Browsing category

Articles

jQuery hacked: Site was hit, but not the library

The official blog of jQuery—most popular JavaScript library used by millions of websites—has been hacked by some unknown hackers, using the pseudonym “str0ng” and “n3tr1x.” jQuery’s blog website (blog.jquery.com) runs on WordPress—the world’s most popular content management system (CMS) used by millions of websites. While there is no evidence yet if the server (code.jquery.com) that […]

Ethereum phishing attack that earns $15K in two hours

Wesley Neelen (security researcher) has received a phishing email that seems to be from the legal online Ethereum wallet site Myetherwallet.com. Cybercriminals are trying to get the login credentials for all type of accounts through phishing emails. By tricking possible victims to enter their username and password on a fake website (legitimate-looking), the attackers are […]

Entire Europe is being affected by the BadRabbit Ransomware

According to various cybersecurity firms, the growing virus is dubbed “BadRabbit” and is a form of ransomware that bolts down machines and requires bitcoin from administrators. Screenshots of the infections posted to social media revealed BadRabbit asking for 0.05BTC for decryption, which is similar to £215 ($280). Reports show that the Kiev Metro, Odessa naval […]

Pixel 2 XL Displays are burning up already

News reported the issue, revealing a picture of a Pixel 2 XL with some fierce image remembrance around the navigation bar. Shortly after, numerous other reports of burn-in started popping up, and you can add News review unit to the list of assumed devices. You can see the persistent navigation bar burn-in below on our […]

Intel and Lenovo are trying to build UAF and U2F authentication into their devices

81 percent of data breaks last year involved weak, default or stolen passwords, and phishing attacks have advanced 65 percent year-on-year. Protecting online privacy, status and all types of data is more significant than ever demanding more robust security applications. Lenovo and Intel today published the first PC-ready built-in authentication steps to support users’ online […]

DUHK (Don’t Use Hard-coded Keys) Attack Recovers Encryption Keys & Reveals VPN Connections

DUHK (Don’t Use Hard-coded Keys) is a new crypto implementation attack that could enable attackers to obtain secret keys that secure VPN (Virtual Private Network) connections, web browsing sessions and read encrypted communications crossing over VPN connections. The encrypted data could contain sensitive business data, login credentials, credit card information and other private data. The […]

Four Darknet Markets Simultaneously Go Offline

In an astonishing hit to the Darknet, four of it’s most popular marketplaces all went down at the same time. Marketplaces involved include Tochka, Wall Street, Trade Route and Dream Market. It has been suspected, according to details of the event, these markets that went down, wasn’t due to government involvement. Users believe the sites […]

Russia Fights to Keep Founder of BTC-e from Extradition to United States

In a tale as old as time, the United States and Russia are at it again. Alexander Vinnik, the founder of a cryptocurrency exchange website called BTC-e, was recently ordered to be extradited to the U.S. at their government’s request. However, Vinnik, who is a citizen of Russia, chose to fight against the extradition request […]

DNS over TLS is being developed for the next Android Update

DNS over TLS is a protocol where DNS inquiries will be encrypted to the equivalent level as HTTPS and therefore a DNS can’t actually log or see the websites you visit. This utilizes TLS, or Transport Layer Security, to perform this encryption. This does need the DNS you are using to have DNS over TLS […]

The Value of Bitcoin has surpassed $6000 for the first time

The cryptocurrency hit an all-time high of $6,147.07 just a time after forcing through the $6,000 mark, according to data from application website CoinDesk. Much of the rise can be related to another upcoming split in bitcoin apprehended as a “fork”. This will lead to the discovery of a new cryptocurrency called bitcoin gold. Holders […]

Machine Learning Software created by Google is replicating itself

Now, Google has declared that AutoML has defeated the human AI engineers at their own game by setting machine-learning software that’s more effective and powerful than the best human-designed systems. An AutoML system recently broke a record for classifying perceptions by their content, scoring 82 percent. While that’s a relatively simple task, AutoML also beat […]

A New IoT Botnet Threatens to Take Down the Internet

Just a year after Mirai—biggest IoT-based malware that caused vast Internet outages by launching massive DDoS attacks—completed its first anniversary, security researchers are now warning of a brand new rapidly growing IoT botnet. Dubbed ‘IoT_reaper,’ first spotted in September by researchers at firm Qihoo 360, the new malware no longer depends on cracking weak passwords; […]

Another Vulnerability is found in Intel Management Engine which allows execution of Code with no Digital Fingerprint

Taking advantage of Intel ME technology, within which attackers can execute unsigned code on the target machine. This leads to a full compromise of the platform. Intel Management Engine is a closed technology, which is a microcontroller embedded into the Platform Controller Hub (PCH) with a set of well-proportioned peripherals. Through PCH, almost all communication […]

Cyber Attack Kept Secret from Public by Microsoft for Years

Not the first news of this nature but it was very recently discovered that Microsoft suffered a cyber attack from a group of very intelligent hackers way back in 2013. Cyber attacks happen but to think a major attack like this one can be kept secret for long is just plain ridiculous. Nevertheless, Microsoft did […]

Google Advanced Protection is for high-profile hacking targets

Many internet giants offer security measures like two-factor authentication (which you should really use) to keep your account safe from hackers. But there are a handful of people who are so valuable as targets that hackers will go after them specifically — say, election campaign managers. And Google wants to do something about it. It’s […]

Google is thinking about adding support to stop cryptocurrency miners on websites

Studies on the topic of in-browser miners have been going on the Chromium project’s bug tracker since mid-September when Coinhive, the first launched. To experience, there have been at least two issues from concerned Chrome users that did not like holding their resources hijacked by in-browser miners. “Here’s my current view,” Ojan Vafai, a Chrome […]

According to Research: 25% of the Federal Government Mails are Fraud

Agari supports email fraud on behalf of larger than 400 federal websites, including the real sites of the departments of Health and Human Services and Veterans Affairs, the Census Bureau and the Senate. Though emails list who a word is “from,” the email order does nothing to verify if a message really was sent to […]

Unpatched Microsoft Word DDE Exploit Being Used In Malware Attacks

A newly discovered unpatched attacking method that exploits a built-in feature of Microsoft Office is currently being used in various widespread malware attack campaigns. Last week we reported how hackers could leveraging an old Microsoft Office feature called Dynamic Data Exchange (DDE), to perform malicious code execution on the targeted device without requiring Macros enabled or memory […]

Proof of Concept Code for WPA2 Krack Attack has been released

Security researchers have discovered several key management vulnerabilities in the core of Wi-Fi Protected Access II (WPA2) protocol that could allow an attacker to hack into your Wi-Fi network and eavesdrop on the Internet communications. WPA2 is a 13-year-old WiFi authentication scheme widely used to secure WiFi connections, but the standard has been compromised, impacting […]

ATM malware is being sold on Dark Web market that can make ATMs drain available cash

In May 2017, Kaspersky security researchers have noticed a forum post advertising ATM (Automated teller machine) malware that was targeting specific vendor ATMs. The malware has been sold on the AlphaBay Dark Web marketplace since May 2017, but today, its administrators started a new standalone website after US authorities had taken down AlphaBay in mid-July. […]