Browsing author

root

Meet GreenDispenser: A New Breed of ATM Malware

On the heels of recent disclosures of ATM malware such as Suceful [1], Plotus [2] andPadpin [3] (aka Tyupkin), Proofpoint research has discovered yet another variant of ATM malware, which we have dubbed GreenDispenser. GreenDispenser provides an attacker the ability to walk up to an infected ATM and drain its cash vault. When installed, GreenDispenser […]

Hackers show US Police Department Vehicles can be hacked

Security researchers Chris Valasek and Charlie Miller helped the world understand that late-model vehicles are vulnerable to cyber attacks. We have read about police getting their computers hacked or falling for ransomware and all that, but hackers can hack their cars? That’s something we weren’t expecting. Post the astonishing Chrysler hacking scandal, it has now […]

YiSpecter- Latest Malware Hits iOS Devices

YiSpecter malware infects iOS devices by exploiting private APIs — Reports suggest, Chinese and Taiwanese users of iOS devices have been affected the most. According to a research report from a cybersecurity firm Palo Alto, YiSpecter uninstalls apps that it doesn’t deem necessary as soon as it gets installed on the Apple iOS device. 1. The malware replaces genuine apps with fake […]

A vigilante hacker is changing 10,000 Wi-Fi passwords

Someone is hacking unprotected Wi-Fi routers everywhere — and forcing them to be on guard. Does your home Wi-Fi use a default password? It forces you to change it. Does it leave unguarded communication channels open? It forces you to close them. To experts, this seems like the work of a well intentioned hacker vigilante. […]

New Intel Skylake CPUs Now Making Your PCs More Secure Than Ever

Short Bytes: Intel has incorporated the new SGX security technology in its Skylake CPUs, further strengthening the platform. Intel’s Sixth generation super performers Skylake CPUs have already been declared as the best processors in business – thanks to its blistering clock speed, better security and providing prolonged battery life. Now, Intel has revealed its plans to further […]

Hacking Wireless Printers With Phones on Drones

YOU MIGHT THINK that working on a secured floor in a 30-story office tower puts you out of reach of Wi-Fi hackers out to steal your confidential documents. But researchers in Singapore have demonstrated how attackers using a drone plus a mobile phone could easily intercept documents sent to a seemingly inaccessible Wi-Fi printer. The […]

How to Hack and Decrypt WhatsApp Database on rooted devices

The post includes a detailed procedure to hack and decrypt WhatsApp Database remotely on rooted Android mobile devices. Very Interesting!. A few hours ago it has been published an interesting post on “How to Hack and Decrypt WhatsApp Database (Remotely) [ROOT]” that explains how to extract and decrypt WhatsApp database from a rooted Android system. […]

Your Stolen/Hacked Identity is Sold Just For $1 in The Dark Web

Short Bytes: Increasing data breaches have made the personal identifiable information (PII) market very hot. The latest report outlines the different aspects of data breaches. Read more here. Recently I wrote a piece describing the ways to know if your identity was hacked/stolen in some recent data breach. Many of you are unaware of the […]

YiSpectre, the First iOS Malware That Attacks Non-Jailbroken Devices

The malware spreads with the help of an adult movie player. Security researchers at Palo Alto Networks have discovered and analyzed malware that infects iOS devices and then injects ads into other apps and when browsing the Web. Researchers say this is the first instance of iOS malware targeting and succeeding in infecting non-jailbroken devices. YiSpecter, […]

VW’s ‘neat hack’ exposes danger of corporate software

It was only old-fashioned detective work that forced Volkswagen to admit to the existence of its ‘defeat device’. And that should worry us all. For anyone interested in what is laughingly known as “corporate responsibility”, the Volkswagen emissions-fraud scandal is a gift that keeps on giving. Apart from the company’s Nazi past, its high status […]

How to do hacking attacks over satellite communications?

Hack Satellite comunication   In this article we will cover satellite based hacking attack which has been used by hacking groups since many years. This attack will provide you complete anonymity and thus it will be very difficult of the digital forensics experts to trace you. In the last article about hacking satellite traffic, we […]

HOW TO INTERCEPT SATELLITE COMMUNICATIONS EASILY?

In today world we use satellite communication in many respects and industries and we all know how important they are in our lives. There different kinds of satellites depending upon the distance from the earth and others depending upon their orbits. Circular and elliptical orbital are two kinds of orbital satellites. Also satellites are classified […]

How To Schedule A Shutdown For Windows OS?

Short Bytes: This article describes the steps to schedule a Shutdown command for Windows OS. Take a look. The very first task we learnt was to Turn ON and Shutdown Windows when we were kids, and sometimes we felt the need to shut down Windows after a specified time in case of an emergency or […]

How To Find The People Stealing Your Tweets On Twitter

This small piece of python code will find the people stealing your tweets and copy-pasting them on their twitter timeline. This python script project is called TweetThief, you can download this python code on GitHub. Author of this project is David Longenecker, you can follow him on twitter @dnlongen. You need to have Twitter API module for […]

MS Word Vulnerability Exploited in Operation Pony Express to Spread Malware

Operation Pony Express was a spear-phishing campaign that was detected by Sophos researchers between April and May 2015. The research team identified that the malware was spread through a common MS Word vulnerability Now, Sophos, a cyber-security firm revealed that an inherent vulnerability in the MS Word Intruder kit was being distributed actively at $140 […]

First Step to Effective Security – How to Know if You’ve Been Hacked

Short Bytes: Was your data compromised in the latest data breaches? How to know if you’ve been hacked? Here are the answers. The online world is becoming scarier each day and the possibility of getting hacked gets increased each time you sign into your online accounts. It’s possible that you haven’t been hacked yet, but you […]

Futuristic Smart-Glove Can Translate Sign Language Into Text and Speech

Scientists are constantly working on user-friendly products for those with physical disabilities. In the past, these wearable glasses came out to help blind people see again. Now in an another amazing development, scientist and researcher Hadeel Ayoub has created Futuristic Smart-Glove which will translate sign language into text and speech. In an attempt to open up the […]

Stagefright 2.0: Security Flaw in Android Puts 1 Billion Devices at Risk

The risk of remote hacking is triggered through the faults in the media processing components that may be misused by malicious websites. Experts have identified some major flaws in the way media files are handled by Android which may eventually trap its users by automatically visiting malicious sites. A report by Zimperium (a cyber-security company) […]

Was Oregon Shooting Predicted on 4chan?

Someone used 4chan to post about Oregon college shooting in the US before it actually took place. The sudden increase of Internet users has connected humanity worldwide. Some use it for good,  others use it as a tool to spread fear and propaganda. This is exemplified by what happened on Thursday when a gunman in Oregon, California […]