Dangerous “Breaking Bad” Ransomware is Completely Undetected By Antivirus Products

Short Bytes: The recently discovered Breaking Bad ransomware remains undetected by the majority of the 57 security products listed on Google’s VirusTotal antivirus aggregator. Know more about how it works. The security threats are increasing as more number of machines are going online. Along with the regular malware and trojans, ransomware threat too is on the […]

Stagefright 2.0 Vulnerabilities Affect 1 Billion Android Devices

When researcher Joshua Drake published details in August about critical Android vulnerabilities in the Stagefright media playback engine, he promised there would be more issues that he and others would find an report to Google’s Android security team. Today, Drake, vice president of platform research and exploitation at Zimperium, disclosed two more flaws in Stagefright, […]

Car-Hacking Tool Turns Repair Shops Into Malware ‘Brothels’

the security research community has proven like never before that cars are vulnerable to hackers—via cellular Internet connections, intercepted smartphone signals, and even insurance dongles plugged into dashboards. Now an automotive security researcher is calling attention to yet another potential inroad to a car’s sensitive digital guts: the auto dealerships that sell and maintain those […]

Russian hackers tried to infiltrate Hillary Clinton’s home server

Hackers with links to Russia tried to infiltrate Hillary Rodham Clinton’s home e-mail server at least five times — even as other e-mails show her making cavalier jokes about Chinese hackers, according to the latest e-mails released by the State Department. The scammers sent Clinton five infected e-mails disguised as New York speeding tickets on […]

FBI: We unmasked and collared child porn creep on Tor with spy tool

Dark-web deadbeats may not be as anonymous as they think. A bloke in the US was charged on Friday after FBI spyware caught him downloading child sex abuse material. Luis Escobosa, of Staten Island, admitted to Feds he broke federal child pornography laws by viewing depraved photos on a hidden Tor service. Unknown to Escobosa, […]

Learn to Code Windows 10 Apps: Microsoft’s Free Course for Beginners

Short Bytes: Microsoft has launched a free course to teach you how to code Windows 10 Universal Apps using C#. Take a look. The Universal Windows Platform from Microsoft is something that allows you to develop cross-platform apps for multiple devices- ranging from Windows Phone, Windows 10 PCs, Xbox to Raspberry Pi and HoloLens. This […]

Tesla Model X Has A Crazy Bio-weapon Defence Mode Button

Short Bytes: New Tesla Model X has a bio-weapon defense air mode that will give you a hospital level air quality inside the SUV, according to Elon Musk. Tesla CEO Elon Musk has finally introduced the company’s latest addition to its electric car fleet: the Model X. This new Tesla car is an all-electric SUV […]

Apple Gatekeeper Bypass Opens Door for Malicious Code

Gatekeeper is Mac OS X’s guardian against rogue applications and malware sneaking into Apple’s famous walled garden. It’s also been a favorite target of researchers and advanced attackers desperate to gain control of Apple devices. Tomorrow at Virus Bulletin in Prague, researcher Patrick Wardle, director of research at Synack, will demonstrate a Gatekeeper bypass he’s […]

Donald Trump Hotels Data Breach Incident Confirmed

In a previous article, we brought you news of Trump Hotels being breached by hackers.  To update,  we can now report that Trump Hotels have accepted and confirmed a breach did take place. During May 2014- June 2015, 7 of the hotels in the Trump Hotels group (owned by US Presidential candidate Donald Trump) suffered […]

How to Protect Your Wi-Fi Router From Hacking Using Simple Tricks

Short Bytes: The humble wireless router in your home, as you might not think, could be the biggest loophole in your personal cyber security measures. Read the article to know simple ways to protect your Wi-Fi router. These are the times when anything and everything digital is prone to hack. From ATMs to connected cars, […]

WinRAR Exposed to Dangerous Vulnerability: Attack Just by Unzipping Files

Short Bytes: The latest WinRAR SFX v5.21 update has a serious vulnerability that allows remote attackers to execute any malicious code on your system. The latest release of the WinRAR software has been discovered with a serious flaw. As you unzip the SFX archive inside the RAR file, WinRAR a widely used software used to compress […]

Microsoft Exchange Server Fixed Against Information Disclosure Bug

Vulnerability allowed hackers to hijack active user sessions.Microsoft Exchange Server has been recently patched to fix an important security vulnerability which would have allowed attackers to gain access to active Webmail sessions via an easy to exploit flaw. The vulnerability was found in Outlook Web Access (OWA) in Microsoft Exchange Server 2013, and allows any […]

XOR DDoS Attack Tool Being Used to Launch Over 20 Daily Attacks

Threat actors are using a previously discovered distributed denial-of-service (DDoS) attack tool dubbed XOR DDoS to launch upwards of 20 DoS attacks a day against targets in Asia and other parts of the world, new research showed. A High-Bandwidth DDoS Attack The attacks have ranged in bandwidth from less than 10 Gbps to over 150 […]

This New Linux Trojan Launches Deadly DDoS Attacks at 150+ Gpbs

Short Bytes: As more and more Linux systems are going online, the threat to the once-secure Linux systems is increasing. In a similar development, a new Trojan variant dubbed XOR DDoS is launching heavy DDoS traffic on Linux machines. A massive Trojan malware is out in the wild that cripples the Linux machines by launching […]

Edward Snowden Joins Twitter, Stays Classy, Follows the NSA

The NSA whistleblower Edward Snowden has finally joined Twitter and within a few hours he has earned a verified badge along with more than 930k followers. Yes, the man who changed the way people used to think about Internet privacy is available for interaction on Twitter and you can follow Snowden at @Snowden. In the About […]

SAP Patches 12 SQL Injection, XSS Vulnerabilities in HANA

SAP patched a dozen holes in its in-memory management system, HANA, that could have led to SQL injection attacks, cross-site scripting (XSS) errors, and memory corruption vulnerabilities. Many of the bugs were addressed by the company months ago, but it wasn’t until Tuesday that Onapsis, the security firm that dug up the vulnerabilities, disclosed them. […]

Intended crucifixion of Ali Mohammed al-Nimr Compels Anonymous to Target Saudi Websites

Saudi Arabia’s Government’s decision to crucify Mohammed al-Nimr has prompted a strong response from the Hacktivist group Anonymous when various significant Saudi government websites were hacked to show protest over this decision.  Mohammed al-Nimr was arrested on the charges of involvement in alleged anti-government activities when he was 17-years old.  Critics and campaigners allege that the government is unnecessarily targeting al-Nimr just […]

Blackphone 2 Could Be the Most Secure Android Phone Ever, And It’s Now On Sale

Short Bytes: To address your privacy concerns, Silent Circle has tried to create the super-secure Android phone and its newest model Blackphone 2 is now available. Google is continuously bashed for its shady security measures in the Android OS. Recently discovered Stagefright bug exposed millions of devices and it prompted the Android maker to release […]