Browsing category

Data Security

Hackers target Forbes visitors through chained Flash and IE Zero-days vulnerabilities

Hackers pieced together zero-day vulnerabilities in Flash and Internet Explorer 9+ to attack financial services and defense contractor employees visiting Forbes.com, according to security firm researchers, Invincea and iSIGHT Partners. In November 2014, the site’s Thought of the Day (ToTD) page, which is displayed briefly upon visiting the site, was compromised. On first visit to […]

Kali Linux 1.1.0 Released! Download Now

The developers at Offensive Security are back with yet another great version of Debian-derived Linux distribution Kali Linux version 1.10.  Kali Linux 1.1.0 was released two days ago with additional features with a mix of unprecedented hardware support and rock solid stability. It runs of a 3.18 kernel, specially developed for wireless infection attacks. Here is a complete […]

New Adobe Flash 0-Day Using Dailymotion.com In Malvertising Campaign

Adobe Flash Player has again seen a zero-day exploit that has appeared in the field due to a critical vulnerability that enables drive-by-download attacks. The U.S seems to be teeming with a malvertising-based attack having its foundations on the exploit. It is Adobe Flash Player 16.0.0.296 and earlier versions for the Windows and the Mac […]

WhatsApp Web has vulnerability that could expose user photos

Uploading Photos on WhatsApp Web Risky as Privacy Lapses Discovered: WhatsApp Web: WhatsApp Web is a new service launched by WhatsApp. It allows users to sync their mobile and desktop devices with the messaging app. In its blogpost dated 21st January, 2015, WhatsApp announced the new web client and noted that WhatsApp Web “mirrors conversations […]

Linux Distributions at Risk due to Ghost Vulnerability

Security vendor Qualys announced on Tuesday that a flaw in the popular component of many Linux distributions which would ultimately allow hackers to control a system remotely through just sending an email that contains malware. This vulnerability, named “Ghost”, is in the GNU C Library called glibc. This is a C library that basically defines […]

Anti-NSA Blackphone can be hacked through a text message

The mobile device BlackPhone, which was marketed as a super secure phone, has just had to run a patch to fix a vulnerability which allowed hackers to compromise the devices. The malicious code was able to attack the devices through no more than the Silent Text application. The BlackPhone device is actually a target for […]

Do not click ‘Hottest Leaked Snapchats’ links on Facebook

Users hoping to see saucy “leaked” footages and pictures of celebs may fall prey to identity fraud- Warns Security Firm BitDefender Facebook users are in for a surprise if only they click on links promising never-seen-before nude pictures of celebrities from popular messaging app SnapChat. Renowned security firm BitDefender claims that this latest breed of […]

#JeSuisCharlie Being Used by Hackers To Spread Malware

This news bit strengthens the presumption that hackers can make use of just about anything to fulfill their malicious motives. After the occurrence of Charlie Hebdo attack in Paris last week, what followed suite was the trending of #JeSuisCharlie. It became more like a display of solidarity. However, along with journalists, malwareorganizations are also following this viral trend […]

Russian Spear-Fishing Website Hosts Outlook Web App Phishing Page

Originally this Russian website was designed for purely non-controversial spear-fishing activities, but now its log-in page has been compromised and displays a phishing page. The agenda of this campaign is to steal login details of Outlook Web App. Read More: Your Office Document may be Vulnerable to Malware: Warns Microsoft The Scam: According to security researchers […]

LA Police’ New Taser Records Footage If Fired

The Los Angeles Police Department has ordered some Tasers with built-in cameras that can actually record if the Taser is used. This comes right after the LAPD announced that it intended to buy around 8,000 body cameras just recently. The department has now placed an order for 3,000 Taser X26P smart weapons. When it is connected by Bluetooth, the […]

Fake BBC Website lures victims with Charlie Hebdo misinformation

A website mimicking the official BBC News site has garnered immense traffic earlier this week through false information about Charley Hebdo massacre and it is likely that the fake website may be a facade for cyber criminal activities, according to a report from a cybersecurity firm. The identical website(bbc-news[.]co[.]uk) carried a fake story claiming the […]

ASUS routers can be easily hacked due to vulnerable firmware

VULNERABLE FIRMWARE MAKES ASUS ROUTERS SUBJECT TO ATTACK. Wireless router models running the Asuswrt firmware are vulnerable to attacks where hackers can completely compromise the devices if the attack is launched from within the local networks of the routers. Infosvr, the service running on the routers, is used by the Asus Wireless Router Device Discovery […]

CISPA Is Being Revived in Wake of Sony Hack

Leading Democratic Congressman, Dutch Ruppersberger, is calling for the revival of CISPA, The Cyber Intelligence Sharing and Protection Act. The Maryland Congressman and top-level Democrat on the House Intelligence Committee made this statement following recent cyber-attacks including the one on Sony Pictures Entertainment, which the FBI openly blames on North Korea. Read More: FBI formally blames North Korea for […]

Warning: Beware of Malware Planted In Chinese E-Cigarettes.

Electronic cigarette manufacturers may have highlighted its numerous benefits to letting you lead a healthy, stress-free life, what they certainly did not highlight was that the device can be used for malware distribution as well. Electronic cigarettes, popularly known as e-cigarettes, produce vapors simulating smoke of a real cigarette and to do this the device […]

Microsoft fixes security flaw in Windows that existed for 19 years

Microsoft has released an emergency update on Tuesday to patch a security flaw in the Windows operating system (that remained unnoticed for 19 years). Amazingly, this vulnerability was present in every version of Windows including Windows 95 to Windows 8, allowing hackers to take control of any computer remotely whenever a user visits a malicious website. […]

Creepy website shows live footage from 73,000 Private Security Cameras

Security cameras with default passwords are a threat to your privacy — A site has indexed 73,011 unsecured cameras in 256 countries around the world. The unsecured cameras refer to cameras secured with default passwords. The site with a Russian IP address has indexed the details of the cameras such as manufacturers, locations, IP addresses and […]

WireLurker: Apple Malware Infecting Mac and iPhone via USB

Apple is usually known for its top notch security but a US-based cyber security software developer Palo Alto Networks discovered a new malware targeting Apple products such as iPhone, iPad (iOS) and MAC (OS X). The name of this malware is WireLurker. It installs malicious third-party apps on iPads and iPhones targeting users in China, […]

Shellshock Bash Bug Leaves Almost Every User on The Internet Vulnerable

They call it Shellshock bug, they say it is way more dangerous than the previous Heartbleed bug which left all the secure SSL system vulnerable, but this bug has power to compromise any system and run commands to install malicious softwares on your device or computer. Hackers may already be accessing people’s personal data by exploiting […]

Dangerous Malware steals credit card information from Android devices

Security experts at Dr. Web have warned Android users to be careful with a new Trojan that is stealing credit card details while making a transaction on Google Play store. It is currently targeting Russian users but a little bit of modification can let the criminals target people around the world. The Trojan comes in the […]