Browsing author

root

Android trojan drops in, despite Google’s Bouncer

We at ESET recently discovered an interesting stealth attack on Android users, an app that is a regular game but with one interesting addition: the application was bundled with another application with the name systemdata or resourcea and that’s certainly a bit fishy. Why would a regular game downloaded from the official Google Play store […]

US Air Force EC-130H Aircraft with Hacking Kit can Hack Enemy Networks

United States Air Force at the Air and Space conference held in Maryland, has unveiled a specifically designed aircraft named EC-130H Compass Call that is, apart from its air combating proficiencies, capable enough to hack targeted enemy networks wirelessly and directly from the aircraft. US Air Force used C-130 airframe to design and develop a highly modified […]

Model Assesses Readiness to Accept Outside Vulnerability Reports

The proliferation of independent and vendor-sponsored bug bounties has not only put some money in researchers’ pockets, but has also forced enterprises—and software makers—to put processes in place to handle outside bug reports. “Saying you want one is not enough,” said Katie Moussouris, chief policy officer at bug bounty platform provider HackerOne. “CSOs need to […]

Do You Believe in Aliens? Well, Edward Snowden Does

Edward Snowden claims that if the technology keeps on becoming sophisticated and flawless then we may never be able to locate aliens and they won’t be able to notice us as well. In a candid chit-chat session with Neil deGrasse Tyson on Friday, September 18, famous NSA whistleblower Edward Snowden spoke in defense of the […]

Exploit broker offers $1 million for reliable iOS 9 exploit

Here’s a treat for hackers and security researchers who don’t mind selling information about zero-day vulnerabilities to the highest bidder: Zerodium, the zero-day vulnerability and exploit acquisition firm recently launched by VUPEN founder Chaouki Bekrar, is offering a million dollars for “an exclusive, browser-based, and untethered jailbreak for the latest Apple iOS 9 operating system […]

World’s Biggest 0-day Bug Bounty Program: Hack Apple iOS 9 to Win $1,000,000

Short Bytes: Security firm Zerodium has launched “The Million Dollar iOS 9 Bug Bounty”, that offers $1 million for finding vulnerabilities and deploying a browser-based attack on a non-jailbroken iOS device. Here’s a great news for the bug hunters and hackers. Introducing the world’s biggest zero-day bug bounty program, The Million Dollar iOS 9 Bug […]

Soon, you may not be able to delete WhatsApp messages for 90 days

Govt mulls a policy that requires users to save messages, and hand them over to law enforcement agencies, if asked. Deleting WhatsApp messages might become difficult in India in the days to come. The government is planning to bring a policy under which an individual will be required to store the plain texts of the […]

Adobe Patches 23 Critical Vulnerabilities in Flash Player

Adobe has released a Flash Player update that addresses 23 critical vulnerabilities in the software, many which can lead to code execution. Version 18.0.0.231 and earlier of Flash Player for Windows and Mac, Microsoft Edge and Internet Explorer 11 in Windows 10, and Internet Explorer 10 and 11, are affected, according to a security bulletin […]

Top QLD sex shop cops Cryptowall lock; cops flop as state biz popped

Cryptowall attackers are smashing businesses in the Australian state of Queensland, according to the owner of a Townsville sex shop which has paid $1,058 to ransomware attackers to have its files unlocked. The third iteration of the dangerous ransomware hit Sweethearts, which describes itself as Queensland’s oldest sex shop, last Friday with a ransom demand […]

Ghost Push Android Malware Responsible for Infecting 600k New Users Daily

The Ghost Push malware comes with those Android apps that are available at non-Google app stores. The newly discovered Android malware dubbed as Ghost Push Malware has the capability of compromising a massive number of new devices (more than 600,000) on a daily basis.  The malware has been detected by a famous Android developer Cheetah Mobile. The same company is […]

Stay Informed, Stay Away from Facebook Dislike Button Scams

Short Bytes: It’s reported that scammers are taking advantage of Facebook Dislike button anticipation and they’re using the Facebook users. These scams trick the users into believing that clicking on some links would provide them an early access to the dislike button. As a result of great anticipation surrounding the Facebook Dislike button (read empathy button), […]

Bitcoinist Weekly News Re-Hash: BitPay Hack, California Bitcoin Bill Dies

After two weeks of sharp, last minute changes in the Bitcoin price, the markets caught a break this week, with the price remaining fairly stable throughout. Thus, it seems as if the speculators have finally settled down. This, combined with this week’s relatively slow news week, explains the sideways action that persisted throughout the week. […]

US Air Force Creates an Airplane for Hacking Enemy Military Networks

At the Air Force Association Air & Space conference in National Harbor, Maryland (near Washington), Major General Burke Wilson revealed a new US Air Force project, an innovative airborne hacking platform. Military networks around the world, regardless of country, are usually air-gapped systems, meaning they don’t have an Internet connection, mainly to protect sensitive data […]

How malware finally infected Apple iOS apps: XCodeGhost

Hackers can’t easily get malware directly in iOS apps so they’re taking a different approach: Modifying the programming environment that Apple provides to make apps. Google’s open approach to Android apps have led to several malware issues over the past few years, while Apple users have remained relatively unscathed. Not any more. At least 39 […]

Anonymous Philippines Hacks Telecom Commission Site Against Slow Internet Speed

Anonymous Philippines, an affiliate of the online hacktivist group Anonymous, hacked and defaced the official website of the country’s National Telecommunications Commission (NTC) Sunday afternoon. The act of hacktivism was a result of slow Internet speed and bandwidths in relation to price the NTC charges in the Philippines. Anonymous left a deface page along with a message on […]

Scammers Targeting Facebook Users with Dislike Button Scam

New Dislike button scam has started to make rounds on the Facebook, one of the most popular and widely used social media networks. This scam is expected to spread far and wide because of its nature and how the Facebook users are anxiously waiting to get their hands on the dislike button. For those readers […]

Getting Started With Docker – Intro to Containers World (Part -1)

Short Bytes: Linux containers (LXC) are very popular these days among developers and companies (perhaps due to Docker, which leverages LXC on the back-end). LXC, as a lightweight, serves as an alternative to full machine virtualization such as those provided by “traditional” hypervisors like VirtualBox, VMWare, KVM, Xen, or ESXi. Today, we are starting a complete […]