Browsing author

root

No money, but Pony! From a mail to a trojan horse

In this post, we will take a high and low-level look at the Pony Trojan, delivered through a recent spam campaign. During our case study we showed some malicious samples being distributed in spam campaigns.Using this distribution method, malware is often found attached to the e-mail as either: an executable (also compressed, i.e. zip, rar or cab archive), sometimes […]

VirusTotal Adds Sandbox Execution for OS X Apps

Mac malware is a thing. It’s real. Granted it hasn’t reached the critical mass of malicious code for Windows, but recent encounters with WireLurker, XcodeGhost and YiSpecter among others have elevated the conversation to levels where it’s been legitimized. Adding further credence, Google-owned online malware scanner VirusTotal this week announced the availability of sandbox execution […]

‘Hacked by China? Hack them back!’ rages US Congress report

How dare they demand we do exactly what we demand of them! The foreign rotters. A report laid before the US Congress yesterday encouraged lawmakers to allow American companies responding to Chinese miscreants pilfering their data to hack those companies back to save their info. The US-China Economic and Security Review Commission was established by […]

6 Things You Should Know About Facebook’s Security!

Facebook has over 1 billion daily active users, with people in the US spending a staggering 27 hours on the social networking site every month. The company thinks that that kind of sky-high usage and engagement gives it certain responsibilities. “Because people interact with Facebook so often, we’re spending a lot of time thinking about how we can play a […]

Cybercriminals Can Drop Malware On Your PC Using Video Ads

Visual ads directing users to malicious sites are things of past, cyber-criminals have added a new dimension to this: the video ads. Video ads are mostly created for selling products or services, but hackers are now using them to direct users towards malicious sites. This was identified in an attack laid down two weeks back […]

Mark Zuckerberg Quits His Job At Facebook, All Due To A Facebook Bug

Short Bytes: No, there isn’t any typo in the article heading. Read ahead to see Mark Zuckerberg’s post and know the whole story. Mark Zuckerberg just quit his job at Facebook. Finding it hard to believe, check his Facebook post yourself: Mark Zuckerberg Quits His Job. Okay, now that you’ve seen his post – and […]

Secure messaging service Telegram blocks 78 ISIS-related channels

Telegram, the popular instant messaging service that offers end-to-end encryption, announced on Wednesday that they have “blocked 78 ISIS-related channels across 12 languages.” The company introduced channels in September 2015, and presented it as a tool for broadcasting messages to large (unlimited) audiences. “They can have an unlimited number of members, they can be public […]

Here’s a Spy Firm’s Price List for Secret Hacker Techniques

THE TRADE IN the secret hacker techniques known as “zero day exploits” has long taken place in the dark, hidden from the companies whose software those exploits target, and from the privacy advocates who revile the practice. But one zero-day broker is taking the market for these hacking techniques into the open, complete with a […]

Spam Campaign Causes “DDoS” by Googlebot

Every once in a while we get a glimpse into rare and strange behavior that doesn’t involve the website being hacked, but causes major problems for website owners. We have spoken recently about malicious referral spam in Google Analytics and Google Search Console being used by attackers after they gain access to a website. Today, […]

After Blaming Encryption and Snowden, Police Finds Paris Attackers Talked Over Unencrypted SMS

Short Bytes: After CIA and other intelligence agencies blamed encryption and Snowden for the Paris attacks, the more details after the police investigation are painting a different story. The majority of the communications between the Paris attackers was done using encrypted SMS, the local French media suggests. In a surprising turn of events, the intelligence officials […]

Canonical Patches Nvidia Graphics Drivers Vulnerability in All Supported Ubuntu OSes

In a new Ubuntu Security Notice (USN-2814-1), Canonical announced that they have patched a security vulnerability in the Nvidia proprietary graphics drivers for all supported Ubuntu Linux operating systems. According to Canonical, a local attacked could use the issue discovered in the Nvidia graphics drivers to run programs as root (system administrator). “It was discovered […]

Carnegie Mellon Denies FBI Paid for Tor-Breaking Research

CARNEGIE MELLON’S researchers pulled their talk on cracking the protections of the anonymity software Tor from the schedule of the Black Hat security conference in 2014, the university has been nearly silent about rumors that their technique ended up in the FBI’s hands. Now the university has finally spoken up—to deny the Tor Project’s claim […]

Dyreza Banking Trojan Adds Support for Microsoft Edge and Windows 10

Hide your Windows 10 & Edge browser, Dyreza is coming!. A new variant of the Dyreza banking trojan comes with support for Microsoft’s latest products, the Windows 10 operating system and the Edge Web browser. This new version of the trojan was spotted and analyzed by Heimdal Security, an EU-based cyber-security vendor, which also claims that, […]

How To Save Google Maps for Offline Use

Google Maps are no doubt very helpful to most of the people. We can navigate through places and streets easily using Google Maps. But what if you are running short. But what if you are running short on your data and internet connection? Nokia’s Here Maps provides an option to download the maps for offline use. […]

Microsoft Open Sources Visual Studio Code, Supports Linux App Debugging

Short Bytes: Microsoft has made tons of announcements and launches at its Connect(); Developers Conference 2015. The company has open sourced its Visual Studio Code and released a new and free program for developers called Visual Studio Dev Essential. At its Connect(); Developers Conference 2015 in New York City, Microsoft had a lot to share. The company […]

How to Hack ISIS

Encouraging the people to join the cyber-war against ISIS, hacktivist group Anonymous has published three hacking guides. These guides have instructions regarding recognizing ISIS-affiliated websites, using a Twitter bot to uncover social media accounts of ISIS, and learning how to hack using a “NoobGuide”  The war between the hackers and terrorists is escalating quickly in […]

Birds of a feather code together

Lysa Myers, a security researcher at ESET, looks at the diversity challenges and opportunities in information security – while there is much to be done, there’s a lot to be optimistic about she says.

CloudFlare CEO Denies Anonymous’ allegation of protecting ISIS sites

In a reaction to Paris Attacks last Friday, Anonymous declared a war against the ISIS on Monday and were determined to knock ISIS-linked sites and hack their social media accounts which are a big medium of spreading their false ideology and of choosing their sympathizers to spread it. While fighting this war, the Anonymous yesterday […]

Seized: Fake EFF .org linked to hackers hitting NATO, White House PCs

Digital rights group takes down Pawn Storm base. The (EFF) has been awarded control of its namesake domain, which was being used to install malware on people’s computers. The EFF used the official uniform dispute resolution process (UDRP) run by UN agency WIPO to take control of ElectronicFrontierFoundation.org – the EFF’s real website is at […]

5 Most Useless Yet Awesome Inventions Ever

Short Bytes: Ever came across a creative invention and questioned its use? Well, you are at the right place as we have brought to you the 5 most useless yet awesome inventions ever. There is a great story behind every useful invention and every time it’s somehow related to a human need that inspired that […]