#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

Search results for acer | Breaking Cybersecurity News | The Hacker News

Acer Domains Defaced and 20k Credentials leaked

Acer Domains Defaced and 20k Credentials leaked

Dec 02, 2012
While Exploring Zone-H , today we found that Turkish Ajan Hacker Group hacked into few Acer Indian domains and Deface the sites.  Hacker also dump the complete data of 20,000 users and upload the file on a file sharing website . 6 sub domains are reported to be hacked 24 hours before and having deface page their at the time of writing. Deface Page shows that, Hacker performed the hack to show their protest against bombing by Israel on Gaza. Hacked Sites https://acn.acer.co.in/index.html https://adn.acer.co.in/index.html https://aln.acer.co.in/index.html https://asn.acer.co.in/index.html https://humanet.acer.co.in/index.html https://select.acer.co.in/index.html Mirrors of Hacks: https://www.zone-h.org/mirror/id/18681361 https://www.zone-h.org/mirror/id/18681333 https://www.zone-h.org/mirror/id/18681316 https://www.zone-h.org/mirror/id/18681313 https://www.zone-h.org/mirror/id/18681314 https://www.zone-h.org/mirror/id/18681315
THN Report : ACER hacked because of their own stupidity !

THN Report : ACER hacked because of their own stupidity !

Jun 04, 2011
THN Report : ACER hacked because of their own stupidity ! Yes ! you read right , ACER hacked because of their own stupidity. Yesterday we report that Pakistan Cyber Army hacked Acer Europe Server and 40,000 Users Data, Source Codes & Server Compromised . Today we investigate on this and try to find out that how exactly Pakistan hackers got the FTP access . Here in above image you can see the screenshot taken by us from a ASP forum of Acer-Euro. Acer ASP Support Team posted some Hot Fix Release and give FTP access to other members , so that they can download that Hot Fix. This was posted on January 11, 2008 . Pakistan hackers got this and explore the FTP and In  "PB" directory they get "Country Wise Customer Data.zip" file,  which include the 40000 users data managed according to country wise.  Now this Data breach is only because of ACER's own Stupidity. The link of Forum post is " https://asp.acer-euro.com/FORUM/Topic472-8-1.aspx ".
Recover from Ransomware in 5 Minutes—We will Teach You How!

Recover from Ransomware in 5 Minutes—We will Teach You How!

Apr 18, 2024Cyber Resilience / Data Protection
Super Low RPO with Continuous Data Protection: Dial Back to Just Seconds Before an Attack Zerto , a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data protection (CDP) to ensure all workloads have the lowest recovery point objective (RPO) possible. The most valuable thing about CDP is that it does not use snapshots, agents, or any other periodic data protection methodology. Zerto has no impact on production workloads and can achieve RPOs in the region of 5-15 seconds across thousands of virtual machines simultaneously. For example, the environment in the image below has nearly 1,000 VMs being protected with an average RPO of just six seconds! Application-Centric Protection: Group Your VMs to Gain Application-Level Control   You can protect your VMs with the Zerto application-centric approach using Virtual Protection Groups (VPGs). This logical grouping of VMs ensures that your whole applica
ACER Hacked : 40,000 Users Data, Source Codes & Server Compromised

ACER Hacked : 40,000 Users Data, Source Codes & Server Compromised

Jun 03, 2011
ACER Hacked : 40,000 Users Data, Source Codes & Server Compromised Update :  THN Report : ACER hacked because of their own stupidity This Week is Really with great UP-DOWNS in Cyber World. Mega hacks like  Sony Pictures hacked ,  Chinese Hacker Cracks 100's of Gmail accounts   , Public Broadcasting Service (PBS) Hacked , 10,000 E-mails of Iranian Government Leaked ,etc etc and lots more... Now here we have the latest Report on Huge Data breach at Server of ACER ( Europe )  acer-euro.com by well know hacking Group " Pakistan Cyber Army ". We got mail from PCA that they successfully hacked the FTP of ACER and Stole around 40,000 Users Data , Various Source Codes stored on server. For the Proof PCA provide some Screenshots of Hack : 1.) User data copied from server   2.) FTP Access on acer-euro.com   3.) 40,000 Customers data Country Wise Here is a  glimpse of  Source code Stealed : Project("{E24C65DC-7377-472B-9ABA-BC803B73C61A}") =
cyber security

Today's Top 4 Identity Threat Exposures: Where To Find Them and How To Stop Them

websiteSilverfortIdentity Protection / Attack Surface
Explore the first ever threat report 100% focused on the prevalence of identity security gaps you may not be aware of.
Theregister.co.uk , Vodafone, Telegraph, Acer, National Geographic got hacked by Turkguvenligi

Theregister.co.uk , Vodafone, Telegraph, Acer, National Geographic got hacked by Turkguvenligi

Sep 04, 2011
Theregister.co.uk , Vodafone, Telegraph, Acer, National Geographic got hacked by Turkguvenligi The Register  One of the Biggest British technology news and opinion website got hacked by Turkguvenligi . Not only this Vodafone , Telegraph , Acer , National Geographic , Ups.com  , betfair.com  also got hacked by him.  Turkguvenligi is also know with name " TG Hacker '. These hacks are done by DNS Hijacking  method. But still theregister.co.uk and other sites are accessible via the original IP address ( 68.68.20.116 ) from several places around the world. Nameserver lookup of the register has the following nameservers now: theregister.co.uk. 86129 IN NS ns4.yumurtakabugu.com. theregister.co.uk. 86129 IN NS ns2.yumurtakabugu.com. theregister.co.uk. 86129 IN NS ns1.yumurtakabugu.com. theregister.co.uk. 86129 IN NS ns3.yumurtakabugu.com. But, It should probably look something like: theregister.co.uk nameserver = ns1.theregister.co.uk theregister.co.uk nameserver = ns2.th
New Flaw in Acer Laptops Could Let Attackers Disable Secure Boot Protection

New Flaw in Acer Laptops Could Let Attackers Disable Secure Boot Protection

Nov 29, 2022
Acer has released a firmware update to address a security vulnerability that could be potentially weaponized to turn off UEFI Secure Boot on affected machines. Tracked as  CVE-2022-4020 , the high-severity vulnerability affects five different models that consist of Aspire A315-22, A115-21, and A315-22G, and Extensa EX215-21 and EX215-21G. The PC maker described the vulnerability as an issue that "may allow changes to Secure Boot settings by creating NVRAM variables." Credited with  discovering  the flaw is ESET researcher Martin Smolár, who previously disclosed  similar bugs  in Lenovo computers. Disabling Secure Boot, an integrity mechanism that guarantees that only trusted software is loaded during system startup, enables a malicious actor to tamper with  boot loaders , leading to severe consequences. This includes  granting  the attacker complete control over the operating system loading process as well as "disable or bypass protections to silently deploy their
Google announces $2.7 million Reward for hacking Chrome OS at Pwnium Contest

Google announces $2.7 million Reward for hacking Chrome OS at Pwnium Contest

Jan 27, 2014
Pwnium is the annual Hacking competition where Google invites coders from around the world to find security holes in Google Chrome. Google has announced its 4th Pwnium Hacking Contest hosted at the Canadian Security conference in March, offering more than $2.7 million in potential rewards for hacking Chrome OS-running ARM and Intel Chromebook. This year the security researchers have a choice in between an ARM-based Chromebook, the HP Chromebook 11 (WiFi) and the Acer C720 Chromebook (2GB WiFi) based on Intel's Haswell microarchitecture . The attack must be demonstrated against one of these devices running " then-current " stable version of Chrome OS. " Security is a core tenet of Chromium, which is why we hold regular competitions to learn from security researchers. Contests like Pwnium help us make Chromium even more secure ," Jorge Lucángeli Obes, Google Security Engineer said. Amongst the payouts are $110,000 for the browser or s
LIVE Webinar: Key Lessons Learned from Major Cyberattacks in 2021 and What to Expect in 2022

LIVE Webinar: Key Lessons Learned from Major Cyberattacks in 2021 and What to Expect in 2022

Mar 02, 2022
With the COVID-19 pandemic continuing to impact, and perhaps permanently changing, how we work, cybercriminals again leveraged the distraction in new waves of cyberattacks. Over the course of 2021 we saw an increase in multiple attack approaches; some old, some new. Phishing and ransomware continued to grow from previous years, as expected, while new attacks on supply chains and cryptocurrencies captured our attention. We also saw an uptick in critical Windows vulnerabilities, again proving that no matter how many vulnerabilities are found, more will always exist.  As we enter 2022, we are seeing novel attacks originating from the conflict in Ukraine, which will certainly make their way into criminal attacks on worldwide businesses. In an upcoming webinar ( register here ), Cybersecurity company Cynet will provide an in-depth review of the high-profile attacks we saw in 2021 and provide guidance to cybersecurity professionals for 2022. What are the top cyberattacks in 2021 that Cyn
Facebook Admits Sharing Users' Data With 61 Tech Companies

Facebook Admits Sharing Users' Data With 61 Tech Companies

Jul 02, 2018
Facebook has admitted that the company gave dozens of tech companies and app developers special access to its users' data after publicly saying it had restricted outside companies to access such data back in 2015. It's an unusual clear view of how the largest social networking site manages your personal information. During the Cambridge Analytica scandal revealed March this year, Facebook stated that it already cut off third-party access to its users' data and their friends in May 2015 only. However, in a 747-page long document [ PDF ] delivered to Congress late Friday, the social networking giant admitted that it continued sharing data with 61 hardware and software makers , as well as app developers after 2015 as well. The disclosure comes in response to hundreds of questions posed to Facebook CEO Mark Zuckerberg by members of Congress in April about its company's practices with data of its billions of users. The Washington Post reported that the company
Taiwanese PC Company MSI Falls Victim to Ransomware Attack

Taiwanese PC Company MSI Falls Victim to Ransomware Attack

Apr 08, 2023 Malware / Cyber Attack
Taiwanese PC company MSI (short for Micro-Star International) officially confirmed it was the victim of a cyber attack on its systems. The company said it "promptly" initiated incident response and recovery measures after detecting "network anomalies." It also said it alerted law enforcement agencies of the matter. That said, MSI did not disclose any specifics about when the attack took place and if it entailed the exfiltration of any proprietary information, including source code. "Currently, the affected systems have gradually resumed normal operations, with no significant impact on financial business," the company said in a  brief notice  shared on Friday. In a  regulatory filing  with the Taiwan Stock Exchange, it said that it's setting up enhanced controls of its network and infrastructure to ensure the security of data. MSI is further urging users to obtain firmware/BIOS updates only from its official website, and refrain from downloading
LogoFAIL: UEFI Vulnerabilities Expose Devices to Stealth Malware Attacks

LogoFAIL: UEFI Vulnerabilities Expose Devices to Stealth Malware Attacks

Dec 04, 2023 Technology / Firmware Security
The Unified Extensible Firmware Interface ( UEFI ) code from various independent firmware/BIOS vendors (IBVs) has been found vulnerable to potential attacks through high-impact flaws in image parsing libraries embedded into the firmware. The shortcomings, collectively labeled  LogoFAIL  by Binarly, "can be used by threat actors to deliver a malicious payload and bypass Secure Boot, Intel Boot Guard, and other security technologies by design." Furthermore, they can be weaponized to bypass security solutions and deliver persistent malware to compromised systems during the boot phase by injecting a malicious logo image file into the  EFI system partition . While the issues are not silicon-specific, meaning they impact both x86 and ARM-based devices, they are also UEFI and IBV-specific. The vulnerabilities comprise a heap-based buffer overflow flaw and an out-of-bounds read, details of which are expected to be made public later this week at the  Black Hat Europe conference .
Its Fail 2011 - Year of Hacks !

Its Fail 2011 - Year of Hacks !

Sep 16, 2011
Its Fail 2011 - Year of Hacks ! According to IT security experts Year 2011 have labeled as the " Year of the Hack " or " #Fail 2011 ". Hacking has become much easier over the years allowing hackers to hack into systems easier then ever before, which is why 2011 had a lot of hacking happen so far. Hackers are coming up with tools as well as finding new methods to hacking faster then companies can increase their security. Even, Every year is the year of the hacking as long as there are hackers out there ready to execute their malicious programs and attain their goals like gathering important information to the victim's computer, stealing important identities, credit card information, etc. This year 2011 could be another generation of hacking. Since every year there are always forward advancements of the tools and programs that could use by the hackers. The most important is to avoid them if you are a computer user. RSA Hack (3/17/2011) : Motive - Unknown attacker, alth
Google takes PC software fight to Mircrosoft's Windows !!

Google takes PC software fight to Mircrosoft's Windows !!

Dec 08, 2010
GOOGLE has made its most direct challenge to Microsoft with the launch of its new operating system that aims to defeat Windows. It is a battle for the future of personal computing. Users of computers running Chrome OS will be able to get online much more quickly as the system will turn on instantly and automatically log on to the web within seconds. In the first public demonstration of the software in San Francisco, Google showed that a user can be surfing the net within 60 seconds of switching on their computer. Chrome also brings users a step closer to being able to store all photographs, music and emails online rather than on a hard drive. The files would be kept in the "cloud" on the internet and be accessed from any device with an internet connection. Eric Schmidt, Google chief executive, said: "Cloud computing will define computing as we know it." The first computers running Chrome OS will be made by Acer and Samsung and
HP computers FTP hacked by HexCoder

HP computers FTP hacked by HexCoder

Jun 17, 2011
HP computers FTP hacked by HexCoder UPDATE : We have verified that this is just a anonymous FTP user access to ftp.hp.com . There is nothing like hack. Pakistani hacker HexCoder may try this to get attention. Anyway the access is available for all with : Host : ftp.hp.com Username : anonymous Password : anonymous Just Now we ( The Hacker News ) got a mail from Pakistani hacker named " HexCoder " . He Claim to hack FTP of HP computers at ftp.hp.com .  Statement about this Hack by Hacker  HexCoder, " I have done this by getting access to FTP successfully.All this by just mere stupidity!Oh and I will not share their database because its too big (9 GB) ". About a month before , ACER hacked because of their own stupidity , and this time HP computers.
Cyberwar between Israel and Turkish Hacker

Cyberwar between Israel and Turkish Hacker

Sep 06, 2011
Cyberwar between Israel  and Turkish  Hacker Turkish hacker " TurkGuvenligi " hijacked some 350 Israeli websites on Sunday evening, launching a Domain Name System (DNS) attack on at least seven high-profile websites including The Telegraph, Acer, National Geographic, UPS and Vodafone as well. Visitors to some of the sites were diverted to a page declaring it was " World Hackers Day. " Hackers calling themselves the " TurkGuvenligi group " calimd the cyber-attack. "TurkGuvenligi translates as " Turkish security. " " The hack represents a 10%-15% spike compared to the average number of daily hacks of Israeli websites ," Shai Blitzblau, head of Maglan-Computer Warfare and Network Intelligence Labs, explained. Israel's military and security establishment has invested significantly in cyber-warfare programs in recent years and is considered one of the most advanced cyber-warfare forces in the world, both in attack and defense modes.T
CIO said - London Olympics Will Be 'ready' For Cyber-attacks !!

CIO said - London Olympics Will Be 'ready' For Cyber-attacks !!

Jan 21, 2011
London Olympics will be well prepared for attempted cyber attack, according to CIO Gerry Pennell London 2012. Speaking in London to start in 2012, and Atos Origin IT testing organization, Technology Lab, Pennell said the attacks at the Olympics - is also trying to overthrow the Games, to influence the results data and DDoS attacks on the pages of the event - were predictable. The former interior minister David Blunkett has also felt the impact of cyber attacks at the Olympics in 2009. Pennell said: "We have cyber attacks, certainly the previous games have always been attacked, then we will be attacked .. "We work with partners and government to ensure that we have the right of defense." With access to the laboratory of Technology, Atos and London of 2012 was 200 000 to start testing the entire Olympic Games IT infrastructure that is flexible, adaptable to change and secure. For example, scenarios such as computer room fire, or a virus, will be tested in real t
Smartphone wireless chipset vulnerable to DoS attack

Smartphone wireless chipset vulnerable to DoS attack

Oct 25, 2012
Security researcher Andres Blanco from CoreSecurity discovered a serious vulnerability in two Wireless Broadcom chipsets used in Smartphones. Broadcom Corporation, a global innovation leader in semiconductor solutions for wired and wireless communications. Broadcom BCM4325 and BCM4329 wireless chipsets have been reported to contain an out-of-bounds read error condition that may be exploited to produce a denial-of-service condition. Other Broadcom chips are not affected. The CVE ID given to issue is  CVE-2012-2619 . In advisory they reported that this error can be leveraged to denial of service attack, and possibly information disclosure. An attacker can send a RSN (802.11i) information element, which causes the Wi-Fi NIC to stop responding. Products containing BCM4325 chipsets: Apple iPhone 3GS Apple iPod 2G HTC Touch Pro 2 HTC Droid Incredible Samsung Spica Acer Liquid Motorola Devour Ford Edge (yes, it's a car) Products containing BCM4329 chipsets: Apple iPhone 4 Ap
The Hacker News Hacking Awards : Best of Year 2011

The Hacker News Hacking Awards : Best of Year 2011

Dec 31, 2011
The Hacker News Hacking Awards : Best of Year 2011 2011 has been labeled the " Year of the Hack " or " Epic #Fail 2011 ". Hacking has become much easier over the years, which is why 2011 had a lot of hacking for good and for bad. Hackers are coming up with tools as well as finding new methods for hacking faster then companies can increase their security.  Every year there are always forward advancements in the tools and programs that can be used by the hackers. At the end of year 2011 we decided to give " The Hacker News Awards 2011 ". The Hacker News Awards will be an annual awards ceremony celebrating the achievements and failures of security researchers and the Hacking community. The THN Award is judged by a panel of respected security researchers and Editors at The Hacker News. Year 2011 came to an end following Operation Payback and Antisec, which targeted companies refusing to accept payments to WikiLeak's, such as, Visa and Amazon. Those attacks were carrie
Cybersecurity Resources