In a joint statement, US and Russian Presidents Barack Obama and Vladimir Putin made public their cooperation plans to secure the cyber environment, recognizing “the unprecedented progress in the use of Information and Communications Technologies (ICTs).”
Anonymous hacked and published Filipino President's private mobile number, urging voters to confront their leader directly, according to the Associated Press. A member of the hacktivist group claims he managed to steal three telephone numbers belonging to the president Benigno Simeon Cojuangco Aquino III.
The domain name used by the unofficial Debian Multimedia repository has changed hands and now poses a security threat to Linux users who enabled it in the past.
Pakistan’s new IT and telecommunication minister is concerned about the “blasphemous and objectionable material” on YouTube and threatens to ban Google in the country, unless the company sanitizes the video sharing platform, The Time of India reports.
Apple pushed on Tuesday an update that fixes more than 30 vulnerabilities in the operating system software, including a critical bug in Safari.
In a coordinated action, Microsoft and the FBI disrupted Citadel, a multi-million dollar operation responsible for stealing approximately half a billion dollars from bank accounts worldwide.
Oracle-sponsored Java has had a rough patch this year as zero-day exploits kept pouring in and cyber-crooks rushed to monetize their bugs. But things are apparently looking less gloomy for the upcoming releases of Java, which will bring major changes in the way applets are treated within the browser, among others.
iPhones can be hacked in one minute with a malicious charger, according to researchers at the Georgia Institute of Technology. The security experts plan to present the proof-of-concept device at the Black Hat conference in July. The ‘Mactans’ charger may be used to install malware on a device running the latest version of Apple’s iOS.
Peer-to-peer botnets have witnessed a dramatic surge over the past three years, but it appears the number of infected computers in these zombie networks is exceeding all expectations.
A known critical flaw in Ruby on Rails (CVE-2013-0156) is currently exploited in the wild, although it was patched months ago. The flaw, originally reported in January, is currently abused by cyber-criminals to take control of still-vulnerable servers.
American teenagers prefer Facebook to other social media platforms despite being most frustrated by this particular online social medium, a new report by the Pew Internet & American Life Project finds.
Several Android apps of British company Sky and its Twitter account were hacked by the Syrian Electronic Army. The hackers posted a tweet, allegedly from the broadcaster, advising people to uninstall the official apps.
Twitter has introduced two-factor authentication by including mobile phones in users’ verification processes after a series of high-profile account hacks.
When it comes to hacking, search engines turn out to be the tools that get your work half done, or so is the case with a team of reporters from Scripps News who stumbled on a huge pool of customer data via Google Search.