Browsing category

Hacked

Nasty Internet Explorer Bug Gives Away ‘Windows Admin Rights’ To Attackers

Microsoft has issued a warning that a severe remote code execution vulnerability (CVE-2019-1367) exists in its oldest browser, Internet Explorer. Taking its severity seriously, the company has even pushed an out-of-bound emergency patch. According to the advisory, the RCE vulnerability exists in the way the Internet Explorer’s scripting engine handles memory. It could lead to […]

This New Linux Malware Mines Crypto By Creating Malign Linux Modules

Cybersecurity research firm TrendMicro has come across a new Linux malware. The malware — Skidmap — is capable of illicit cryptocurrency mining activities. Skidmap is the new Linux malware in town As per the research, the new Linux malware mines crypto by creating malicious loadable kernel modules (LKM) to stay under the wraps. As the […]

Destructive Malware Botnet “Emotet” Is Making A Comeback

Emotet, a deadly malware botnet, has started a new spam email campaign after being underground for nearly four months, a security researcher confirmed to ZDNet. According to Raashid Bhat, Emotet is sending spam emails that are laced with malware attachments and/or download links to malware embedded files. Emotet is fully back in action and spamming. […]

‘Eva Richter’ Scam Encrypts Your Files By Posing As A Fake Resume

Opening a job email titled “Bewerbung via Arbeitsagentur – Eva Richter” (Application via Employment Agency – Eva Ritcher) could prove disastrous to you, according to a new report. Bleeping Computer, a website dedicated to reporting on Cybersecurity, confirmed the existence of an “Eva Ritcher” fake resume scam. The scam targets people in Germany by attaching […]

99% Email Attacks Require Human Interaction: Security Researchers

Email-based cyber attacks have become common these days. I am not the only one receiving emails saying that the file in the attachment contains data that I might be interested in knowing. Social engineering has become one of the major tools attackers use to lure targets into opening links or attachments. A report by Proofpoint […]

Apple Hits Back Hard At Google And Defends iOS Security

When Google revealed via its findings that Apple’s ecosystem isn’t as safe as we think it to be, it came as a shock to Apple. Responding to Google, Apple has defended its security system, clarifying that Apple ain’t here to take anyone’s shit. Apple’s response to Google Apple, via an official press release, has hinted […]

This Technique Claims To Make Passwords 14 Million% Tougher To Crack

Tide, an Australia-based non-profit organization has come up with a technique called ‘Splintering’ that claims to make usernames and passwords 14 million percent tougher to crack than the contemporary techniques. The technique involves breaking up encrypted usernames and passwords into tiny pieces and then storing them separately in a decentralized distributed network. The same technique […]

Facebook Data Leaks Again: Exposes Hundreds Of Millions Of Users’ Phone Numbers

An exposed server on the web was found leaking the data of hundreds of millions of Facebook users. First reported by TechCrunch, the exposed server was discovered by security researcher Sanyam Jain who said that the database contained phone numbers of some celebrities as well. Along with contact numbers, the database also contained Facebook IDs […]

Scammers Use AI To Fake CEO’s Voice, Transfer $243,000

We all know how AI has advanced over the years and is continuing to do so for a better future. While AI helps us in numerous ways, it also contributes to malicious activities as suggested by a new cybercriminal case. AI used in money fraud As hinted by a report by the Wall Street Journal, […]

Google and Amazon Smart Speakers Use “Surveillance” — Betaworks CEO

In an interview with Yahoo Finance Editor-in-Chief Andy Serwer, top tech investor and Betaworks CEO, John Borthwick said that the information gathering by smart devices from the likes of Google and Amazon is “surveillance.” “From a consumer standpoint, user standpoint, is that these– these [smart] devices are being used for what’s– it’s hard to call […]

This Chinese Face-Swapping App Looks Like A Privacy Nightmare

As Deepfake technology has gained traction lately, we have a new Chinese app that follows the same tech and could have privacy issues, following the popular Russian app FaceApp that made headlines. Chinese face-swapping app Zao The Chinese app was recently launched and is available via China’s Apple App Store. Developed by Momo Inc, the […]

iPhone Is Vulnerable! How Websites Have Been Hacking iPhones For Years?

Today, security researchers at Google shattered the common belief that iPhones are non-susceptible to hacking. The researchers have revealed that a number of websites were hacking iPhones secretly for the past two years using indiscriminate watering hole attacks. Discussing in a lengthy blog post, Google Project Zero’s Ian Beer says that the attack involved no […]

This Woman Hacked Capital One Servers To Mine Cryptocurrency

A couple of months back, ex-Amazon employee Paige Thompson was accused of gaining unauthorized access to the cloud servers of the US-based bank Capital One and 30 other entities. Thompson, who is currently in custody, was indicted on Wednesday and charged with Wire Fraud, Computer Fraud and Abuse. She will be presented in front of […]

Avast And French Cops Save 850,000 PCs From Retadup Crypto Malware

Avast has managed to take down the Retadup crypto-mining worm disinfecting more than 850,000 computers, with the help of French National Gendarmerie, the antivirus maker announced in a blog post. The security researchers at Avast discovered a design flaw in the communications protocol of Retadup that allowed the team to remove the malware from the […]

CamScanner Android App With 100M Downloads Found Loaded With Malware

We have often reported malicious Android apps and how Google ends up eradicating those apps from the Play Store. The trend we’ve noticed is that such malware apps always have a low download count. However, today’s story teaches us that even prominent Android apps, with more than 100 million downloads, can have malicious intent. Researchers […]

Hackers Force Web Host Hostinger To Reset 14 Million Users’ Passwords

Popular web hosting provider Hostinger had to reset passwords of 14 million users to a “random sequence of characters” as a precautionary measure following a massive data breach. The company has sent password recovery emails to the affected consumers. According to a blog post, Hostinger claims the massive breach took place on Thursday. The company […]

Hack Microsoft’s Chromium-based Edge And Get Paid Up To $30,000

A few days back, Microsoft released a new beta version of its Chromium Edge browser. Alongside this, the company also announced a huge bounty program for the researchers. According to the official blog post of Microsoft, finding vulnerabilities in the Chromium-based Internet Edge can gain researchers bounty rewards starting from $1,000 to $30,000. The new […]

Nasty Botnet Neutrino Caught Hacking Other Hackers’ Web Shells

A crypto mining botnet operation, going for almost a year, is hijacking web shells of other hackers, according to report from Positive Technologies. Researchers have linked the source of the dangerous botnet to Neutrino gang. Back in 2017, Neutrino (aka Kasidet) was a dangerous trojan that launched DDoS attacks, recorded keystrokes and installed malware on […]

Not So “Luscious Data Breach” Leaks Data Of 1.1 Million Users Globally

With data breaches becoming more common, a new one has been found taking place on a porn website, leaking data from over a million users. According to a research report by vpnMentor, pornographic website Luscious leaked 1.195 million users’ data without their knowledge. Luscious Data Breach It is suggested that the adult website allows users […]

This Innocent USB Charger Is A Hidden Surveillance Camera No One Can See

To tackle uninvited burglars and other intrusions, many people resort to installing closed-circuit TV cameras in their homes. But the problem with CCTV cameras is that many of these can be easily spotted and can alert the person you wish to track. There is also a breed of security cameras that can hide in plain […]