Browsing author

root

Kudos! Microsoft Does It Once Again

Short Bytes: Microsoft, long known for harbouring different kinds of malware, this time, “unveils” bootkit, a malware which loads even before the Windows loads itself up. Formatting of drive and uninstallation does not work against it. This malware is targeting financial institutes to fiddle around with their high-valued data. Microsoft, a fun playground for the feather-capped […]

MALWARE ANALYSIS – DRIDEX & PROCESS HOLLOWING

Lately the threat actors behind Dridex malware have been very active. Across all the recent Dridex phishing campaigns the technique is the same. All the Microsoft Office documents containembedded macros that download a malicious executable from one of many hard coded URLs. These hard coded URLs normally point to websites owned by legitimate people. The site […]

Apple Patches 50 Vulnerabilities Across iOS, OS X, Safari

Apple has piled on the patches already released by Adobe and Microsoft today, and pushed out updates for iOS, OS X, Apple TV, Safari, and it’s watch-based operating system watchOS this afternoon. Fifty-four vulnerabilities across OS X were patched Tuesday, including fixes for Mavericks v10.9.5, OS X Yosemite v10.10.5, and the most recent builds of OS […]

Internet’s root servers take hit in DDoS attack

The internet’s root servers came under a concerted distributed denial of service (DDoS) attack last week that effectively knocked three of the 13 critical pillars of the internet offline for several hours. The attack came just days before the Janet academic network received a similar DDoS attack. According to a first analysis of the root […]

New Facebook Phishing Scam Targets Page Admins

A recent Facebook phishing scam asks users on the social media giant to verify their page because a suspected page forgery was detected — However, it’s a sophisticated scam. Facebook and phishing scams have an ultimate connection for life. Every day thousands of users around the world lose their accounts due to lack of awareness about such […]

Security Flaw in Honeywell Gas Detectors Can Virtually Kill People

After hacking nuclear plants, Refrigerator, House Arrest Ankle Bracelet, Smartphones GPS Signals, Electronic Skateboards, Driverless Cars, Jeep, Computer Controlled Sniper Rifle and Jeep Cherokee etc, it is now time for hackers to exploit the remote hacking security flaw in gas detectors. According to the ICS-CERT advisory, gas detector manufactured and sold by a US-based firm “Honeywell” are vulnerable to remote attacks from […]

Contribute Anonymously To Git Repositories Over Tor With Gitnonymous Project

Short Bytes: With gitnonymous project, now you can obfuscate your true identity while making Git commits and pushing to public repositories. Using the instructions given on the GitHub page, learn to setup your anonymous account. Chris McCormick (aka chr15m) released an open source project called gitnonymous which can help you contribute to any public repository by […]

Pakistani Veteran Journalist Hamid Mir’ Twitter Account Hacked

The official Twitter account of renowned Pakistani journalist Hamid Mir has been hacked by an unknown hacker who is now leaking screenshots of his personal emails. Hamid Mir, known for his journalist work and controversies has his Twitter account hacked and whoever is behind the hack is now leaking screenshots of Mir’s personal email and […]

Disabled Intrusive Win10 Data Collection Features Re-enabled After Nov Update

Windows 10 spying on users is not a new thing nor its force downloading tactics but Windows 10’s November update saw marked improvement in the performance of PCs and tablets, but just a month after the update, users are discovering changes that they didn’t recognize initially. One of the users on Reddit reported regarding how the […]

TuneCore Record Label Hacked, Musicians’ Data At Risk

TuneCore, an online music distribution/record label service on Friday, revealed that its database was breached by the hackers and they have been working with security experts and federal authorities for tracking down the criminals. TuneCore is the latest in the list of high-profile attacks that has been carried out in recent times. Already hackers have […]

Personal data of Dutch telecom providers extremely poorly protected: how I could access 12+ million records #phonehousegate

On September 11, 2015 I visited Media Markt in Utrecht Hoog Catherijne, a well-known electronics shop in The Netherlands. Since summer 2014, the biggest independent Dutch phone retail company Phone House also operates (white labeled) from within Media Markt locations as a store in a store concept. I had a few questions about my phone subscription so I talked with a […]

Wearables: where’s the security risk?

At a recent conference on “the future of wearables” I was asked to speak about security. I think my presentation surprised some people because I didn’t focus on the security of wearable devices themselves. This article summarizes what I said, with a link to my slides and some free resources you might find helpful. For

Google patches critical vulnerabilities in Android

The flaws can be exploited remotely through emails, Web pages, MMS and rogue apps. Google has released a new batch of security fixes for its Nexus smartphones and tablets, addressing flaws that could allow attackers to compromise the Android devices via rogue emails, Web pages, and MMS messages. Firmware updates are being rolled out to supported […]

Microsoft Edge’s JavaScript engine to go open-source

Today at JSConf US Last Call in Florida, we announced that we will open-source the core components of Chakra as ChakraCore, which will include all the key components of the JavaScript engine powering Microsoft Edge. The ChakraCore sources will be made available on GitHub under the MIT license next month. Chakra offers best-in-class JavaScript execution with […]

Malware Steals iOS and BlackBerry Backups via Infected PCs

BackStab technique helps criminals get their hands on your private data, via unprotected phone backups A recent report from Palo Alto Networks describes an attack technique called BackStab where malware steals local mobile data backups and uploads them to a server under the attacker’s control. This data is not taken from mobile devices per-se, but […]

“Nemesis” malware hijacks PC’s boot process to gain stealth, persistence

Bootkit targeting banks and payment card processors hard to detect and remove. Malware targeting banks, payment card processors, and other financial services has found an effective way to remain largely undetected as it plucks sensitive card data out of computer memory. It hijacks the computer’s boot-up routine in a way that allows highly intrusive code […]

Fallout 4 Pirated Copy Leads To Bitcoin Theft

People who download stuff from torrents and other cracked software providing websites have a very bad news because a user recently downloaded a pirated copy of one of the newly launched games “Fallout 4” and lost about 5 bitcoins through a malware-packed in the setup files of the game. A user of Reddit “Op arkanoah” posted […]

France May Ban Public Wi-Fi and Tor Following Paris Attacks

The government of France is in discussions on blocking Tor anonymity network and also the shared and free wifi network during a state of emergency. These proposals may be laid down in 2 pieces of legislation, one state of emergency and other in relation to counter-terrorism. According to the documents, the reason for blocking wifi in […]