Aristo Aristodemou

157 Flips | 1 Magazine | 9 Likes | @Aristoza | Keep up with Aristo Aristodemou on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Aristo Aristodemou”

Hackers exploit casino's smart thermometer to steal database info

Having a whole bunch of smart objects like lights, appliances, and thermometers can make life a little more convenient for businesses, but buying …

The Best 20 Hacking and Penetration Tools for Kali Linux

It is surprising how many people are interested in learning how to hack. Could it be because they usually have a Hollywood-based impression in their …

Hacking Windows 10: How to Break into Somebody's Computer Without a Password (Exploiting the System)

After a hacker has configured Metasploit on a remote private server, created a resource script for automation, and created a simple payload, he or …

CCleaner Malware Targeted Tech Giants Cisco, Google, Microsoft

The backdoor discovered in Avast's CCleaner targeted top tech companies including Google, Microsoft, Samsung, Sony, VMware, and Cisco.<p>When Cisco …

How To: Hack WPA & WPA2 Wi-Fi Passwords with a Pixie-Dust Attack Using Airgeddon

Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this …

You need an ‘I’ve been hacked’ plan for your cloud

A study that was conducted by Ponemon Institute and sponsored by IBM Resilient and found that 77 percent of respondents admit they do not have a …

Cracking an Encrypted External Hard Drive

As far as hobbies go, auditing high security external hard drives is not terribly popular. But it’s what [Raphaël Rigo] is into, and truth be told, …

The Leaked NSA Spy Tool That Hacked the World

An elite Russian hacking team, a historic ransomware attack, an espionage group in the Middle East, and countless small time cryptojackers all have …

Queensland law firms lose millions to hackers in 'highly sophisticated' email scam

"Although conveyancing transactions have been hardest hit, any movement of trust funds is at risk."<p>Robbins Watson Solicitors managing director and IT …

Identity Theft

Surface Phone: Here's everything we think we know so far

Alleged leaks earlier pointed towards a so-called Surface Phone device, the company’s ultimate mobile device, now referred to as Andromeda. …

Windows 10

iPhone and iPad users hit with bug

Apple has already fixed the problem by releasing iOS11.2 for iPads and iPhones.<p>A bug in Apple's latest mobile software is causing some iPads and …

Apps

Imgur hacked: Personal details of 1.7 million user accounts stolen in major data breach

Security expert Troy Hunt praised the company over its swift response over the Thanksgiving weekend.<p>Imgur said it suffered a major data breach in …

WikiLeaks Releases Source Code of CIA Cyber-Weapon

WikiLeaks published the first-ever batch of source code for CIA cyber-weapons. The source code released today is for a toolkit named Hive, a …

He Perfected a Password-Hacking Tool—Then the Russians Came Calling

Five years ago, Benjamin Delpy walked into his room at the President Hotel in Moscow, and found a man dressed in a dark suit with his hands on …

Information Security

Wi-Fi security has been breached, say researchers

This is your Wi-Fi on KRACK<p>At about 7AM ET this morning, researchers revealed details of a new exploit called KRACK that takes advantage of vulnerabilities in Wi-Fi security to let attackers eavesdrop on traffic between computers and wireless access points. The exploit, as first reported by <i>Ars</i> …

This simple USB key protects everyone from phishing

Stina Ehrensvärd has one mission: to keep people safe online. Her Silicon Valley-based company, Yubico, produces the Yubikey, which is designed to …

Apple investigating swollen batteries in iPhone 8 Plus handsets

<b>Apple is investigating a series of reports about battery problems with some of its new iPhone 8 Plus phones.</b><p>Over the last week, six reports have come to light which show the phones splitting apart soon after they start to be used.<p>In all cases the battery inside the phone has swollen rendering the …

At least seven iPhone 8 units have split apart

More iPhone 8 and iPhone 8 Plus units have come back to Apple’s service team, all of them sharing one issue: the battery has bloated to the point …

Microsoft Patches Windows Zero-Day Flaws Tied to DNSSEC

Security experts advise 'immediate' patching of critical DNS client vulnerabilities in Windows 8, 10, and other affected systems.<p>Microsoft today …

Information Security

Microsoft: We'll have two-thirds of Office users in the cloud by fiscal 2019

Microsoft is running ahead of projections in terms of how quickly its Office users are moving to Office 365, says the head of Office. And more …

Forgotten Office 365 accounts targeted by stealthy attack campaign

'KnockKnock' attackers hope to fly under the radar by hacking rarely-used, high-privilege accounts.<p><i>Video: Why does Locky ransomware keep coming back</i> …

Cloud vulnerabilities are being ignored by the enterprise

RedLock's latest cloud security report suggests that organizations are failing in the most basic security practices.<p>The enterprise is still ignoring …

Apple Store in China had just two customers in line for iPhone 8

There were more people lined up for the opening of a local bank than at an Apple Store in China for the launch of the iPhone 8. At least, that was …

Verizon Suffers Cloud Data Leak Exposing Data on Millions of Customers

Six million of Verizon's US customers had their personal and account information exposed, including PIN numbers.

An Idiot’s Guide to Building an Ethereum Mining Rig

Let us hash.<p>In March, the price of an Ether cryptocurrency token rose to an all-time high of around $25. This was good news for investors in Ethereum—the blockchain-based distributed computing platform that uses Ether as its currency—who had watched the cryptocurrency's price stagnate at under $10 …

TheFatRat – Massive Exploitation Tool

TheFatRat is an easy-to-use Exploitation Tool that can help you to generate backdoors and post exploitation attacks like browser attack DLL files. …

Hacker Bypasses Microsoft ATA for Admin Access

Microsoft's Advanced Threat Analytics defense platform can be cheated, a researcher will show at Black Hat USA next month.

Microsoft MS17-010 Vulnerability: EternalRocks Attack Spreading Using Same Exploit As WannaCry Ransomware

In the wake of the WannaCry ransomware attack that infected more than 300,000 computers in 150 countries earlier this month, another attack using …

Hackers hit Russian bank customers, planned international cyber raids

MOSCOW (Reuters) - Russian cyber criminals used malware planted on Android mobile devices to steal from domestic bank customers and were planning to target European lenders before their arrest, investigators and sources with knowledge of the case told Reuters.<p>Their campaign raised a relatively …

AIRS

Research today is a skill that is taught to students as part of information literacy units; however, I don’t think students understand the difference …