Browsing category

Data Security

Dyre Wolf malware bypasses 2FA Security, Manages to Steal $1million

Dyre Wolf malware, a dynamic campaign has been discovered by researchers, which already has raked in more than $1 million. This latest campaign utilizes a combo of social engineering and malware. The campaign has been dubbed as the Dyre Wolf campaign by IBM Security Researchers. According to them, this campaign targets businesses and firms that […]

Pirate Bay Clone Delivers Banking Malware Via WordPress Blogs

Remember the time when Swedish police took down The Pirate Bay in late 2014?  The online torrent files index and repository, IsoHunt announced its Open Bay Project, the idea behind this was “a new way for Internet users to work together so the torrenting service would always be available on a domain”.  But with The Pirate Bay is back online, it […]

How You CAN Delete Almost any video on YouTube

Recently Google announced its current experimental program named Vulnerability Research Grants (VRG). No doubt it is a great concept. In this program the security team of Google selects regular reporters and send them emails. The researchers then choose product/service from the list available in the email and investigate their chosen product/service’s security. Must Read: Hacking YouTube […]

Hotel Wi-Fi Can Threaten Your Laptop with Malware

Following Kaspersky Labs’ identification of a unit issuing attacks on distinct high-end hotel guests in Asia and the US, ANTLabs, a technology company based in Singapore, has recently uncovered that a number of their InnGate routers apparently possess a firmware authentication flaw. This means that their highly-regarded and widely-accepted InnGate routers now pose an imminent opportunity […]

FBI Wants Tech Companies to Disable Default Smartphone Encryption

Encryption should be Outlawed – FBI Retracts Support to Further Weaken Our Security. In the past when Apple started encrypting its iPhone by default, the step was lauded by the FBI as it ensured enhanced security. However, the FBI has revoked its support and now maintains that encryption of this type needs to be outlawed, […]

Lost ‘Sensitive’ Explosives Gear of U.S. Defense Dept. is Available on eBay for Sale

Recently, some high-profile military gear of the Defense Department of U.S went missing — A leaked US Naval Criminal Investigative Service (NCIS) document obtained by Intercept shows the gear is available online for selling on eBay. It also explains the incapability of the Defense Department to protect the explosives-sensing equipment. The equipment was given to the agency by […]

From Hacker to a Spy: What happens when a hacker is misunderstood for a spy

In March this year, Kaspersky Lab, an international software security group based in Russia and with business operations in more than 200 countries worldwide has recently been put in the spotlight for an accusation closely associating them with Russian intelligence agencies and thereby posing a threat to their very own US clients. Of course, Kaspersky […]

How To Steal Data and Information From Computers Via Heat

The security researchers at Ben Gurion University in Israel have identified the method of obtaining air-gapped system data through heat emissions and the built-in thermal sensors of a computer. The method has been named BitWhisper. Air-gapped systems that generally are not linked with other systems and are also isolated from the Internet can be utilized in circumstances […]

New Snowden Documents Expose Canada’s Hidden Cyber Warfare Strength

On Monday, CBC News and The Intercept collaboratively disclosed for the very first time how Canada has endorsed aggressive strategies for attacking, sabotaging and infiltrating their targeted computers. Thanks to New Snowden Documents. The Intercept obtained documents from the famous National Security Agency (NSA) whistle-blower Edward Snowden As per the new documents, Canada’s electronic surveillance agency has […]

ISIS Releases Hacked Hit List of 100 U.S. Military Personnel

ISIS Wants Supporters To Kill a Hundred of its “Hacked Hit List” U.S. Military Employees. The Islamic State (ISIS) posted the names, pictures and addresses of 100 U.S. military personnel urging its “brothers residing in America” to slay them. In response to this post, the Pentagon stated that an investigation into the matter was immediately […]

FREAK Attacks Still a Threat for Hundreds of iOS and Android Apps

Apparently, a majority of iOS and Android apps are still potentially vulnerable to dangerous FREAK attacks that can easily compromise encrypted data. The problem emerges from the fact that the apps haven’t been fixed against the FREAK (Factoring) attack. This attack was identified on RSA-EXPORT keys by researchers on 13th March. Researchers at FireEye, a […]

On-Demand passwords and e2e encryption source code Launched by Yahoo

Yahoo made two major announcements this week regarding its security protocol. One was the launching of the new “on-demand” password service and the other was the release of Yahoo mail’s end-to-end encryption source code that is available on GitHub. The product management director for Yahoo, Chris Stoner, explained that the company’s on-demand password service is […]

Here is a list of URLs used by the NSA to install malware on PCs worldwide

Last month security researchers discovered an undetectable malware installed in the hard drives by the American National Security Agency (NSA) to spy on people around the world. Those findings were indeed serious but there is another light to the story.  Researcher at Kaspersky Labs have discovered a list of domains used by the NSA to install malware […]

BEWRE: Worm Being Spread via Facebook

Facebook users, if you have clicked the Ow.ly link (URL shortening service) then you might have gotten your computers infected by a worm. The link is being spread by attackers through a post that promises one-of-its-kind of pornographic content. The post is being shared via numerous prominent social media networks such as Twitter and Facebook, reports Malwarebytes. MUST READ: Facebook Login […]

Beware– This Killer USB Drive Can Fry Your Laptop

The killer USB Drive has been designed especially to burn laptops – So be careful while inserting someone’s USB on your laptop. Have you heard about the subway USB theft? In case you haven’t let us tell you that someone took a flash drive from a passenger while both were travelling. The drive was later plugged by the […]

‘Snowden Phone’ by FreedomPop vows to encrypt your calls and data

US Consumers looking for a wireless steal can now get encrypted free monthly phone service thanks to FreedomPop, the firm behind the market new entrant “Snowden Phone.” FreedomPop allows Americans to use free cellphone service. In March 2014, Los Angeles start-up FreedomPop benefitted from rising public concerns regarding mass surveillance with its Privacy Phone, which […]