Browsing category

Hacked

OnePlus’ Website Hacked And User Data Accessed In Another Data Breach

The biggest smartphone maker OnePlus has disclosed a data breach where several users’ information was “accessed by an unauthorized party.” The data breach targeted the OnePlus online store as hackers gained access to the customer’s past orders. The information exposed might include customer names, email addresses, contact numbers, and shipping addresses. However, OnePlus has confirmed […]

Hackers Are Using ‘Donald Trump Screen Of Death’ To Spread Malware

Hackers are going crazy with malware campaigns of ransomware, screen lockers, remote access trojan that use political figures to attract victims, according to Cisco Talos. While the US President Donald Trump is the popular demand, security researchers say that Hillary Clinton and Russian President Vladimir Putin are also being used as a decoy. Despite political […]

5G Is Prone To Around 11 Security Flaws And We’re Worried

While 5G hasn’t fully arrived everywhere, we believe it will be better, faster, and more secure than its previous generation. However, new research suggests that the next-gen network is susceptible to various security issues and this could be slightly worrisome. 5G Has Security Flaws! According to a paper by researchers at the University of Iowa […]

Facebook App Caught Using iPhone’s Camera As User Scrolls Feed

A Twitter user @JoshuaMaddux has been making rounds in the news after he spotted Facebook’s iPhone app using the device’s camera when not required. His tweet was picked up by TNW, who were able to reproduce the issue on their iPhone. Found a @facebook #security & #privacy issue. When the app is open it actively […]

Microsoft Confirms Linux Will Get Microsoft Defender ATP Antivirus In 2020

Microsoft is working to bring its popular Microsoft Defender ATP antivirus to the Linux operating system. At its Ignite Conference, the Windows-maker company will give a live demo on how Linux security specialists can use the company’s homemade antivirus for protection against potential threats. Now, it makes sense why in March this year, Microsoft announced […]

New Laser Attack Compromises Alexa, Google Home, Siri Like A Boss

Digital assistants were created to ease our lives as they make most of our tasks hands-free. But sooner or later, hackers and security researchers have been able to compromise them (of course, hands-free!) if the tech companies themselves weren’t doing enough harm to people’s privacy. The latest addition to this is “Light Commands,” as its […]

Hackers Can Plant Malware In Your Android Smartphone Via NFC

Android devices have a not-so-common feature dubbed NFC Beam which is intended for sharing files, videos, apps and photos between two devices via NFC (Near Field Communication) radio waves. A bug (CVE-2019-2114) has affected the Android devices running Android 8.0 (Oreo) or above that allows a bad actor to plant malware on your smartphone via […]

NordVPN Users Fall Victim To Credential-Stuffing Attacks

The virtual private network service NordVPN recently disclosed a server hack that leaked crypto keys. In the past few weeks, the credentials of NordVPN users were circulated on online forums such as Pastebin. The stolen data contained email IDs, plain-text passwords, and other data associated with a user account. Now, almost 2,000 NordVPN users have […]

1.3 Million Indian Credit/Debit Cards Up For Sale On Dark Web

As part of one of the biggest card data dumps, around 1.3 million Indian bank cards have been put up for sale on a dark website called the Joker’s Stash. Joker’s Stash is one of the oldest card shops to buy and sell payment cards. Bank Cards Up For Sale! The card dump was discovered […]

Beware! This Android Malware Can’t Be Removed Even After Factory Reset

MalwareBytes has identified a new malware strain that has affected 45,000 Android devices to date. The malware dubbed xHelper is seven months old and has already reached the MalwareBytes’ top 10 list of malware in the month of August. According to security researchers, this malware has one of the most efficient methods to disguise itself […]

Beware! NordVPN Confirms Its Server Was Hacked

When it comes to protecting online privacy, many people prefer Virtual Private Networks or VPNs. However, how do you guarantee your internet privacy when VPN servers get hacked? NordVPN, one of the most popular VPNs used by millions of users around the world, has confirmed that one of its servers was hacked back in  March […]

You Are Being Continuously Tracked By Your Smart TVs: Here’s How

Just when we thought that only our smartphones and virtual assistants keep track of our activities, a new study pops up. The research suggests that the popular over-the-top services we use to watch web content we like, track us, and keep an eye on us while we keep ours on them. Yes, OTT Services Track […]

UNIX Co-Founder Ken Thompson’s BSD Password Finally Cracked

Ken Thompson, who co-created the popular operating system Unix along with Dennis Ritchie, remains a revered figure in the field of computer science. In 2014, famous open-source developer Leah Neukirchen got her hands on a /etc/password file from a BSD 3 source tree. It contained hashed passwords of some big names like Dennis Ritchie, Steve […]

TOR Project Removes 13.5% Of Its Network Servers: Here’s Why

The Tor Project has removed more than 800 servers that were running outdated and end-of-life (EOL) versions of the Tor software. These blacklisted servers account for nearly 13.5% of the 6,000+ in the Tor network that helps internet users anonymize traffic. About 750 of them belonged to Tor middle relays, whereas the other 62 are […]

Serious Flaw In Many D-Link Routers Won’t Be Patched: Are You Affected?

D-Link has refused to patch a serious security flaw that has affected the four models of its home routers. The vulnerability tagged as CVE-2019-16920 allows anyone to remotely execute code and gain access to the router. It has affected the following D-Link router models: D-Link DIR-655 D-Link DIR-866L D-Link DIR-652 D-Link DHP-1565 The flaw was […]

Twitter Accepts It Used Users’ 2FA Phone Numbers For Ad Targeting

As part of a new privacy breach that has surfaced recently, the micro-blogging site Twitter has admitted that it used users’ mobile numbers for ad targeting. Twitter’s “Inadvertent” Privacy Breach According to an official statement, Twitter said it made a “mistake” and unintentionally used users’ phone numbers and email addresses. Users provided the details for […]

Hacked Programmer Retaliates By Hacking Hackers Who Hacked Him

Everything you do comes back to you. It’s called karma – This stood true for a hacker who hacked a programmer and got hacked by him in return. Germany-based programmer Tobias Fromel who was affected by Muhstik ransomware, released around 3,000 decryption keys as well as the free decryptor software which he acquired by hacking the […]

This ‘Unpatchable’ Exploit Leads To Permanent Jailbreaking On iPhones

As part of a new discovery, a security researcher found an exploit dubbed Checkm8 (to be pronounced Checkmate), which can allow for permanent jailbreaking of iPhones, starting from the older iPhone 4s to the iPhone X. Checkm8 Jailbreak Exploit The new ‘unpatchable’ flaw has been discovered by a security researcher going by the name ‘Axi0mx’ […]

Thousands Of Windows PCs Affected By Rare Node.js-Based Malware

Microsoft has confirmed that a Node.js-based malware dubbed Nodersok has affected thousands of Windows PCs over several weeks. This new strain of malware performs click-fraud by installing a copy of Node.js framework and transforms systems into proxies. The malware was first spotted by the Microsoft Defender ATP Research team back in mid-July. According to Microsoft’s […]

Notorious GandCrab Ransomware Returns With A New Name

GandCrab was one of the most popular ransomware families in 2018 and 2019. The ransomware encrypted all the files on the target computer and demanded as much as $2,000 in Bitcoin or Dash for the decryption key. The authors behind GandCrab malware announced in June that they are scrapping the operations of the malware as […]