Browsing category

Cryptocurrency

World’s Fourth Largest Cryptocurrency “Bithumb” Hacked and Many Number of User Accounts Compromised

Worlds Fourth Largest Cryptocurrency called  “Bithumb ”  hacked by unknown hackers and stolen around  31,800 Bithumb users account details which are 3% of the platform’s entire userbase. Many Bithumb users data such as an e-mail address, mobile phone numbers and other Personal information has been leaked by this breach. Few Weeks before Biggest Bitcoin Wallet […]

AES-256 keys can be sniffed within Seconds Using €200 Worth Hardware kit

Side-channel attacks over AES is not new, previous attacks required a direct access. Now the security experts from Fox-IT and Riscure show how to covertly recover the encryption key with AES implementations. The attacker needs to observe input or output data to launch this attack, so it is possible with publically available Network encryption devices. Instead […]

Confide App used by White House staffers Found Vulnerable for MITM attacks

Confide is an a encrypted texting application for Android and iOS, which used by staffers in White House for their secret communication. Security Experts from IOActive found Multiple critical flaws while testing versions 4.0.4 for Android and 1.4.2 for Windows and OS X. Technical Details Notification system doesn’t require a valid SSL server certificate to communicate, which would leak […]

Google Declares First-Ever SHA-1 attack

The use of SHA-1 certificates has been depreciated due to the ever-present necessity to strengthen procedures and strategies against a background of continually enhancing computational power. A Collision Attack is an attempt to discover two information strings of a hash capacity that deliver a similar hash result. Since hash capacities have boundless info length and […]

Project Wycheproof – Test crypto libraries against known attacks

Google announced Project Wycheproof – Test crypto libraries against known attacks, it is created and kept up by individuals from Google Security Team, however, it is not an official Google product. Project Wycheproof incorporates more than 80 test cases, and Google says they have effectively revealed more than 40 security bugs.For instance, Project Wycheproof could recover […]

Cerber 5.0.1 ransomware spreading via Google and Tor

What is cerber? Cerber is a ransomware-type malware that infiltrates the system and encrypts various file types including .jpg, .doc, .raw, .avi, etc. Cerber adds a .cerber extension to each encrypted file. Following successful infiltration, Cerber demands a ransom payment to decrypt these files. A spam campaign is using a Tor2Web proxy service in an […]

Ransomware attack hit San Francisco train system

A ransomware attack took ticket machines for San Francisco’s light rail transit system offline all day Saturday during one of the busiest shopping weekends of the year, but rather than shutting down, the agency decided instead to let users ride for free. By Sunday the system was once again running normally. “We never considered paying […]

ImageGate attack – Malware through poisoned .JPG

ImageGate attack : Security people from Check Point Software Technologies identified a new malware  campaign through Facebook. Crooks leverage an image obfuscation trick, dubbed ImageGate, to spread the Locky ransomware via Facebook. Experts highlighted that the image obfuscation trick is able to bypass Facebook’s security checks. As per the research, the attackers have built a new capability […]

Final countdown for SHA-1 SSL certificates

SHA-1 SSL certificates which are more popular and an sucessor of MD5 algorithm are now in the final days of what was once one of the most widespread types of SSL certificates:SHA-1. Now, due to the ever present requirement to strengthen processes and techniques against a background of constantly improving computational power, it is the turn […]

Dos attack with openssl CVE-2016-6304,CVE-2016-6305,CVE-2016-6306

What is Openssl? OpenSSL is a an open source project that provides a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It ensures secure communications against attackers from Eavesdropping and MITM attacks. Openssl library includes tools for generating RSA/ECC public and private keys. OpenSSL is written in C, but […]