Browsing category

Data Security

Ashley Madison Hack Latest Reminder Stupid Passwords Are Stupid

The recent hack of fembot dating extramarital affairs website Ashley Madison, which resulted in data from millions of accounts being dumped online, has one more salutary yet familiar lesson to deliver: even very well encrypted stupid passwords are still stupid. While plenty of aspects of Ashley Madison’s business and operations have raised eyebrows, the firm did apparently use robust and respected encryption for its […]

Self-Driving Cars Are Hackable

Jonathan Petit, security researcher at Security Innovation, Inc., has revealed he can easily fool the LiDAR sensors on any self-driving car to slow down or abruptly stop by sending it a simple laser pulse. LiDAR stands for Light Detection and Ranging and is a sensing technology that can measure the distance of an object by […]

Coder pleads guilty to writing Gozi banking trojan

A man credited with helping to create the infamous Gozi banking malware has pled guilty in a US court. Deniss Calovskis, 30, of Latvia was arrested November 2012 and spent 10 months in the Baltic state’s cooler before being extradited to the USA where he’s been behind bars ever since. Last Friday Calovskis appeared in […]

‘UNSW is drunk’: Facebook page gets hacked on university’s Open Day

UNSW staff had to scramble to contain an embarrassing outbreak of undergraduate humour, after the university’s Facebook page was hacked on its annual open day. As the university prepared to showcase its faculties and grounds to thousands of potential students, its Facebook page was infiltrated by images of scantily clad women, cleavages and bare backsides, causing concern among […]

Detecting an asymmetric Curve25519 backdoor in RSA key generation algorithms

While working on some forthcoming research on cryptographic backdoors i came across an interesting asymmetric backdoor designed to subvert RSA key generation algorithms by Ryan Castellucci. The backdoor is particularly interesting because unlike backdoors which subvert key generation by weakening the composite public modulus (eg. choosing prime numbers too close to eachother, choosing a common […]

24 Chinese Android Smartphones Models Come With Pre-Installed Malware

G DATA security experts published their latest research in which they’ve analyzed top Chinese Android smartphone models and found that a large number of them ship with pre-installed malware and spyware. According to G DATA’s team, their interest in this matter was first sparked when in 2014, the Star N9500 smartphone was found to be […]

Chrysler Catches Flak for Patching Hack Via Mailed USB

Six weeks after hackers revealed vulnerabilities in a 2014 Jeep Cherokee that they could use to take over its transmission and brakes, Chrysler has pushed out its patch for that epic exploit. Now it’s getting another round of criticism for what some are calling a sloppy method of distributing that patch: On more than a […]

New Android Ransomware Communicates over XMPP

A new strain of Android ransomware disguised as a video player app uses a means of communication unseen in other similar malware. Most of the victims are in the United States and the mobile crypto-ransomware scam seems to be profitable according to researchers at Check Point Software Technologies, who said that tens of thousands of […]

Sony Pictures reaches settlement with ex-employees over hacking

The hack revealed the inner workings of the studio, as well as the personal information of more than 47,000 celebrities, freelancers, and current and former Sony employees. Sony Pictures has reached a settlement agreement with nine former employees who sued the studio claiming their personal information was stolen in a hack last year related to […]

CoreBot Can Steal Your Credentials, Download and Execute Malware

CoreBot is a new malware that steals user credentials and have the ability to cause a great amount of trouble. This stealer malware is specifically designed with ample strength that it is quite easy to steal data from targeted victim and have the capability to control the computer, reveals a security report published by IBM. […]

Microsoft slips user-tracking tools into Windows 7, 8 amidst Windows 10 privacy storm

Worried about Windows 10’s deep-reaching user tracking? Some of it’s coming to Windows 7 and 8, too. Windows 10 is a deliciously good operating system, all things considered, but its abundant user-tracking has prompted many privacy-minded individuals to stay pat with older versions of Windows. Now, Microsoft’s providing those concerned individuals a reason to upgrade. […]

Lizard Squad cyber-attackers disrupt National Crime Agency website

Cyber-attackers launch Distributed Denial of Service (DDoS) violation on law enforcement agency in apparent revenge for previous arrests. Cyber-attackers have taken down the website of the National Crime Agency (NCA) in apparent revenge for arrests made last week. The NCA website was temporarily down on Tuesday morning, four days after six teenagers were released on […]

Shifu: ‘Masterful’ New Banking Trojan Is Attacking 14 Japanese Banks

A brand-new advanced banking Trojan discovered in the wild has been named “Shifu” by IBM Security X-Force, after the Japanese word for thief. The malware appears to have been active since as early as April 2015; it was unearthed by IBM Security antifraud platforms through continuous protection of customer endpoints all over the world. Shifu currently […]

ORX Locker, the new Darknet Ransomware-as-a-service platform

Security experts at Sensecy have uncovered ORX-Locker, a Darknet Ransomware-as-a-service platform that could allow everyone to become a cyber criminal. It is becoming even easier to become a cyber-criminal thanks to the model of sale known as malware-as-a-service that offers off-the-shelf malware for rent or sale. Recently malware authors started to offer also Ransomware-as-a-Service (RaaS), […]

Hackers Linked to Russian Government Impersonate EFF Website to Spread Malware

The Electronic Frontier Foundation (EFF) has issued an alert, urging users to watch out for a spear phishing email campaign that’s infecting victims with the Sednit malware. This was brought to EFF’s attention by Google’s security team, after the electronicfrontierfoundation.org domain was flagged in one of their routine scans. The official EFF domain name is […]

Russian-speaking hackers breach 97 websites, many of them dating ones

ussian-speaking hackers have breached 97 websites, mostly dating-related, and stolen login credentials, putting hundreds of thousands of users at risk. Many of the websites are niche dating ones similar to Ashley Madison, according to a list compiled by Hold Security, a Wisconsin-based company that specializes in analyzing data breaches. A few are job-related sites. Batches […]

Fake EFF Website Found Targeting Users with Espionage Malware

A website domain has been discovered by Google’s cyber-security team to be impersonating the Electronic Frontier Foundation (EFF). Registered on August 4, 2015, electronicfrontierfoundation.org has since been targeting unknown victims with a spear phishing attack and spreading malware into their systems. [must url=”https://www.hackread.com/fake-bbc-website-lures-victims-with-charlie-hebdo-misinfo/”]Fake BBC Website lures victims with Charlie Hebdo misinformation[/must] Unfortunately, the domain seems […]

How a crook could have taken over your Facebook pages

It’s the third bug of the year for Facebook bounty hunter Laxman Muthiyah. At the start of 2015 he noticed that if you could view a photo album on Facebook, you could probably delete it as well, with or without permission. Simply put, as long as you were authenticated by Facebook to delete somephotos, you […]