root ca certificate Root Certificate website security

Google, Mozilla, Apple Block Kazakhstan’s Root CA Certificate to Prevent Spying

In a move to protect its users based in Kazakhstan from government surveillance, Google, Apple and Mozilla finally today came forward and blocked Kazakhstan’s government-issued...
APT hacking group bank hacker bank hacking cyber security hacking group Russian hackers Silence APT

Russian Hacking Group Targeting Banks Worldwide With Evolving Tactics

Silence APT, a Russian-speaking cybercriminal group, known for targeting financial organizations primarily in former Soviet states and neighboring countries is now aggressively targeting banks in...
Facebook Facebook hacking facebook privacy facebook security Off-Facebook Activity Online Privacy privacy tools

Use This Privacy Tool to View and Clear Your ‘Off-Facebook Activity’ Data

Well, here we have great news for Facebook users, which is otherwise terrible for marketers and publishers whose businesses rely on Facebook advertisement for re-targeted...
cybersecurity Event Logs WordPress WordPress Activity Logs Wordpress hacking WordPress security WordPress SEO

How Activity Logs Help WordPress Admins Better Manage Website Security

Managing a WordPress website can sap a lot of your time and energy, which otherwise you’d spend on managing your business. If you’re looking to...
Apple iOS Hacking News iOS jailbreak tool iOS Jailbreaking iOS vulnerability iphone jailbreak Jailbreak software kernel exploit

iOS 12.4 jailbreak released after Apple ‘accidentally un-patches’ an old flaw

A fully functional jailbreak has been released for the latest iOS 12.4 on the Internet, making it the first public jailbreak in a long time—thanks...
Backdoor Malware hacking Linux servers Linux hacking Linux security Linux server Linux Software remote code execution Vulnerability webmin

Hackers Planted Backdoor in Webmin, Popular Utility for Linux/Unix Servers

Following the public disclosure of a critical zero-day vulnerability in Webmin last week, the project’s maintainers today revealed that the flaw was not actually the...
Camera Camera security Canon DSLR Camera cyber security hacking DSLR camera How to hack DSLR camera Ransomware Vulnerability wifi hacking

Canon DSLR Cameras Can Be Hacked With Ransomware Remotely

The threat of ransomware is becoming more prevalent and severe as attackers’ focus has now moved beyond computers to smartphones and other Internet-connected smart devices....
Android FIDO Alliance FIDO U2F Security Key FIDO2 Protocol Google Google Security Key Online Security password security physical security key website security

Android Users Can Now Log in to Google Services Using Fingerprint

If you’re using Chrome on Android, you can now sign-in to your Google account and some of the other Google services by simply using your...
Epic Games epic games fortnite fortnite game Fortnite Game Download Fortnite hacks Fortnite v-bucks hack gaming server hacked fortnite accounts hacked gaming accounts hacking game

Epic Games Hit With Class Action Lawsuit Over Hacked ‘Fortnite’ Accounts

Epic Games, the creator of the popular ‘Fortnite’ video game, is facing a class-action lawsuit from gamers over hacked Fortnite accounts, accusing the company of...
AppTrana cybersecurity vulnerability scanner Web Application Firewall Web Application Security Web Application Security Scanner Web Application Vulnerability website vulnerability

Let Experts Do Their Job – Managed WAF by Indusface

WAF (Web Application Firewall) has been the first line of defence when it comes to application security for a while now. Many organizations have adopted...
BlueKeep RDP Flaw BlueKeep RDP Vulnerability RDP Vulnerability Remote Desktop Protocol Remote Desktop Services Vulnerability windows hacking

4 New BlueKeep-like ‘Wormable’ Windows Remote Desktop Flaws Discovered

If you are using any supported version of the Windows operating system, stop everything and install the latest security updates from Microsoft immediately. Windows operating...
Denial of Service denial-of-service attacks DoS attack HTTP 2.0 Protocol HTTP Strict Transport Security HTTP2 Protocol HTTPS encryption server vulnerability

8 New HTTP/2 Implementation Flaws Expose Websites to DoS Attacks

Various implementations of HTTP/2, the latest version of the HTTP network protocol, have been found vulnerable to multiple security vulnerabilities affecting the most popular web...
Android Banking Malware android banking trojan banking malware banking trojan Cerberus Malware cybersecurity Hacking News Malware mobile spying apps

A New Android ‘Banking Malware For Rent’ Emerges

After a few popular Android Trojans like Anubis, Red Alert 2.0, GM bot, and Exobot, quit their malware-as-a-service businesses, a new player has emerged on the Internet with similar...