Security News

Recent DNS Hijacking Campaigns Trigger Government Action
2019-07-22 20:18

US and UK Agencies Respond to Increasing AttacksA recent spate of attacks targeting domain name system protocols and registrars, including several incidents that researchers believe have ties to...

Sea Turtle's DNS Hijacking Continues Despite Exposure
2019-07-10 15:55

In April 2019, Cisco Talos researchers reported on an ongoing state-sponsored DNS hijacking campaign that had compromised at least 40 different organizations in 13 countries. They named the...

Zoom Zero-Day Bug Opens Mac Users to Webcam Hijacking
2019-07-09 15:35

The vulnerability can be exploited on a drive-by basis by a malicious website.

EA Games Patches Account-Hijacking Bug
2019-06-26 15:08

A bug in the Electronic Arts gaming platform's single sign-on mechanism could have allowed hackers to access game accounts.

Streaming Video Fans Open to TV Hijacking
2019-06-06 14:31

Critical bugs impact a widely deployed streaming platform, common in the U.S. and elsewhere.

Slack Bug Allows Remote File Hijacking, Malware Injection
2019-05-20 14:22

An attacker can supply a malicious hyperlink in order to secretly alter the download path for files shared in a Slack channel.

How to block hijacking attacks on your Google account
2019-05-20 12:47

Bot and phishing attacks can compromise your G Suite account, but there is an easy way to block the majority of these attempts, according to Google.

Account Hijacking Forum OGusers Hacked
2019-05-18 13:44

Ogusers[.]com -- a forum popular among people involved in hijacking online accounts and conducting SIM swapping attacks to seize control over victims' phone numbers -- has itself been hacked,...

Nine Charged in SIM Hijacking Scheme
2019-05-13 17:47

The United States has indicted nine individuals with online identity theft and related charges, the U.S. Department of Justice announced.  read more

Lax Telco Security Allows Mobile Phone Hijacking and Redirects
2019-05-08 17:14

A Q&A with Kaspersky Lab researcher David Jacoby examines a gaping hole in the telco customer-service process that allows adversaries to commandeer phone calls.