Browsing category

Incidents

SpyNote Android Trojan Builder Leaked

Our team recently discovered a new Android Trojan called SpyNote which facilitates remote spying. The builder, which creates new versions of the malware, recently leaked on several malware discussion forums. SpyNote is similar to OmniRat and DroidJack, which are RATs (remote administration tools) that allow malware owners to gain remote administrative control of an Android […]

QRLJacking — Hacking Technique to Hijack QR Code Based Quick Login System

Do you know that you can access your WeChat, Line and WhatsApp chats on your desktop as well using an entirely different, but fastest authentication system? It’s SQRL, or Secure Quick Response Login, a QR-code-based authentication system that allows users to quickly sign into a website without having to memorize or type in any username […]

Another media-stealing app found on Google Play

The HTML Source Code Viewer app by Sunuba Gaming poses as a development tool then steals pictures and videos from mobile devices. Last time we blogged about malware on Google Play that stole photos from Viber. Since then we’ve discovered another app on Google Play that is moving personal media files (photos and videos) off […]

Attack With WPAD Protocol and PAC Files Can Leak HTTPS Traffic

Attackers can collect your HTTPS Web traffic history. Alex Chapman and Paul Stone from Context, a UK cyber security consultancy firm, have discovered a new attack method using the WPAD protocol and PAC files to leak information about the HTTPS sites a user is visiting. Their discovery is yet another drop in the lake of exploits […]

Keys to Chimera ransomware leaked

When ransomware authors compete on the black market, sometimes victims benefit. This time we got access to private keys of the Chimera ransomware. They have been leaked online and shared by another cybercriminal – known for being the author of Petya. The person under the handle JanusSecretary, made a public announcement on Twitter today: However, as […]

Hackers steal 1.6 million Clash of Kings forum accounts

The official forum for the popular mobile game Clash of Kings is the latest to fall victim to a cyberattack after a hacker broke through its defenses and managed to obtain the user data of around 1.6 million accounts. The hack occurred on July 14 and the security breach was made known to the website […]

Bug hunter downloaded the entire Vine source code

The Indian security expert and bug hunter Avinash has accessed and downloaded the entire Vine source code and it was really easy. A hacker has accessed and downloaded the source code of the Twitter’s Vine application. Vine is a short-form video sharing service, acquired by Twitter in 2012, that allows users to share small videos of 6 seconds […]

Meet One of the Anonymous Hackers Bombarding ISIS Websites With DDoS Attacks

Softpedia spoke with Rebirth, co-founder of BinarySec. The Anonymous #OpISIS campaign seemed at one point to have slowly died out after the Charlie Hebdo, Paris, and Belgium attacks, but i is once again in the news following the gruesome attacks in Istanbul, Baghdad, Nice, Würzburg, and yesterday in Munich. Unknown to many is that this Anonymous […]

3D printing of a dead man’s fingers allows unlocking his phone

The US federal authorities asked a 3D printing lab to recreate a dead man’s fingers to unlock his smartphone … will it work? Do you remember the battle Apple vs FBI conducted to force the IT giant on unlocking the San Bernardino Shooter’s iPhone, well it has become a story of the past. The federal authorities […]

Snowden Presents Anti-Spying iPhone Case Attachment

Device was specifically designed for journalists. Infamous NSA whistleblower Edward Snowden and hardware hacker Andrew ‘bunnie’ Huang have presented today at MIT’s Media Lab a new concept for an iPhone hardware case that will prevent surveillance via radio signals. The device is nothing more than a case extension that gets plugged into the iPhone’s SIM card […]

How Apple And Facebook Got KickassTorrents Founder Arrested

Short Bytes: The founder of the world’s largest torrent hosting website KickassTorrents is now behind the bars. The cause of his arrest are the legal purchases he made on Apple’s iTunes Store which helped the homeland security department to track him down. An iTunes purchase may land you in the prison — it is the […]

Why It May Be Worth Paying The Ransom In A Ransomware Attack

Australia is being hit hard by ransomware attacks and we’ve heard a lot of security vendors advise against paying the ransom that cybercriminals demand to decrypt locked files. But RSA CTO Zulfikar Ramzan thinks it’s better to just pay up. Here’s why. Ransomware has become a popular tool for cybercriminals to make money, mainly because […]

DDoS Attack Takes Down US Congress Website for Three Days

Library of Congress and Copyright Office also affected. The US Congress has just recovered after a three-day-long DDoS attack that has crippled its online portal congress.gov, along with adjacent sites such as the US Library of Congress (loc.gov), and the US Copyright Office (coypright.gov). The attack started on Sunday evening, July 17, and had initially targeted […]

Steem Social Network Hacked, User Funds Stolen, DDoS Attack Followed After

Company promises to refund affected users. Steemit, a relatively small social network, announced last Thursday, on July 14, that an unknown attacker had managed to hack its network and steal some of its users’ funds. Steem is a new kind of technology that powers the Steemit social network and works by rewarding users that post popular […]

Hacking 3D Printers Is Just Another Way to Destroy Modern Companies

Nothing is safe nowadays, not even 3D printers. A hacker could breach a company’s network, hack into a 3D printer, and alter small operational details to produce defective products that could lead to a company going bankrupt. This is a new type of cyber-attack described in a research paper called Manufacturing and Security Challenges in 3D […]

Hackers Steal Data from Polish Defence Ministry and Ask for $50,000 Ransom

Some of the data looks legit, some looked fake. A group of hackers who call themselves “Pravyy Sector” [Right Sector] are extorting the Polish Government on Twitter, threatening to release data stolen from Poland’s Defence Ministry if the government doesn’t pay $50,000, either to a Ukrainian bank account or a Bitcoin address. The name Right […]

Russians and Malware Involved in $2 Million ATM Heist in Taiwan

ATM transactions suspended in Taiwan for two days. Taiwan’s top eight banks have suspended operations on 900 ATMs after crooks stole NT$70 million ($2.18 million) from 20 branches across two cities over the weekend. The heists took place on Saturday and Sunday, July 9 and 10, 2016, and targeted the branches of Taiwan’s First Bank and […]

Now it’s easy to see if leaked passwords work on other sites

Freely available tool follows the release of more than 642 million account credentials. Over the past few months, a cluster of megabreaches has dumped account credentials for a mind-boggling 642 million accounts into the public domain, where they can then be used to compromise other accounts that are protected by the same password. Now, there’s […]

Ghost Squad hackers dox United Cyber Caliphate including Mauritania Attacker

Hacktivists from Ghost Squad Hacker group made revealed the identities of hackers affiliated with the ISIS cyber army called United Cyber Caliphate. Ghost Squad Hackers (GSH), a hacktivist group made public the identities of hackers affiliated with the ISIS cyber army called United Cyber Caliphate,including leader Mauritania Attacker. Prior to this, Ghost Squad Hackers had […]