156 Results for



Stolen Twitter handle @N returned to hijacking victim

A coveted username lost to a hijacker last month is returned to its rightful owner.

By Feb. 25, 2014


Microsoft warns of new Trojan hijacking Facebook accounts

Malware focusing on the social network's users in Brazil masquerades as a legitimate Google Chrome extension and Firefox add-on.

By May. 12, 2013


SIM card flaw said to allow hijacking of millions of phones

Vulnerability in the security key that protects the card could allow eavesdropping on phone conversations, fraudulent purchases, or impersonation of the handset's owner, a security researcher warns.

By Jul. 21, 2013


Yahoo Mail hijacking exploit selling for $700

XSS vulnerability allows attacks to steal and replace tracking cookies, as well as read and send e-mail from a victim's account.

By Nov. 26, 2012


Face.com plugs Facebook, Twitter hijacking hole

Researcher works with companies to close hole that allowed anyone to hijack KLIK user's accounts on Facebook and Twitter.

By Jun. 19, 2012


Seven accused in $14 million click-hijacking scam

Six Estonians were arrested and a Russian is sought in connection with scheme that spread malware that redirect Web searchers to sites and ads that paid them money.

By Nov. 9, 2011


Clickjacking: Hijacking clicks on the Internet

Security researcher warns that clicking on the Web may not always take you where you want to go.

By May. 22, 2009


Start-up picks new Web address after hijacking

After concluding the dispute resolution process is too slow and expensive, Lissn has moved to a new Internet domain after its old one was hijacked.

By Jul. 27, 2011


Ex-SF tech convicted of hijacking city network

Former San Francisco network administrator faces five-year sentence after being found guilty of felony charge of denying computer access.

By Apr. 27, 2010


FBController allows for hijacking of Facebook accounts

A new tool dubbed "FBController" is designed to allow people to take control over Facebook accounts with just the cookie data, and could allow attackers to manage multiple hijacked accounts.

By May. 6, 2009