News & Updates

Google has finally won six-year long $9-billion legal battle with Oracle over the use of Java APIs in Android.

Oracle filed its lawsuit against Google in 2010, claiming that the company illegally used 11,500 lines of Java code in its Android operating system, violating copyrights owned by Oracle.

However, a federal jury of ten people concluded Thursday that Google’s use of Java constituted “


Source: http://feeds.feedburner.com/TheHackersNews

SWIFT Bank Hackers have attacked another bank in the Philippines using the same modus operandi as that in the $81 Million Bangladesh Bank heist.

Security researchers at Symantec have found evidence that malware used by the hacking group shares code similarities with the malware families used in targeted attacks against South Korean and US government, finance, and media organizations in 2009.
<!-


Source: http://feeds.feedburner.com/TheHackersNews

It’s fair to say the success of the ARM-powered Raspberry Pi computers have surpassed expectations and have been a godsend to hobbyists, hackers, and students.

If you’re one of those people looking for unofficial hacks to install Android OS on a Raspberry Pi device, then stop and wait for the official release.

Raspberry Pi computers have largely been Linux affairs, as several Linux


Source: http://feeds.feedburner.com/TheHackersNews

The importance of increasing online security around personal information has risen due to the increase in cyber attacks and data breaches over recent years.

I find it hilarious people are still choosing terrible passwords to protect their online accounts.

The massive LinkedIn hack is the latest in the example that proves people are absolutely awful at picking passwords. The data breach


Source: http://feeds.feedburner.com/TheHackersNews

The FBI and other law enforcement agencies have waged legal war on encryption and privacy technologies.

You may have heard many news stories about the legal battle between Apple and the FBI over unlocking an iPhone that belonged to the San Bernardino shooter. However, that was just one battle in a much larger fight.
<!– adsense –>
Now, in an effort to make its iPhone surveillance-and-hack


Source: http://feeds.feedburner.com/TheHackersNews

Last year, a white hat hacker developed a cheap Arduino-based device that looked and functioned just like a generic USB mobile charger, but covertly logged, decrypted and reported back all keystrokes from Microsoft wireless keyboards.

Dubbed KeySweeper, the device included a web-based tool for live keystroke monitoring and was capable of sending SMS alerts for typed keystrokes, usernames, or


Source: http://feeds.feedburner.com/TheHackersNews

In an era where major data hacks are on the rise, it is no surprise breaches on individuals are also up.

In just three hours, over 100 criminals managed to steal ¥1.4 Billion (approx. US$12.7 Million) from around 1,400 ATMs placed in small convenience stores across Japan.

The heist took place on May 15, between 5:00 am and 8:00 am, and looked like a coordinated attack by an international


Source: http://feeds.feedburner.com/TheHackersNews

Despite browsing incognito, blocking advertisements, or hiding your tracks, some websites monitor and track your every move online using a new web-tracking technique called Audio Fingerprinting.

This new fingerprinting technique can be utilized by technology and marketing companies to deliver targeted advertisements as well as by law enforcement to unmask VPN or Anonymous users, without even


Source: http://feeds.feedburner.com/TheHackersNews

How to hack an Instagram account?

The answer to this question is difficult to find, but a bug bounty hunter just did it without too many difficulties.

Belgian bug bounty hunter Arne Swinnen discovered two vulnerabilities in image-sharing social network Instagram that allowed him to brute-force Instagram account passwords and take over user accounts with minimal efforts.
<!– adsense –>
Both


Source: http://feeds.feedburner.com/TheHackersNews

Bangladesh is not the only bank that had become victim to the cyber heist. In fact, it appears to be just a part of the widespread cyber attack on global banking and financial sector by hackers who target the backbone of the world financial system, SWIFT.

Yes, the global banking messaging system that thousands of banks and companies around the world use to transfer Billions of dollars in


Source: http://feeds.feedburner.com/TheHackersNews