Researcher Who Found macOS Keychain Exploit Shares Details With Apple, Despite No Bounty

After a Germany-based security researcher last month claimed to have identified a macOS security workaround to access passwords and user information stored in Keychain, he says he’s reversed his position on sharing that information with Apple, 9to5Mac reported Wednesday. Read More >>

Dual UPnP-Chromecast Exploit Allows Hacker to Hijack Devices, Force Any YouTube Video to Play

Hackers have discovered a bug that allows attackers to seize control of Google’s Chromecast media streaming player, making it possible to force the device into “playing any YouTube video they want – including videos that are custom-made,” TechCrunch reported on Wednesday. Read More >>

Everything You Need to Know About Cloudbleed, the Latest Internet Security Disaster

Have you heard? A tiny bug in Cloudfare’s code has led an unknown quantity of data—including passwords, personal information, messages, cookies, and more—to leak all over the internet. If you haven’t heard of the so-called Cloudbleed vulnerability, keep reading. This is a scary big deal. Read More >>

It’s Ridiculously Easy to Troll Google Maps With Fake Listings

Trust the listings you find on Google Maps? You shouldn't, because it's easy to fake them. That's what Google Maps exploiter Bryan Seely demonstrated for me. And while trolling politicians with dick jokes is never not funny, there's also a whole sub-community of scammers turning Google Map's little bugs into cold, hard cash. Read More >>

Luxury Smart Toilet Vulnerable to Back Door Attack

The Satis so-called "smart toilet" can be controlled by an Android app, with users of the £4,000 loo able to operate its lighting, flush and bidet controls from a phone. Problem is, the Bluetooth access PIN is set to "0000" by default, meaning random strangers could seize control of your toilet and exploit your very own back door for their amusement. Read More >>

Ch4nge Your P4ssw0rd: Ubisoft Servers Hacked, Login Details Nicked

Gaming giant Ubisoft is at the centre of a new gaming hack attack, with the game maker telling players that "user names, email addresses and encrypted passwords" have been pulled from one of its servers. Read More >>

Watch Out: Infected PCs Spreading Malware Through Hacked Tweets

Those clever hackers have come up with a new way to exploit Twitter, with a browser-based exploit launched from malware infected PCs, helping spread links of shame in the form of tweets that appear to be sent from the user's account. Read More >>

Crazy New Exploit Can Brick Samsung Phones or Steal All Their Data

Got a Samsung Galaxy SIII? Maybe a Galaxy Note? Well listen up because there's a new boogeyman on the loose. According to a thread at XDA Developers, there's an exploit out there that can let Android malware apps get at all your physical memory, for the purposes of stealing your data or deleting it or whathaveyou. Read More >>

Mass Murder in WoW as Hacker’s “Exploit” Wipes Out Thousands of Players

Amazing scenes of death and carnage were witnessed in the pretend World of Warcraft over the weekend, after an exploit of some kind was used to kill thousands of player characters. Read More >>

Java Patched, New Java Security Holes Discovered

Just days after Oracle took the unusual step of releasing an unscheduled patch to fix the huge security flaw found in the most recent update of its Java platform, more ways to exploit the code have been found within the widely used tool. Read More >>

Java Hack Gains Momentum as Firefox Advises All Users to Switch it Off

The recently discovered potentially apocalyptic Java exploit has been spreading, with the hack now part of a commonplace malware bundle that's doing the rounds on the hacking scene. Read More >>

Java Hack Will Bring About the End of the World

A rather huge exploit has been used to attack users of Java, which has been found to operate within browsers on PCs, OS X and even the more robust Ubuntu. Everything that runs Java is now vulnerable. Read More >>

The US Government Will Pay £160,000 For iOS Security Holes

US intelligence agencies pay hackers as much as £160,000 for iOS security exploits or £126,000 for a Chrome or Explorer vulnerability. The agencies will not tell you about it, they would use that exploit to gain access to devices. Read More >>

windows phone
A Single Text Can Destroy Windows Phone’s Messaging App

You had better hope the gent who discovered this Windows Phone security exploit is the only one who knows how to do it: this video shows just how easy it is to permanently ruin a WP7 handset. Read More >>

Android 4.0 Security Boosted with ASLR

ASLR is something very technical to do with computers and randomising how they use their memory. Google's sticking it in the Android "Ice Cream Sandwich" update, to ensure better security. Read More >>