Criminals, linguistics, literacy and attribution
Linguistics and some form of textual analysis can be helpful in analysing malware and scams. Regional attribution, though, still requires caution.
Browsing author
Linguistics and some form of textual analysis can be helpful in analysing malware and scams. Regional attribution, though, still requires caution.
Short Bytes: What if you had to study one single page to get the complete idea of a programming language? In this article, I’m sharing an infographic to help you learn Python faster than ever. This is the follow up of my article The Entire JavaScript Language in a Single Image. Today, we are sharing The […]
Security researchers at VerSprite have tested and discovered a few vulnerabilities in Western Digital’s My Cloud NAS (Network Attached Storage) hard drive, marketed by the company as your own personal cloud server. This device, sold across the world, allows users to place it in their home and access it via a local network, or even […]
A new piece of adware that serves as an entry point for future trojan infections was discovered by Dr.Web security researchers. This new malware was named Adware.Mac.WeDownload.1 because it was first spotted on the WeDownload.com domain, packed with a modified version of Adobe Flash Player. As Dr.Web researchers found out, the package was signed with […]
China’s “Great Firewall” may have been partly to blame for the first major attack on Apple Inc’s (AAPL.O) App Store, but experts also point the finger at lax security procedures of some big-name Chinese tech firms and how Apple itself supports developers in its second biggest market. A malicious program, dubbed XcodeGhost, hit hundreds – […]
We at ESET recently discovered an interesting stealth attack on Android users, an app that is a regular game but with one interesting addition: the application was bundled with another application with the name systemdata or resourcea and that’s certainly a bit fishy. Why would a regular game downloaded from the official Google Play store […]
United States Air Force at the Air and Space conference held in Maryland, has unveiled a specifically designed aircraft named EC-130H Compass Call that is, apart from its air combating proficiencies, capable enough to hack targeted enemy networks wirelessly and directly from the aircraft. US Air Force used C-130 airframe to design and develop a highly modified […]
The proliferation of independent and vendor-sponsored bug bounties has not only put some money in researchers’ pockets, but has also forced enterprises—and software makers—to put processes in place to handle outside bug reports. “Saying you want one is not enough,” said Katie Moussouris, chief policy officer at bug bounty platform provider HackerOne. “CSOs need to […]
Edward Snowden claims that if the technology keeps on becoming sophisticated and flawless then we may never be able to locate aliens and they won’t be able to notice us as well. In a candid chit-chat session with Neil deGrasse Tyson on Friday, September 18, famous NSA whistleblower Edward Snowden spoke in defense of the […]
Here’s a treat for hackers and security researchers who don’t mind selling information about zero-day vulnerabilities to the highest bidder: Zerodium, the zero-day vulnerability and exploit acquisition firm recently launched by VUPEN founder Chaouki Bekrar, is offering a million dollars for “an exclusive, browser-based, and untethered jailbreak for the latest Apple iOS 9 operating system […]
Short Bytes: Security firm Zerodium has launched “The Million Dollar iOS 9 Bug Bounty”, that offers $1 million for finding vulnerabilities and deploying a browser-based attack on a non-jailbroken iOS device. Here’s a great news for the bug hunters and hackers. Introducing the world’s biggest zero-day bug bounty program, The Million Dollar iOS 9 Bug […]
Adobe has released a Flash Player update that addresses 23 critical vulnerabilities in the software, many which can lead to code execution. Version 18.0.0.231 and earlier of Flash Player for Windows and Mac, Microsoft Edge and Internet Explorer 11 in Windows 10, and Internet Explorer 10 and 11, are affected, according to a security bulletin […]
Cryptowall attackers are smashing businesses in the Australian state of Queensland, according to the owner of a Townsville sex shop which has paid $1,058 to ransomware attackers to have its files unlocked. The third iteration of the dangerous ransomware hit Sweethearts, which describes itself as Queensland’s oldest sex shop, last Friday with a ransom demand […]
The Ghost Push malware comes with those Android apps that are available at non-Google app stores. The newly discovered Android malware dubbed as Ghost Push Malware has the capability of compromising a massive number of new devices (more than 600,000) on a daily basis. The malware has been detected by a famous Android developer Cheetah Mobile. The same company is […]
New Android malware was discovered, able to steal money from online banking accounts, and hide SMS notifications coming to confirm financial transactions. This new malware detected by Dr.Web as the Android.SmsBot.459.origin trojan infects users via SMS spam, which, to be more convincing, in some cases even uses the phone owner’s name. The spam SMS message […]
Short Bytes: It’s reported that scammers are taking advantage of Facebook Dislike button anticipation and they’re using the Facebook users. These scams trick the users into believing that clicking on some links would provide them an early access to the dislike button. As a result of great anticipation surrounding the Facebook Dislike button (read empathy button), […]
After two weeks of sharp, last minute changes in the Bitcoin price, the markets caught a break this week, with the price remaining fairly stable throughout. Thus, it seems as if the speculators have finally settled down. This, combined with this week’s relatively slow news week, explains the sideways action that persisted throughout the week. […]
Short Bytes: The government of India doesn’t understand the concept of online privacy and the importance of encryption. A new government body of “experts” has proposed a new Encryption Policy ruling out the need of online encryption. The Indian government has made a fool of itself by creating an environment of anxiety with its newly […]
Apple has removed more than 300 malicious apps after confirming the first major breach to its iOS app store.
Just a few minutes ago, September 20, Animesoft International had the great pleasure of informing Softpedia about the immediate availability for download of the final release of their Linux Mangaka Mou distribution. Linux Mangaka Mou is the fifth major release of the Ubuntu-based distro for anime and manga fans. It is currently based on the […]