OpenSSH Patches Critical Flaw That Could Leak Private Crypto Keys

OpenSSH today released a patch for a critical vulnerability that could be exploited by an attacker to force a client to leak private cryptographic keys. The attacker would have to control a malicious server in order to force the client to give up the key, OpenSSH and researchers at Qualys said in separate advisories. Qualys’ security […]

Nuclear Power Plants From All Over the World Are Vulnerable to Cyberattacks

A large number of countries aren’t prepared to deal with cyberattacks on their nuclear energy system. By coincidence, two studies were released yesterday that put more light on the sorry state of cyber-security protocols used in nuclear power plants that fail to protect these crucial infrastructure points against cyberattacks. The first study is an audit […]

How Your Webcam Can Become Your Worst Nightmare

A group of security researchers turned a working webcam into a backdoor allowing attackers to remotely connect themselves with the device. The dangers of hackable Internet of Things (IoT) devices are various and wide-ranging and it is becoming more and more likely that such devices get hacked through some simple engineering skills. Recently, the Vectra Networks researchers […]

Verizon Aiding Crooks By Routing Millions of IP Addresses?

A research group has accused Verizon of helping crooks and cyber criminals of aiding in their activities by routing over four million IP addresses through their network. Verizon has been featuring in news headlines for all the wrong reasons lately. In the latest event, a secret report published by The Spamhaus Project has accused Verizon of aiding hackers […]

Ex-NSA Chief Defends End-to-End Encryption. Isn’t It Surprising?

Short Bytes: Your perception about NSA might change a little after reading the statement by a former director of NSA, General Michael Hayden, where he is trying to see some value in the personal data. He defended end-to-end encryption by calling it good for America. NSA talking about the data privacy? Does not look absurd? […]

How to watch YouTube videos in the background on your mobile

People using YouTube love to hear music even if they turn off the screen or in the background on your smartphone. At present YouTube hasn’t released such feature to it’s app in Android or iOS. Download and install Mozilla browser on your Android device. Open YouTube website in Mozilla browser. Go to settings page and […]

The Silk Road’s Dark-Web Dream Is Dead

NOT SO LONG ago, the Silk Road was not only a bustling black market for drugs but a living representation of every cryptoanarchist’s dream: a trusted trading ground on the Internet where neither the government’s laws nor the Drug War they’ve spawned could reach. Today, that illicit narco-utopia is long gone, its once-secret server in […]

When URL Shorteners and Ransomware Collide

We are all very familiar with URL shortening services, which are regularly used in Tweets and other social media. It is no secret that cyber criminals also use URL shorteners to aid them in achieving their objectives. URL shorteners are often used by cyber criminals to obfuscate redirects to malicious destinations. Recently, a URL shortening service […]

A Home-made Open Source Ransomware Is Destroying User’s Files

Short Bytes: A home-made ransomware open source code on GitHub, which was supposed to work for the educational purposes, has spread in the wild. It seems that the intention of the maker was something different along the way. Hidden Tear ransomware was open-sourced by a Turkish security group Otku Sen. This ransomware infects users by encrypting their […]

Re-Booted Hell Hacking Forum on Dark Web Hacks Car Breathalyzers Manufactures

It has now been proven that almost anyone and any company can get hacked including the firm that manufactures car breathalyzers. A hacker dubbed as ROR[RG] reportedly hacked into LMG Holdings’ data and dumped some of its internal documents on Dark Web. The hacker acts as the moderator of the newly re-booted Hell hacking forum. Among […]

STEAL YOUR WI-FI KEY FROM YOUR DOORBELL? IOT WTF!

The Ring is a Wi-Fi doorbell that connects to your home Wi-Fi. It’s a really cool device that allows you to answer callers from your mobile phone, even when you’re not home. It’s one of the few IoT devices we’ve looked at that we might even use ourselves. It acts as a CCTV camera, automatically […]

Anonymous Takes Down Nissan’s Website Against Illegal Whale Hunting In Japan

Short Bytes: With changing times, the international community has banned the whale hunting practice. However, it’s a common knowledge that Japanese people call whale meat their “nostalgia food” as it connects them to their culture and heritage. As a protest against Japan’s stance on whale hunting, Anonymous hacking collective has taken down Nissan’s website to put […]

Shoddy Ransomware Destroys User’s Files

A ransomware strain based on the open source Hidden Tear ransomware is infecting users, encrypting their files and losing the encryption key along the way, rendering all files unrecoverable. Last August, Turkish security group Otku Sen open-sourced on GitHub the code of a home-made ransomware they’ve created for educational purposes. This particular ransomware was named […]

Kingston’s DataTraveler 2000 Provides Undisputed Security and Encryption

A new USB device series has been launched by Kingston aiming to provide secure and tamper-proof thumb drive to IT professionals while on the go. Kingston DataTraveler 2000 has been created for offering top-notch security to crucially important files that require transportation from one place to another or for preventing unauthorized employees from checking out […]

8 Most Awesome Hacks Conducted By Anonymous Hackers

According to researchers, Anonymous hacktivists group is relatively much bigger than you anticipated and become quite popular among people all over the world. News about their existence first became public on social media, with members shown flaunting Guy Fawkes masks. It was all quite fitting, with the group calling themselves Anonymous and wearing such masks in all […]

Teen Who Hacked CIA Email Is Back to Prank US Spy Chief

One of the “teenage hackers” who broke into the CIA director’s AOL email account last year hasn’t given up targeting government intelligence officials. His latest victim is the Director of National Intelligence James Clapper, Motherboard has learned. A group of hackers calling themselves “Crackas With Attitude” or CWA made headlines in October, hacking into CIA […]

Google hacker criticized TrendMicro for critical flaws

A hacker with Google Project Zero research team, publicly disclosed critical vulnerabilities in the TrendMicro Antivirus. Tavis Ormandy, a researcher with Google’s Project Zero vulnerability research team, publicly disclosedcritical vulnerabilities in TrendMicro Antivirus that could be exploited to execute malicious code on the targeted system. Ormandy took only about 30 seconds to find the first […]

Black Hat SEO Campaign Leverages SQL Injections to Boost Search Rankings

A new type of black hat SEO campaign has been uncovered in the last few months by Akamai’s experts, who have observed that an attacker is using SQL injection flaws to deface websites with hidden content, specifically aimed at improving his website’s SEO ranking. The campaign has targeted around 3,800 different websites, hosted on 348 […]