Browsing category

Data Security

Gomasom Ransomware Decrypted, Get Your Files Back for Free

Some lucky users are about to have a merry Christmas.Users that had the bad luck of getting infected with the Gomasom ransomware can now start sending Christmas gifts to Fabian Wosar, security researcher at Emsisoft, who managed to create a tool for decrypting files locked by this ransomware. Compared to other ransomware families, Gomasom is […]

Evolving Microsoft SmartScreen to protect you from drive-by attacks

Microsoft SmartScreen, integrated with Microsoft Edge, Internet Explorer, and the Windows operating system, has helped protect users from socially engineered attacks such as phishing and malware downloads since its initial release in Internet Explorer 7. With URL reputation checks and Application Reputation protection, SmartScreen has protected users from billions of web-based attacks in the last […]

How to Hack into a Mac Without the Password

Imagine this. Your girlfriend needs to type a very important report for her Accounting class but she forgot the password to her MacBook Pro. She tries and tries, but keeps getting the password wrong. She asks her boyfriend if he can “hack” into her laptop. He actually knows how to do this so he breaks […]

Deadline for Better Encryption on Payment Systems Pushed Back Two Years

Banking industry needs more time, has too much on its plate.The Payment Card Industry Security Standards Council (PCI SSC) has announced that it has pushed back the mandatory migration date for TLS 1.1 encryption or higher for organizations that process online or offline payments. In April 2015, the PCI SSC group informed us that all […]

Ghostware and Two-Faced Malware Coming in 2016

Summary: Malware is increasingly sophisticated. In 2016, look for two developing malware families. First, as law enforcement becomes more specialized in identifying cybercriminals, ghostware will help hackers conceal indicators of compromise. It will be more difficult for companies to know a compromise has taken place. Second, be on the lookout for “two-faced malware”: malware that […]

The Greatest Hits of Samy Kamkar, YouTube’s Favorite Hacker

IN AN AGE when hackers hire themselves out to organized crime schemes and sell secret intrusion techniques to spy agencies, Samy Kamkar takes a more fun-loving approach to dropping zero-day exploits: YouTube. Kamkar is the one-man production team and star of a video series he calls Applied Hacking, a YouTube channel that has grown into […]

“Unauthorized code” in Juniper firewalls decrypts encrypted VPN traffic

Backdoor in NetScreen firewalls gives attackers admin access, VPN decrypt ability. An operating system used to manage firewalls sold by Juniper Networks contains unauthorized code that surreptitiously decrypts traffic sent through virtual private networks, officials from the company warned Thursday. It’s not clear how the code got there or how long it has been there. […]

Why Identity is A Major Asset Online

  ShortRead: Why the loss of identity online can lead to severe consequences, no matter how solid and reliable your preventive measures for security are. It has been really hard for IT experts and security evangelists to come up with the most suitable security system, which will prevent attacks and hacks online. Over the years, […]

The Intelligence System That Can Hack Any Smartphone

ShortRead: A group of researchers have developed a system which can hack and steal data from any smartphone user. Today, one of the most troubling issues for smartphone users is its privacy and that points to the apps and websites they visit from the smartphone. Almost all websites and apps gather user’s data to get make […]

Researcher Threatened with Infection For Exposing Flaw in HIV Dating App

Websites and apps around the world encourage researchers to find bugs in their system, but an Internet dating app for HIV positive people threatens the security researchers with HIV infection if they notify the company about any security bug in their app. Hzone, an application for HIV-positive singles that has over 4900 users were told […]

FireEye Security Devices Provide Attackers with Backdoor into Corporate Networks

FireEye security equipment can be compromised, Google finds. Two security researchers working for Google have discovered a simple method of compromising FireEye security products, which, ironically, are installed to prevent a network’s computers from being compromised. According to Google’s findings, attackers can craft malicious files or fool users into accessing malicious links and exploit an issue […]

Man arrested in toymaker hack that exposed data for millions of kids

VTech site remained vulnerable to an old SQL injection exploit. UK police said they have arrested a 21-year-old man in connection to the November breach of electronic toymaker VTech, a hack that exposed personal data of almost 12 million people, including gigabytes worth of headshot photos and chat logs for millions of kids and parents. The […]

How to implement enterprise data protection services and solutions ?

There is an increase in people who have been victims of identity theft and unauthorized use of credit cards because of many companies that handle data irresponsibly. According to many studies done by a personal data protection company in countries such as Mexico, Brazil, United States, Colombia, Argentina, India, the personal data protection & privacy […]

This New Secom Drone Will Hunt The Suspects Down

Japanese company “Secom” has developed a drone that could be tough to handle for intruders trying to escape after committing any crime. This new drone is designed to autonomously detect suspect and also to take their snapshots while they are trying to escape from the crime scene. It also has led lights installed for night operations […]

Two Mobile Banking Trojans Used Facebook Parse as C&C Server

Attackers carry out SMS fraud via the infected phones. The Android/OpFake and the Android/Marry malware families, two banking trojans targeting mobile devices, have (improperly) stored their C&C servers inside Facebook Parse, the company’s BaaS (Backend-as-a-Service) offering. BaaS is a cloud-based service that provides mobile app developers with ready-made tools, in the form of APIs, on which […]

What the government should’ve learned about backdoors from the Clipper Chip

The Obama administration’s calls for backdoors echo the Clinton-era key escrow fiasco. In the face of a Federal Bureau of Investigation proposal requesting backdoors into encrypted communications, a noted encryption expert urged Congress not to adopt the requirements due to technical faults in the plan. The shortcomings in question would allow anyone to easily defeat the measure with […]