Epic Games forums hacked again – over 800,000 gamers put at risk

More than 800,000 usernames, email addresses, and birth dates are thought to have been stolen by hackers from online forums run by Epic Games. Epic, famed for developing popular games such as Unreal Tournament, Gears of War and Infinity Blade, are thought to have had members of their message boards exposed by hackers exploiting a … More Epic Games forums hacked again – over 800,000 gamers put at risk

QuadRooter vulnerabilities leaves 900 million Android devices at risk of attack

Over 900 million Android smartphones and tablets are vulnerable to cyberattacks, as they contain a set of four vulnerabilities dubbed QuadRooter. These flaws were found in devices that use Qualcomm chipsets, Check Point revealed at this year’s DEF CON 24 Hacking Conference in Las Vegas. It stated that if any of the four vulnerabilities are … More QuadRooter vulnerabilities leaves 900 million Android devices at risk of attack

Car hacking at speed – where vulnerabilities turn from critical to fatal

There’s a fundamental difference between criminal hackers and white hat vulnerability researchers. When a white hat finds a vulnerability they may explore it, and write an interesting presentation about what can be achieved through the flaw, but once they’ve described the security weakness to the appropriate party and the hole is closed – that’s it. … More Car hacking at speed – where vulnerabilities turn from critical to fatal

Clash of Kings forum hacked, 1.6 million account details put at risk

The details of almost 1.6 million players of a popular smartphone game have reportedly been stolen after the official forums of “Clash of Kings” game were hacked. As ZDNet reports, hackers were able to break into the strategy war game forum – run by Chinese firm Elex – and make off with the usernames, email … More Clash of Kings forum hacked, 1.6 million account details put at risk

Hi, I’m the enemy: Different perspectives on a pentest

Today we are starting a series of articles showing the different angles that can be taken when tackling a pentest. “A PENTEST RECREATES THE ACTIONS CARRIED OUT BY AN ATTACKER IN ORDER TO IDENTIFY ANY VULNERABILITIES” Let’s start by defining what that is. A pentest is an audit process that involves carrying out controlled attacks … More Hi, I’m the enemy: Different perspectives on a pentest