New York tries to force phone makers to put in crypto backdoors

The sport of holding Apple, Google and other tech companies over a barrel to demand backdoors now has a new player: New York. The state assembly has come up with a proposed bill that would ban encrypted mobile phones and slap manufacturers with a $2,500 fine per phone sold in the state of New York […]

Real-world hackers can 3D-print your keys

One thing you might not know about hackers is that besides cracking some virtual systems many of them are fond of hacking real world stuff as well. One thing of particular interest for them is naturally locking systems. For instance, lockpicking contests and related talks are a common thing at hacker conferences such as DEF […]

Security firm sued for filing “woefully inadequate” forensics report

Hacked casino operator alleges breach continued while Trustwave was investigating. A Las Vegas-based casino operator has sued security firm Trustwave for conducting an allegedly “woefully inadequate” forensics investigation that missed key details of a network breach and allowed credit card thieves to maintain their foothold during the course of the two-and-a-half-month investigation. In a legal […]

Cryptsy Bitcoin Trader Robbed, Blames Backdoor in the Code of a Wallet

The stolen Bitcoin & Litecoin were worth over $5.7 million. Cryptsy, a website for trading Bitcoin, Litecoin, and other smaller crypto-currencies, announced a security incident, accusing the developer of Lucky7Coin of stealing 13,000 Bitcoin and 300,000 Litecoin, which at today’s rate stands more than $5.7 million / €5.2 million. According to a blog post penned by […]

Anonymous Exposes 1GB Data Belonging to Thailand’s Supreme Court

Ten days ago Anonymous launched operation #BoycottThailand and on the tenth day, the notorious hacktivist group had released 1GB data. The data reportedly belongs to the Supreme Court of Thailand. It seems like the data, which was uploaded yesterday, was stolen last Wednesday when the Anonymous launched DDoS attacks against hundreds of Thai court websites. […]

How To Unlock Google Maps’ New Hidden Driving Mode 

Short Bytes: Call it a bug or an updated feature of the Google maps, now with the updated version of Google maps, without entering the destination, Google maps will suggest you things like nearby hotels, gas stations etc. This feature has not been released publicly but it is expected to come to your mobile soon. […]

Suspected MegalodonHTTP DDoS botnet author arrested

Security firm Damballa says that when computer crime cops in Norway arrested five men last month in a joint operation with Europol, one of them was the creator of the MegalodonHTTP botnet used to launch distributed denial-of-service (DDoS) attacks against websites. At the time of the arrest by Norway’s Kripos national criminal investigation service, little […]

Nuclear Power Plants Are The Next Easy Target Of Hackers All Over The World

Image: NTI Nuclear Security Index Short Bytes: Today, we are at a crossroads on nuclear security and the emerging threats in the form of cyber attacks and nuclear terrorism. Bur, our nuclear plants have failed to add necessary security measures to handle the cyber threats and potential security breaches. Based upon the two latest security […]

Faithless Website Breached via SQL Injection, Fans Data Stolen

Data for 18,000 users stolen in the incident. The website of the Faithless British EDM band has been breached and the personal information of over 18,000 fans stolen by a yet unknown assailant,The Independent reports after being notified by cyber-security vendor CyberInt. Last September, CyberInt security experts discovered a listing on the Dark Web containing a database […]

OpenSSH Patches Critical Flaw That Could Leak Private Crypto Keys

OpenSSH today released a patch for a critical vulnerability that could be exploited by an attacker to force a client to leak private cryptographic keys. The attacker would have to control a malicious server in order to force the client to give up the key, OpenSSH and researchers at Qualys said in separate advisories. Qualys’ security […]

Nuclear Power Plants From All Over the World Are Vulnerable to Cyberattacks

A large number of countries aren’t prepared to deal with cyberattacks on their nuclear energy system. By coincidence, two studies were released yesterday that put more light on the sorry state of cyber-security protocols used in nuclear power plants that fail to protect these crucial infrastructure points against cyberattacks. The first study is an audit […]

How Your Webcam Can Become Your Worst Nightmare

A group of security researchers turned a working webcam into a backdoor allowing attackers to remotely connect themselves with the device. The dangers of hackable Internet of Things (IoT) devices are various and wide-ranging and it is becoming more and more likely that such devices get hacked through some simple engineering skills. Recently, the Vectra Networks researchers […]

Verizon Aiding Crooks By Routing Millions of IP Addresses?

A research group has accused Verizon of helping crooks and cyber criminals of aiding in their activities by routing over four million IP addresses through their network. Verizon has been featuring in news headlines for all the wrong reasons lately. In the latest event, a secret report published by The Spamhaus Project has accused Verizon of aiding hackers […]

Ex-NSA Chief Defends End-to-End Encryption. Isn’t It Surprising?

Short Bytes: Your perception about NSA might change a little after reading the statement by a former director of NSA, General Michael Hayden, where he is trying to see some value in the personal data. He defended end-to-end encryption by calling it good for America. NSA talking about the data privacy? Does not look absurd? […]

How to watch YouTube videos in the background on your mobile

People using YouTube love to hear music even if they turn off the screen or in the background on your smartphone. At present YouTube hasn’t released such feature to it’s app in Android or iOS. Download and install Mozilla browser on your Android device. Open YouTube website in Mozilla browser. Go to settings page and […]

The Silk Road’s Dark-Web Dream Is Dead

NOT SO LONG ago, the Silk Road was not only a bustling black market for drugs but a living representation of every cryptoanarchist’s dream: a trusted trading ground on the Internet where neither the government’s laws nor the Drug War they’ve spawned could reach. Today, that illicit narco-utopia is long gone, its once-secret server in […]

When URL Shorteners and Ransomware Collide

We are all very familiar with URL shortening services, which are regularly used in Tweets and other social media. It is no secret that cyber criminals also use URL shorteners to aid them in achieving their objectives. URL shorteners are often used by cyber criminals to obfuscate redirects to malicious destinations. Recently, a URL shortening service […]

A Home-made Open Source Ransomware Is Destroying User’s Files

Short Bytes: A home-made ransomware open source code on GitHub, which was supposed to work for the educational purposes, has spread in the wild. It seems that the intention of the maker was something different along the way. Hidden Tear ransomware was open-sourced by a Turkish security group Otku Sen. This ransomware infects users by encrypting their […]