Browsing category

Data Security

2015 NOBEL PEACE PRIZE IS BETWEEN SNOWDEN, POPE AND MERKEL?

Today the Nobel Peace Prize 2015 will be announced. Will it be a controversial choice? The Nobel Committee will announce the 2015 Nobel Peace Prize today at 11am CET in Oslo. The Nobel Peace Prize is often the most controversial Nobel Prize. The Nobel Peace Prize in 2012 for the EU and the 2009 Nobel […]

WordPress XML-RPC Service Used to Amplify Brute-Force Attacks

Hackers are hiding hundreds or thousands of username/password combinations in one single XML-RPC request. WordPress sites are being abused once again and there is no surprise since the platform is the most popular CMS on the Internet, and the attack surface is literally enormous when compared to other website-building solutions. This time around, Sucuri’s security researchers […]

Chinese Hackers Breached LoopPay, Whose Tech Is Central to Samsung Pay

Months before its technology became the centerpiece of Samsung’s new mobile payment system, LoopPay, a small Massachusetts subsidiary of the South Korean electronics giant, was the target of a sophisticated attack by a group of government-affiliated Chinese hackers. As early as March, the hackers — alternatively known as the Codoso Group or Sunshock Group by […]

SHA1 algorithm securing e-commerce and software could break by year’s end

Researchers warn widely used algorithm should be retired sooner. SHA1, one of the Internet’s most crucial cryptographic algorithms, is so weak to a newly refined attack that it may be broken by real-world hackers in the next three months, an international team of researchers warned Thursday. SHA1 has long been considered theoretically broken, and all […]

Bitcoin Transactions Were Under Attack for a Week, Prankster Reveals Himself

Transactions were being duplicated in a malleability attack.A Russian man that calls himself “Alister Maclin” has been disrupting the Bitcoin network for over a week, creating duplicate transactions, and annoying users. The attack was first noticed by Coinkite, a high-tech Bitcoin platform, and was eventuallyclaimed by Maclin on one of the Bitcoin forums. According to […]

New Moker RAT Bypasses Detection

Researchers warned Tuesday the latest APT to make the rounds features a remote access Trojan that can effectively mitigate security measures on machines and grant the attacker full access to the system. Experts with the Israeli cyber security start-up enSilo discovered the RAT – which they refer to as Moker – lurking inside one of their customers’ networks […]

Creators of the Benevolent Linux.Wifatch Malware Reveal Themselves

Linux.Wifatch’s creators call themselves The White Team.The Linux.Wifatch malware, also dubbed as the “vigilante malware” has been going around the Internet, infecting IoT devices, cleaning out malware infections, and boosting the devices’ security. While the initial Symantec report that exposed their activity had a positive tone and said that no instances of abuse were recorded […]

HDRoot Bootkit Impersonates Microsoft’s Net Command

HDRoot is the work of the Winnti APT group. Hackers activating mainly in South-East Asia have developed a new bootkit trojan, which disguises as Microsoft’s built-in Net command to avoid detection. The threat was discovered by Russian-based Kaspersky Labs security vendor, which goes on to say that the bootkit seems to be an evolution from the […]

Meet The New Virus Protecting Routers From Hackers

For hackers, routers are an easy target, perhaps because they are seldom updated and virus-scanned and are also easily cracked. But shockingly, a report from Symantec claims that a new router virus may make devices safer. A bug that is dubbed ‘Linux.Wifatch’ is like a normal malware and also behaves like one: infecting vulnerable devices, […]

Hacking Wireless Printers With Phones on Drones

YOU MIGHT THINK that working on a secured floor in a 30-story office tower puts you out of reach of Wi-Fi hackers out to steal your confidential documents. But researchers in Singapore have demonstrated how attackers using a drone plus a mobile phone could easily intercept documents sent to a seemingly inaccessible Wi-Fi printer. The […]

How to Hack and Decrypt WhatsApp Database on rooted devices

The post includes a detailed procedure to hack and decrypt WhatsApp Database remotely on rooted Android mobile devices. Very Interesting!. A few hours ago it has been published an interesting post on “How to Hack and Decrypt WhatsApp Database (Remotely) [ROOT]” that explains how to extract and decrypt WhatsApp database from a rooted Android system. […]

VW’s ‘neat hack’ exposes danger of corporate software

It was only old-fashioned detective work that forced Volkswagen to admit to the existence of its ‘defeat device’. And that should worry us all. For anyone interested in what is laughingly known as “corporate responsibility”, the Volkswagen emissions-fraud scandal is a gift that keeps on giving. Apart from the company’s Nazi past, its high status […]

How to do hacking attacks over satellite communications?

Hack Satellite comunication   In this article we will cover satellite based hacking attack which has been used by hacking groups since many years. This attack will provide you complete anonymity and thus it will be very difficult of the digital forensics experts to trace you. In the last article about hacking satellite traffic, we […]

HOW TO INTERCEPT SATELLITE COMMUNICATIONS EASILY?

In today world we use satellite communication in many respects and industries and we all know how important they are in our lives. There different kinds of satellites depending upon the distance from the earth and others depending upon their orbits. Circular and elliptical orbital are two kinds of orbital satellites. Also satellites are classified […]

Hackers Can Exploit Security Flaws In Drones To Hijack Flight Controller

Security flaws have been found in drones that could allow hackers to target and attack the flight controller which includes numerous sensors as well as the processing unit, reveals a research conducted by Oleg Petrovsky, Senior AV researcher of HP Security. We all know that there have been number of recent developments in the manufacturing […]

Car-Hacking Tool Turns Repair Shops Into Malware ‘Brothels’

the security research community has proven like never before that cars are vulnerable to hackers—via cellular Internet connections, intercepted smartphone signals, and even insurance dongles plugged into dashboards. Now an automotive security researcher is calling attention to yet another potential inroad to a car’s sensitive digital guts: the auto dealerships that sell and maintain those […]

Russian hackers tried to infiltrate Hillary Clinton’s home server

Hackers with links to Russia tried to infiltrate Hillary Rodham Clinton’s home e-mail server at least five times — even as other e-mails show her making cavalier jokes about Chinese hackers, according to the latest e-mails released by the State Department. The scammers sent Clinton five infected e-mails disguised as New York speeding tickets on […]

FBI: We unmasked and collared child porn creep on Tor with spy tool

Dark-web deadbeats may not be as anonymous as they think. A bloke in the US was charged on Friday after FBI spyware caught him downloading child sex abuse material. Luis Escobosa, of Staten Island, admitted to Feds he broke federal child pornography laws by viewing depraved photos on a hidden Tor service. Unknown to Escobosa, […]

XOR DDoS Attack Tool Being Used to Launch Over 20 Daily Attacks

Threat actors are using a previously discovered distributed denial-of-service (DDoS) attack tool dubbed XOR DDoS to launch upwards of 20 DoS attacks a day against targets in Asia and other parts of the world, new research showed. A High-Bandwidth DDoS Attack The attacks have ranged in bandwidth from less than 10 Gbps to over 150 […]