Browsing category

Hacked

Dozens Of Popular iPhone Apps Caught Selling Your Location Data: Here’s What To Do

A group of researchers from the security firm GuardianApp has found that dozens of popular iPhone applications are selling the location data of the users to the third-party monetization firms. The report suggests that these apps use packaged code provided by these firms to collect precise location histories from millions of devices. While these apps first […]

Tesla Launches Bounty Program; Allows Good Faith Hackers To Inspect Firmware

Tesla announced on Twitter that they are launching a bug bounty program and are allowing “good faith” researchers to probe into its vehicles’ firmware to identify the vulnerabilities in the code. As long as your work complies with our bug bounty policy, Tesla will not void your warranty if you hack our software https://t.co/HhibE1UpRC https://t.co/NIISSrrViD […]

North Korean Hacker Charged Over WannaCry Attack And Sony Hacking

The U.S. has charged and sanctioned a North Korean hacker who is accused of being responsible for the infamous WannaCry Cyberattacks of 2017 and the 2014 cyberassault on Sony Corp. The man named Park Jin Kyok who is the part of the Lazarus Group, a team of hackers, has been sanctioned under the strategy devised […]

Shahid Kapoor’s Instagram & Twitter Accounts Hacked; Kriti Sanon Also Targeted

All the major tech giants appear to be doing everything in their power to improve the user security and privacy; Google just launched their strong password suggestions to maximize sign-in credentials further. But at the end of the day, the ultimate responsibility to keep passwords safe lies in the users’ hands. In a shocking development, […]

How Hackers Can Spy On You By “Listening” To LCD Screens

You might have come across the term side-channel attacks while reading news articles on Spectre and Meltdown. These exploits were possible due to the way Speculative Execution was implemented in Intel CPUs. Here, I’ll be telling you a new type of “physical” side-channel attack. In such an attack, the hackers can steal the information stored on your […]

Android 9 Pie Safe From The WiFi Bug That Leaks Sensitive Data

Researchers have discovered a vulnerability in all Android versions except Android 9, which could allow attackers to capture WiFi broadcast data and even pinpoint geolocation of users — all of this without user’s consent. Nightwatch Cybersecurity posted a security advisory about the bug  CVE-2018-9489, which states how the broadcasted information for installed Android apps can cause the device to […]

Firefox Browser Will Soon Block All Web Trackers By Default

There’s no denying the fact that data collection on the web is one of the fundamental ways how our Internet actually works. But then comes the practice of unchecked data collection, which brings along tons of negative impacts like performance impact and data breaches. It seems that Mozilla is planning to block all kinds of […]

How These Android Smartphone Can Be Hacked With Simple AT commands

According to a research, millions of Android devices from 11 OEMs are vulnerable to attacks from simple AT commands. These AT commands or Attention commands are a short collection of strings which were designed to transmit via phone line and modems, back in the 1980s. Earlier, these commands were used for a modem dial-up, hang up, […]

Windows Task Scheduler Zero-Day Exposed; No Patch Available

A zero-day flaw has been revealed by a Twitter user SandboxEscaper, for the Windows Task Scheduler in 64-bit Windows 10 and Windows Server 2016 systems. Apparently, this vulnerability is out in the wild, and there are no known patches or specific workarounds at present. US-CERT has confirmed that the exploit works on 64-bit Windows 10 and Windows […]

Your Smart Electricity Meters Can Track Every Activity, Court Ruling Warns

Nowadays, smart devices have taken the wicked roads, contrary to the original plan of helping the citizens of the world. A few days back, we heard how remotely controlled home devices, doorbells, and thermostats are being used to inculcate fear among domestic abuse victims. Now another acute case of smart devices has come to light where a […]

Google Found A Serious Security Flaw In Fortnite Installer For Android

Epic Games’ decision to make its popular game Fortnite available on Android through its own website instead of Google Play Store seems to have backfired. Google has publicly disclosed an extremely dangerous security flaw in Fortnite’s installer that allows attackers to download anything on an Android phone. This flaw lets any app on your phone to […]

Android Spyware ‘Triout’ Records Phone Calls, Steal Pictures & Texts

Researchers at Bitdefender have identified a new powerful Android spyware named ‘Triout.’ It can secretly record phone calls, collect pictures, videos, text messages and as well as GPS coordinates of the victims and send it back to attackers. Triout has been active since May this year and is circulated through a fake Android app which was […]

USBHarpoon: How “Innocent” USB Cables Can Be Manipulated To Inject Malware

A researcher from SYON Security has managed to build a modified USB charging cable that will enable hackers to transfer malware on your PC without you even noticing it. Under the hood is the infamous BadUSB vulnerability. Back in Black Hat Conference 2014, crypto specialists Karsten Nohl and Jakob Lell introduced the world with the concept of BadUSB — […]

Add-on Recommended By Mozilla Caught Logging Users’ Browsing History

According to the reports by Mike Kuketz, an independent security blogger from Germany and uBlock Origin, an add-on named “Web Security” has been caught collecting users’ browsing history. The add-on’s description says that it is meant for protecting users from malware, tampered websites or phishing sites that are a threat to your data. Interestingly, the Web Security […]

Spectre-like “Foreshadow” Flaw In Intel CPUs Can Leak Your Secrets

When the Spectre and Meltdown security flaws in Intel chips were disclosed earlier this year, security researchers called it a loophole so big that it’ll keep leaking for some considerable time in the future as well. Over the course of following months, that prediction turned out to be true and we are still witnessing similar […]

Google Is Tracking You Non-stop Even If You Tell It Not To: Report

While using your Android or iOS device, if you choose the option to pause the location sharing, what are your expectations? While this option seems pretty straightforward and apparently tells you that your smartphone isn’t collecting your location history, the reality is much scarier. A report from Associated Press tells that Google and its services […]

25 Smartphone Models Found Shipping With Severe Firmware Flaws: Defcon 2018

This year’s Defcon witnessed many interesting events, including the hacking of voting machines by 11-year-olds and macOS’s vulnerabilities to grant permissions to Malware with the help of invisible clicks. In another interesting event at Defcon 2018, security researchers from US Mobile and IoT security firm Kryptowire have unearthed the fact that the default apps of […]

Defcon 2018: Hacker Exploits Vulnerabilities In macOS With “Invisible Clicks”

At Defcon 2018, ex-NSA staffer and a popular Mac hacker Patrick Wardle presented his research work which involved bypassing the layers of security in macOS that are meant for blocking malware from spreading in the system with the help of synthetic clicks. Every OS has a mechanism that prevents hackers’ intention of stealing the sensitive […]