Browsing author

root

Spike in Malvertising Attacks Via Nuclear EK Pushes Ransomware

We’ve been monitoring a malvertising campaign very closely as it really soared during the past week. The actors involved seem to be the same as the ones behind the self-sufficient Flash malverts/exploits we’ve documented before and reported by security researcher Kafeine (Spartan EK). One single domain (easy-trading.biz) is relaying all traffic to other ‘ad networks’ and ultimately to […]

Tor Hires a New Leader to Help It Combat the War on Privacy

THE TOR PROJECT is entering a crucial phase in its nearly 10-year existence. In the wake of the Edward Snowden leaks, it has assumed a higher profile in the world of privacy and security than ever before. But it’s also come under increased attack by governments out to demonize it, and by law enforcement and […]

The Anonymous GitHub Clone That Runs on the Dark Web

Meet Jeff Becker and his creation: git.psi.i2p. Lots of people seek anonymity these days, for various reasons, may it be because of abusive governments, because of a personal preference, or because they are in the middle of not-so-legal operations. For these type of people Tor, and most recently I2P, have been some of their best friends. […]

16 Futuristic Predictions Made By Microsoft For 2016

Short Bytes: Every year we see the rise of new technologies that change the shape of the world. Microsoft has made some futuristic predictions related to the technology world. These predictions range from AI to big data, cryptography to machine learning, and quantum computing to economic predictions. Microsoft is a company that believes in building innovative things and […]

Anonymous Hackers Launch Attack Against Donald Trump #OpTrump

Short Bytes: Warning the Republican presidential candidate Donald Trump, Anonymous has said, “Donald Trump, think twice before you speak anything. You have been warned.” The collective has posted a video online that highlights Trump’s nonsense statements that helping ISIS indirectly.  The Republican presidential candidate Donald Trump is the next target of Anonymous hacktivist collective. This […]

Anonymous ‘Trolls ISIS’ with Memes and Photoshopped Images

Earlier this week Anonymous announced that the group will not only conduct cyber attacks against ISIS but also troll them with additional humor on 11th December. Anonymous also urged people from around the world to join the hacktivist group, post memes and photoshopped images of the terrorist group to annoy the supporters and the sympathizers of the so-called Islamic State terrorist group. […]

Steam Vows To Protect Gamers’ Accounts Amid 70k Data Theft

According to the latest blog post from Valve, there are 77,000 Steam accounts hacked each month. But, this is something the company has been facing from day one. The blog post revealed how badly Valve has failed to protect its customers. Especially, from the time they started Steam trading four years back. There has been […]

Anonymous Knockoff Donald Trump’ Website Against Anti-Muslim Speech

Remember a couple of months ago a hacker defaced Donald Trump’s official website with a tribute message for Jon Stewart? — Now Anonymous has done the same but with a DDoS attack. The online hacktivist group Anonymous has conducted a powerful DDoS attack on one of the Donald trump’s website for Trump Tower New York “trumptowerny.com” […]

FireStorm: Severe Security Flaw Discovered in Next Generation Firewalls

BugSec Group and Cynet discovered a severe vulnerability in Next Generation Firewalls. Head of Offensive Security Stas Volfus uncovered the vulnerability, code-named FireStorm, which allows an internal entity or malicious code to interact and extract data out of the organization, completely bypassing the firewall limitation. It was discovered that the firewalls are designed to permit […]

British spooks ‘could hack into children’s toys for spying’

Tech expert warns that ‘smart toys’ could be hacked in to under powers being proposed in draft Investigatory Powers Bill. Britain’s intelligence agencies could take over children’s toys and use them to spy on suspects, MPs have been told. Antony Walker of techUK said that anything connected to the Internet could “in theory” be hacked […]

MIT Develops Secure SMS System, Even More Anonymous Than Tor

Short Bytes: Researchers at MIT have developed MIT Secure SMS system called Vuvuzela which is more secure than Tor anonymous system. This invention was made after the MIT researchers made a pattern discovery in the Tor system about the traffic pattern of the data.  Recently the researchers from MIT analyzed the patterns of packet directions […]

Microsoft Wants To Teach You How To Use Linux With Its New Certification Program

Image: Microsoft Short Bytes: Few years ago, Linux and Microsoft were fierce enemies as Redmond railed against the open source software. However, the tech giant has softened its approach and showed its love for Linux at many occasions in recent past. Along the similar lines, Microsoft has just offered a certification program that’ll teach you how to […]

APT Group Upgrades Malware from the Black Market into Dangerous Backdoor

Cyber-espionage group targeted companies in Asia. Details about the operations of a new cyber-espionage group are emerging, and this gang has been buying malware from the black market and evolving it into powerful and undetectable backdoors. The group, dubbed Shrouded Crossbow by Trend Micro’s researchers, has been extremely active since 2010, when the first signs of […]

New Spy Banker Trojan Telax abusing Google Cloud Servers

Introduction Zscaler ThreatLabZ has been closely monitoring a new Spy Banker Trojan campaign that has been targeting Portuguese-speaking users in Brazil. The malware authors are leveraging Google Cloud Servers to host the initial Spy Banker Downloader Trojan, which is responsible for downloading and installing Spy Banker Trojan Telax. The attackers are using social engineering tactics, […]

Project Uses 3D Printing For Visually Impaired “See” Artwork For The First Time

Imagine hearing about the mysterious smile of the Mona Lisa, the surrounding Klimt kiss or Van Gogh’s famous Sunflowers without ever getting to know what they really look like. For visually impaired, access to visual artworks is not simple – an option offered by some museums are descriptive guided tours, in which images are “translated” […]