Court Orders Facebook to Stop Tacking Non-Users or Pay €250K Fine Daily

A Belgian court has ordered Facebook to stop tracking internet users within next 48 hours or they will impose fines of up to 250,000 euros per day. An Appeal was made by Belgian’s privacy watchdog to the court in June regarding Facebook’s tracking of users, who are not even the part of the social network, […]

Researchers Expose Iranian Phishing Servers Targeting Opposition

A group of researchers from Checkpoint Security firm claimed that they have breached phishing servers that were used by the Rocket Kitten. Rocket Kitten is a group of hackers who are believed to be working in cahoots with the Iranian government. Rocket Kitten came into the spotlight in April 2014 and were unmasked in May […]

Hackers Infect British Parliament Computers with Ransomware

Cyber cooks breached the security of British parliament’s secure network and hacked into many of its computer systems. The hack allowed the hackers to leak several confidential documents in relation to MP for NewCastle upon Tyne Central, Chi Onwurah and her employees. This is one of the first successful attacks on the parliament’s secure network […]

Comcast resets nearly 200,000 passwords after customer list goes on sale

Over the weekend, a reader (@flanvel) directed Salted Hashto a post on a Dark Web marketplace selling a number of questionable, if not outright illegal goods. The post in question offered a list of 590,000 Comcast email addresses and corresponding passwords. As proof, the seller offered a brief list of 112 accounts with a going […]

This 9-Year-Old Boy Is An Accomplished Hacker And CEO Of A Company

Short Bytes: Reuben Paul is a cybersecurity expert who lives in Austin, Texas, and attends third grade. He is the CEO of his own company Prudent Games and recently attended the Ground Zero Summit as a ‘special ambassador.’ His name is Reuben Paul and he’s just 9 years old. This third grader is already an […]

KilerRat: Taking over where Njrat remote access trojan left off

This remote access trojan (RAT) has capabilities ranging from manipulating the registry to opening a reverse shell. From stealing credentials stored in browsers to accessing the victims webcam. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread utilizing physic devices, such as USB drives, […]

Man Hacks Norwich International Airport Website for Passengers Safety

A hacker going by the handle of His Royal Gingerness (HRG) hacked into the official website of Norwich International Airport last month after sending several warning emails to the airport staff to fix vulnerability on their site. In a YouTube video uploaded on 8th November 2015 the hacker explained everything about the hack, ie. how […]

High-Risk SAP HANA Vulnerabilities Patched

Critical business applications such as SAP and Oracle ERP products process and store the Fortune 2000’s most critical data, yet spur relatively little concern when it comes to security vulnerabilities. That trend seems to be reversing itself, given the spate of disclosures and high-profile vulnerabilities that have been patched in the past year. Today, researchers […]

Canonical Patches Linux Kernel Vulnerability in Ubuntu 15.10, 15.04, 14.04 and 12.04 LTS

All Ubuntu users are urged to update as soon as possible. Canonical has just published four Ubuntu Security Notices that detail a recent Linux kernel vulnerability discovered in the kernel packages of all of the supported Ubuntu operating systems. It has been discovered that Linux kernel’s KVM (Kernel-based Virtual Machine) hypervisor implementation didn’t correctly caught Alignment […]

NSA claims it shares 91% of security flaws with its manufactures

NSA discloses 91 percent of the zero-day bugs it finds in the online systems to its manufacturers while it keeps the 9 percent to itself. This information was disclosed to defend the agency’s bug disclosure policies, according to reports from Reuters. NSA has been heavily criticized since Snowden‘s leaks and many questions have been posed to the […]

Scammers Trying to Steal Apple IDs with Sophisticated Phishing Scam

The best tool for cyber criminals with limited social engineering skills is tricking users into phishing scams and it doesn’t matter if the users are on a Mac, Linux or Windows OS, and that’s what’s been going on in the scam we are about to discuss. In this phishing campaign, Comodo researchers found out that […]

Parliament HACKED: Sensitive data STOLEN, used to hold MP to ransom

CYBERTHIEVES hacked into the parliament’s secure computer network and used sensitive files to hold an MP to ransom, it has been revealed. Cybercrooks hacked into parliament’s secure network and compromise several computers,The Times has claimed. The hackers unearthed confidential documents relating to MP for Newcastle upon Tyne Central, Chi Onwurah – the shadow digital minister […]

Russian Engineers Create “USB Killer 2.0” To Protect Your Data

Short Bytes: Rusian engineers have created an ultimate data security device for you as a last line of defence. A USB Killer that would electrocute your USB ports and can even destroy your PC’s motherboard! Would you like to buy one? Well, there are times when you can’t differentiate between a mad imagination or a […]

Linux Systems Are Responsible for 50% DDoS Attacks in Past 3 Months

Short Bytes: DDoS attacks are targeting the networks and websites all over the world relentlessly. In the past three mnths, there has been more than 100% rise in the DDoS attacks and Linux-powered machines are becoming a bigger player. Distributed denial of service (DDoS) attacks are one of the most popular cyberthreats faced by the […]

Oz submarine bidders paper over hack attacks, deliver tenders by hand

Report: Germany, France, Japan contract hopefuls spotted multiple attacks. Hacking attempts are forcing bidders in Germany, France, and Japan for Australia’s A$50 billion submarine contract to rely on hand-delivery for sensitive information. The attacks are merely repeat attempts and there is no evidence so far of any breach, The Australianreports. Previously suspected but unreported, the […]

54,000 Twitter accounts hacked by Cyber Caliphate; Is anyone safe at all?

Daesh’s cyber squad hacks over 54,000 Twitter accounts In the current era, there is no such thing that we have come across that can be termed unhackable. This makes things very dangerous indeed and in the pursuit of revenge, individuals can resort to extremes. On this occasion, a group called Cyber Caliphate, which was led […]

Microsoft: “We Want To Create A World Without Passwords”

Short Bytes: Windows 10 comes with better options to keep an eye on your devices and ensure that your every work session was a secure one. Windows Hello is one such feature that adds the biometric security layer to your digital life. Microsoft’s Windows operating system powers millions of computers all over the world and […]

The Infernal-Twin tool, easy hacking wireless networks

The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to automate the Evil Twin Attack. The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to assess wireless security by automating the Evil Twin Attack. “The tool was created to help the auditors and penetration testers […]