Browsing author

root

Researcher Founds Bug That Made Mark Zuckerburg Quit his job at Facebook

A Facebook bug is not a surprising thing to know about but Zuckerberg quitting his job as the Facebook’s CEO is not only surprising but also shocking. Yes, Facebook Bug makes Mark Zuckerberg Quit his Job from Facebook. This is not a technical flaw it’s just a bug discovered by a Nepal-based security researcher Sachin Thakuri. The […]

Court Charges Kid with Bomb Threats and DDoS Attacks

A 15-year-old guy in Plymouth has been arrested by British police on the charges of launching DDoS attacks and for sending false bomb alerts via social media. According to the police, the boy was involved in launching DDoS attacks to servers belonging to companies in Africa, Asia, Europe, and North America. Furthermore, he also sent false […]

LinkedIn patches serious persistent XSS vulnerability

Developers at LinkedIn fixed a persistent cross site scripting vulnerability in the social network this week that could have been exploited to spread a worm on the service’s help forums. It was a very a quick turnaround for the company according to the researcher, who said LinkedIn fixed the issue a mere three hours after he reported it. […]

600,000 cable modems have an easy to pop backdoor in a backdoor

Brazilian whacks Arris for easy-t-o-guess default password, fix promised fast. Security bod Bernardo Rodrigues has found a backdoor-within-a-backdoor affecting some 600,000 Arris cable modems. The broadband kit company said, in a statement to El Reg, that it is working “around the clock” to fix the problems. Rodrigues (@bernardomr), a vulnerability tester with Brazil’s Globo television […]

No money, but Pony! From a mail to a trojan horse

In this post, we will take a high and low-level look at the Pony Trojan, delivered through a recent spam campaign. During our case study we showed some malicious samples being distributed in spam campaigns.Using this distribution method, malware is often found attached to the e-mail as either: an executable (also compressed, i.e. zip, rar or cab archive), sometimes […]

VirusTotal Adds Sandbox Execution for OS X Apps

Mac malware is a thing. It’s real. Granted it hasn’t reached the critical mass of malicious code for Windows, but recent encounters with WireLurker, XcodeGhost and YiSpecter among others have elevated the conversation to levels where it’s been legitimized. Adding further credence, Google-owned online malware scanner VirusTotal this week announced the availability of sandbox execution […]

‘Hacked by China? Hack them back!’ rages US Congress report

How dare they demand we do exactly what we demand of them! The foreign rotters. A report laid before the US Congress yesterday encouraged lawmakers to allow American companies responding to Chinese miscreants pilfering their data to hack those companies back to save their info. The US-China Economic and Security Review Commission was established by […]

6 Things You Should Know About Facebook’s Security!

Facebook has over 1 billion daily active users, with people in the US spending a staggering 27 hours on the social networking site every month. The company thinks that that kind of sky-high usage and engagement gives it certain responsibilities. “Because people interact with Facebook so often, we’re spending a lot of time thinking about how we can play a […]

Cybercriminals Can Drop Malware On Your PC Using Video Ads

Visual ads directing users to malicious sites are things of past, cyber-criminals have added a new dimension to this: the video ads. Video ads are mostly created for selling products or services, but hackers are now using them to direct users towards malicious sites. This was identified in an attack laid down two weeks back […]

Mark Zuckerberg Quits His Job At Facebook, All Due To A Facebook Bug

Short Bytes: No, there isn’t any typo in the article heading. Read ahead to see Mark Zuckerberg’s post and know the whole story. Mark Zuckerberg just quit his job at Facebook. Finding it hard to believe, check his Facebook post yourself: Mark Zuckerberg Quits His Job. Okay, now that you’ve seen his post – and […]

Secure messaging service Telegram blocks 78 ISIS-related channels

Telegram, the popular instant messaging service that offers end-to-end encryption, announced on Wednesday that they have “blocked 78 ISIS-related channels across 12 languages.” The company introduced channels in September 2015, and presented it as a tool for broadcasting messages to large (unlimited) audiences. “They can have an unlimited number of members, they can be public […]

Here’s a Spy Firm’s Price List for Secret Hacker Techniques

THE TRADE IN the secret hacker techniques known as “zero day exploits” has long taken place in the dark, hidden from the companies whose software those exploits target, and from the privacy advocates who revile the practice. But one zero-day broker is taking the market for these hacking techniques into the open, complete with a […]

Spam Campaign Causes “DDoS” by Googlebot

Every once in a while we get a glimpse into rare and strange behavior that doesn’t involve the website being hacked, but causes major problems for website owners. We have spoken recently about malicious referral spam in Google Analytics and Google Search Console being used by attackers after they gain access to a website. Today, […]

After Blaming Encryption and Snowden, Police Finds Paris Attackers Talked Over Unencrypted SMS

Short Bytes: After CIA and other intelligence agencies blamed encryption and Snowden for the Paris attacks, the more details after the police investigation are painting a different story. The majority of the communications between the Paris attackers was done using encrypted SMS, the local French media suggests. In a surprising turn of events, the intelligence officials […]

Canonical Patches Nvidia Graphics Drivers Vulnerability in All Supported Ubuntu OSes

In a new Ubuntu Security Notice (USN-2814-1), Canonical announced that they have patched a security vulnerability in the Nvidia proprietary graphics drivers for all supported Ubuntu Linux operating systems. According to Canonical, a local attacked could use the issue discovered in the Nvidia graphics drivers to run programs as root (system administrator). “It was discovered […]

Carnegie Mellon Denies FBI Paid for Tor-Breaking Research

CARNEGIE MELLON’S researchers pulled their talk on cracking the protections of the anonymity software Tor from the schedule of the Black Hat security conference in 2014, the university has been nearly silent about rumors that their technique ended up in the FBI’s hands. Now the university has finally spoken up—to deny the Tor Project’s claim […]

Dyreza Banking Trojan Adds Support for Microsoft Edge and Windows 10

Hide your Windows 10 & Edge browser, Dyreza is coming!. A new variant of the Dyreza banking trojan comes with support for Microsoft’s latest products, the Windows 10 operating system and the Edge Web browser. This new version of the trojan was spotted and analyzed by Heimdal Security, an EU-based cyber-security vendor, which also claims that, […]

How To Save Google Maps for Offline Use

Google Maps are no doubt very helpful to most of the people. We can navigate through places and streets easily using Google Maps. But what if you are running short. But what if you are running short on your data and internet connection? Nokia’s Here Maps provides an option to download the maps for offline use. […]

Microsoft Open Sources Visual Studio Code, Supports Linux App Debugging

Short Bytes: Microsoft has made tons of announcements and launches at its Connect(); Developers Conference 2015. The company has open sourced its Visual Studio Code and released a new and free program for developers called Visual Studio Dev Essential. At its Connect(); Developers Conference 2015 in New York City, Microsoft had a lot to share. The company […]

How to Hack ISIS

Encouraging the people to join the cyber-war against ISIS, hacktivist group Anonymous has published three hacking guides. These guides have instructions regarding recognizing ISIS-affiliated websites, using a Twitter bot to uncover social media accounts of ISIS, and learning how to hack using a “NoobGuide”  The war between the hackers and terrorists is escalating quickly in […]