image
By Waqas Smartwatches are generally considered safe to keep track of your kids when they are outside the home. However, there is a scary new revelation about this seemingly reliable gadget that it is possible to hack GPS-enabled smartwatches. Probably a majority of children wear smartwatches these days, and the fact that one of the most popular […] This is a post from HackRead.com Read the original post: Shoddy security of popular smartwatch lets hackers access your child’s location

Source

The flaw in a high-end phones and up-and-coming handsets made by top OEMs allows hackers to bypass handset lock screens in seconds.

Source

Has Wikileaks founder Julian Assange officially been charged with any unspecified criminal offense in the United States? — YES

United States prosecutors have accidentally revealed the existence of criminal charges against Wikileaks founder Julian Assange in a recently unsealed court filing in an unrelated ongoing sex crime case in the Eastern District of Virginia.

Assistant US Attorney Kellen

Source

image
By Waqas White hat hackers and IT security researchers have once again proved their elite skills at Pwn2Own 2018 after exposing critical security vulnerabilities in products developed by popular vendors like Apple, Samsung, and Xiaomi. Pwn2Own is organized by cybersecurity giant Trend Micro’s Zero Day Initiative in Tokyo where hackers took part in exploiting zero-day flaws in products developed by […] This is a post from HackRead.com Read the original post: iPhone X, Xiaomi Mi 6 & Samsung Galaxy S9 hacked at Pwn2Own

Source

The modular malware seems to be in a testing phase, but TA505's interest made researchers take note.

Source

image
By Carolina Websites are essentially your business’s storefront. They display to passing visitors the products and services your business is offering: they offer a window into your business. Similar to traditional stores, your website is also prone to theft and random acts of destruction. A live website is a game hunting ground for cybercriminals. Not securing your […] This is a post from HackRead.com Read the original post: How to Hack Off Hackers

Source

image
By Waqas “DarkGate” malware uses Akamai, AWS DNS records and multiple payloads for cryptomining, credential theft and endpoint takeover. A sophisticated malware campaign has been identified by an enSilo researcher that hasn’t been detected before and is quite advanced than many of the malware identified before. It has been dubbed as DarkGate by the developer, reports researcher […] This is a post from HackRead.com Read the original post: DarkGate: New password stealer & cryptomining malware hits Windows devices

Source

As consumers skip the store crowds in favor of online deals, cyberattackers have geared up to victimize them.

Source