Browsing category

Hacked

11-Year-Old Changes Election Results On Florida’s Website: DefCon 2018

Defcon 2018, one of the most popular hacking conferences, is going on in Las Vegas. The conference, every year, sees famous hackers from around the world exhibiting their skills. This year, an 11-year-old shook the whole United States after he hacked and altered election results on a replica of Florida state election website within just […]

Black Hat 2018: A Pacemaker Hack That Can Stop The Heart

Hackers from all over the world flocked to the Black Hat 2018 security conference that was held in Las Vegas this week. There, two researchers revealed a pacemaker hack that makes it possible for attackers to remotely install malicious updates. It causes the device to malfunction by delivering additional shocks or denying it which can […]

Windows Lock Screen Bypassed Using Cortana Vulnerability; Already Patched

In another interesting research work presented at Black Hat USA 2018, a group of researchers from Kzen Networks and Isreal Institute of Technology’s Ron Marcovich and Yuval Ron has revealed a flaw in Cortana that allowed them to bypass the lock screen and execute arbitrary codes. Dubbed as ‘Open Sesame,’ the flaw exploits a computer […]

WhatsApp Vulnerability Lets Attackers Alter Your Messages And Spread Fake News

A new vulnerability has surfaced in WhatsApp’s encryption method that allows attackers to alter messages and user identities in group chats. This could prove devastating as attackers could potentially harm people sending false texts. We have already seen how fake messages circulated on WhatsApp took several lives in India which forced the Facebook-owned company to […]

DeepLocker: Here’s How AI Could ‘Help’ Malware To Attack Stealthily

By this time, we have realized how artificial intelligence is a boon and a bane at the same time. Computers have become capable of performing things that human beings cannot. It is not tough to imagine a world where you AI could program human beings; thanks to sci-fi television series available lately. What happens when […]

Snapchat’s Source Code Leaked Online, Archived on Github

Hackers leave no chance of obtaining the source codes of popular apps as they aren’t public. However, in a recent incident, someone has archived Snapchat’s source code and posted it on Github. The incident was confirmed by the social networking app to Motherboard on Tuesday. The hackers got hold of the code after the app […]

This Tool Stops Your Data From Passing Through Surveillance-Happy Countries

Many of us already know that the internet traffic passes through different countries before reaching its destination. But did you know that while it does so, the internet data becomes subject to the domestic laws of the country it’s passing and activities such as online surveillance and censorship laws? Well, it does and has become […]

CCleaner Facing Backlash For User Data Collection And Active Monitoring

Ever since Avast acquired Piriform’s CCleaner, users have been complaining of the software going downhill as they often encounter annoying ads and malware in it. Now, the popular system cleaning tool is facing a backlash from users for the latest ‘improvements’ introduced in the software. The latest update to v5.45 in the free version of […]

Reddit Hacked: Here’s How To Know If You Were Compromised

The popular news aggregator website Reddit has revealed that it suffered a data breach between June 14 and 18. While Reddit calls the attack “serious,” it hasn’t disclosed the number of users affected and said no data was altered. The hacker got read-only access to “some systems that contained backup data, source code, and other logs.” […]

Google Launches ‘Titan Security Key’ To Boost Your Online Security

Google has launched the public version of the security key used to protect its 85,000 employees from phishing and other cyber attacks during internal testing. Named Titan, it falls under the category of physical security keys that are known to provide better protection than other forms of 2-step verification including OTPs. Titan can be used […]

Hacking Unattended Laptop In Under 5 minutes: Researcher Shows How

We all are aware of the cyberhacking and phishing that takes place in the digital world. And safeguarding us from petty hacks is always a few clicks away. But what about real-world hacking like literally physically hacking into the hardware. Ever thought about that? A security firm Eclypsium posted a video on Youtube shocking laptop users […]

Here’s Why Chrome Is Now Showing Millions of Websites As “Not Secure”

Google is taking the privacy quite seriously, and the new Chrome security update will undoubtedly put a significant toll on all your favorite websites. Google Chrome just launched a security feature with the release of Chrome 68. From now on, Chrome web browser will label all HTTP sites as “not secure.” All the HTTPS websites […]

Amazon, Reddit And Others Fail To Warn Us About Dumb Passwords

Believe it or not, there is still a large number of people who use passwords such as “password,” “password123”, “[dog’s name]1” and others along the same lines. And in the era of sophisticated hacking, these passwords are not exactly “safe.” Before me, this is the first thing websites should inform you while setting up a password. But apparently, many […]

Rewritten GandCrab Ransomware Targets SMB Vulnerabilities To Attack Faster

GandCrab ransomware, which has created a hullabaloo in the cybersecurity industry by constantly evolving, has yet again caused a commotion. The latest version of the ransomware attacks system using SMB exploit spreader via compromised websites. The ransomware is adding new features every day to target different countries. The attackers behind the ransomware are scanning the […]

Malware Attack On Arch Linux AUR Repository; Three Packages Infected So Far

Arch Linux software repository named Arch User Repository (AUR) has been infected by malware. As many as three Arch Linux packages available on the repository have been reported to contain malware. The repository has user-submitted packages, and that is how the malware was released in the repository. A user named “xeactor” took over an ‘orphaned’ […]

WellMess: This Go-based Malware Attacks Both Linux And Windows Machines

There’s no doubt that Linux and Mac are more secure operating system choices as opposed to Microsoft Windows. But this doesn’t mean that hackers don’t find ways to infect the machines running these operating systems — in the past, we came across the massive Mirai botnet that controlled the networking devices running Linux. Mirai creators […]