212 Topics

Member Avatar for
Member Avatar for happygeek

Last week, the NoSQL database host MongoHQ suffered a breach which exposed customer files, email addresses and password data to the attackers. The ripples from that breach are still being felt, as users of the Sunrise calendar app on the iPhone found out this morning. Luckily that password data was …

Member Avatar for long.duckdong.1848
0
540
Member Avatar for happygeek

While the News International [phone hacking scandal](http://www.guardian.co.uk/media/phone-hacking) that saw the demise of the News of the World newspaper cannot have escaped your attention in the US or UK, news from India concerning the latest 'tumble and clone' developments could leave the mobile phone calls of more than just celebrities at …

Member Avatar for jimmyparker
2
534
Member Avatar for woodenduck

How can I prevent a XSS attack but allow user to post iframe and img? My page is php based but I allow users to submit text and have allowed only iframes and imgs with strip_tag How do I prevent a user from launching an xss attack?

Member Avatar for woodenduck
0
326
Member Avatar for happygeek

UK home shopping pioneers Lakeland have sent an email to all customers past and present to warn them that the retailers website has been hacked. What Managing Director Sam Rayner calls a "sophisticated and sustained attack" took place late on Friday 19th July. Measures were taken at the time to …

Member Avatar for LastMitch
1
375
Member Avatar for happygeek

Within days of the New York Times website suffering an outage which was widely reported as being down to another cyber attack, although the NYT itself insists it was actually an internal issue following system maintenance, media sites belonging to CNN, Time and the Washington Post have been attacked by …

Member Avatar for LastMitch
1
338
Member Avatar for happygeek

Security researchers at ESET [have revealed](http://www.welivesecurity.com/2013/05/16/targeted-threat-pakistan-india/) that a prolonged and highly targeted data stealing attack aimed at Pakistan, using fake PDF documents, appears to have originated in India. Using a code signing certificate (issued to what looks like a legitimate company 'Technical and Commercial Consulting Pvt. Ltd') to sign malicious …

Member Avatar for np complete
1
859
Member Avatar for happygeek

Back in December 2011, reports were circulating regarding a data breach at one of the big Chinese social networking sites, Tianya.cn that suggested the login credentials of some 40 million users were potentially exposed. Clear text usernames and password combinations were stolen by hackers during the breach, although a Tianya …

Member Avatar for Begginnerdev
0
592
Member Avatar for happygeek

New research by [Varonis](http://www.varonis.com/) has revealed that only 25% of those companies questioned were able to answer yes to the question: "Are you able to detect when files containing sensitive data are uploaded to a third party cloud service?" Which left a staggering three-quarters of businesses in the dark about …

Member Avatar for LastMitch
2
440
Member Avatar for happygeek

Konami, the Japanese games developer responsible for such genre defining classics as Metal Gear Solid and Silent Hill, has confirmed that tens of thousands of customer accounts have been put at risk due to a breach of the Konami ID portal site. During a period between the 13th June and …

1
377
Member Avatar for hackoman96

is it posssible to hack into any network using only the knowledge of html and css???

Member Avatar for BMXDad
-1
288
Member Avatar for happygeek

Although the Opera web browser client is no longer the big 'little player' that it used to be having long since been eclipsed by the likes of Chrome and Firefox in the Internet Explorer alternatives stakes, it can still claim more than 300 million users and a place as world’s …

Member Avatar for LastMitch
2
365
Member Avatar for happygeek

The news that, following a number of pretty high-profile password compromise cases, Twitter is adopting a two-factor authentication for account access is to be welcomed. 2FA, as it is known, applies the better security concept of something you know combined with something you own into the access equation. The thing …

Member Avatar for analyzea
2
495
Member Avatar for Captain119

Hello everyone! Webdesign isn't my thing but i know enough to help maintain a website for a church, it is a small scale and all i do is post events and upload pictures. a few days ago the site's ftp account got hacked and all the files been modified. i …

Member Avatar for Captain119
0
243
Member Avatar for Cheeve

Hello, I am curious about how to root an Android phone without using any one click methods. A Google search returns only how to use programs to do this for you. Obviously there is a security vulnerability that is exploited, but I'd like to know in detail how this is …

Member Avatar for CimmerianX
0
391
Member Avatar for happygeek

It has been just over a month now since North Korea gloated about its successful nuclear weapon test. A test which prompted the imposition of new UN sanctions against Pyongyang, and if the Korean Central News Agency (KCNA) which acts as a state mouthpiece for the Democratic People's Republic of …

Member Avatar for KRRahman
1
468
Member Avatar for beep

Does any one know of a registry hack whereby one could add a 'move/copy to folder...' to the right click menu when in Windows Photoviewer? It is insanely useful in Windows Explorer and this would save me time and headaches :) Using 7 Ultimate. Also, I miss all the extras …

Member Avatar for BigPaw
0
215
Member Avatar for happygeek

Apple hacking PWN2OWN supremo and security researcher Charlie Miller is preparing to reveal just how to hack an Apple MacBook battery. Yep, you read that right: Apple battery hacking could be coming to a MacBook near you soon. Well, near you if you happen to be in Las Vegas for …

Member Avatar for LastMitch
1
363
Member Avatar for happygeek

A recent survey, conducted by IT risk management specialists nCircle, suggests that as many as 50% of IT security professionals think that the organisations they work for are a potential target for state-sponsored hackers. A number that Tim Keanini, nCircle Chief Research officer, thinks is rather on the low side …

Member Avatar for LastMitch
3
446
Member Avatar for happygeek

It's never easy calculating the true cost of inadequate security to business, not least as there are so many variables and such reticence when it comes to full disclosure for fear of brand damage. However, the latest [Information Security Breaches Survey](http://www.pwc.co.uk/audit-assurance/publications/uk-information-security-breaches-survey-results-2012.jhtml) (ISBS) from PwC/Infosecurity Europe has had a good bash …

Member Avatar for LastMitch
1
484
Member Avatar for CatRambo

[ATTACH=RIGHT]16244[/ATTACH]Ron Bowes has been accused of hacking Facebook. But when he put the information for over a 100 million [URL="http://www.facebook.com"]Facebook[/URL] users into a 2.8 GB torrent stream on his website Skullsecurity.org, he didn't need to hack anything to get it - it was already publicly available on Facebook. All he …

Member Avatar for LastMitch
0
591
Member Avatar for happygeek

New research shows that hackers are becoming increasingly lazy in their search for online exploits, with 98% of Remote File Inclusion and 88% of SQL injection attacks now being fully automated. It comes as no surprise whatsoever to DaniWeb administrators and moderators that your average cybercriminal is looking for the …

Member Avatar for LastMitch
1
540
Member Avatar for kubyk

My computer has been severely hacked. Well 2 laptops actually. And it looks like my router also. Problems noted here: 1. Email accounts routinely hacked even after changing passwords and using keypass in the securist way. Suspected keyloggin occuring somewhere in the stream. 2. Something causing my typing to be …

Member Avatar for caperjack
0
286
Member Avatar for OsaMasw

hello guys, unfortunly my website got hacked few hours ago, and after investigations I found the was a c99.php file on my server so i deleted it and stopped any upload proccess and change back my chmod to default I want to ask how to prevent php files from being …

Member Avatar for naphets
0
2K
Member Avatar for happygeek

Apple, Facebook and Twitter have all been the target of hackers recently, and now Evernote has admitted to a potential breach that has forced it to reset the passwords of approximately 50 million registered users. Evernote, a kind of web scrapbook that enables you to take notes, save web pages …

Member Avatar for LastMitch
1
647
Member Avatar for r14aul

My site has just been hacked and I suspect that it was a remote file inclusion attack. These are my server specs: Windows Server 2008 R2 running ColdFusion 9 (9.0.1.274733) and IIS 7.5 This is the source code of the page that appeared after my site was hacked: <!-- # …

Member Avatar for LastMitch
0
408
Member Avatar for game4tress

I'm trying to find a solution to protect all the software developed in the company I work in. Till now we've been working with hardlocks, but we are trying to cut on expences and wanting to develop our own software protection system. I know that there some free tools, like …

Member Avatar for stultuske
0
303
Member Avatar for happygeek

Earlier this year Jonathan Evans, the Director General of MI5 (the UK Security Service), warned that cyber attacks against UK plc were as much of a security challenge as terrorism as far as Britain was concerned. He claimed that UK businesses were being targeted at an 'astonishing' rate driven by …

Member Avatar for johnedwards095
0
372
Member Avatar for happygeek

Gary McKinnon, an unassuming 46 year old Londoner who suffers from Asperger's syndrome and depression, is an unlikely man to be making headlines the world over once again. Indeed, across the last decade McKinnon has almost seemed to be a permanent fixture in news media feeds online and off, a …

Member Avatar for gerbil
0
534
Member Avatar for np complete
Member Avatar for happygeek

The 'Murder Ball' competition is now underway at the London 2012 Summer Paralympics, also known as wheelchair rugby to some. However, you won't find Olympic athletes taking part in the warbiking event that has also been happening in London recently: warbiking is very much a sport for nerds. ![warbike](/attachments/small/0/warbike.jpg "align-right") …

Member Avatar for UrbanKhoja
0
364

The End.