Rorschach – Fastest Encryption Ransomware Ever Found in Ransomware History

Researchers from Checkpoint found a new and previously unknown ransomware variant dubbed “Rorschach” with highly sophisticated features that target U.S. companies. Rorschach ransomware carries technically unique and customized features and one of the fastest ransomware observed by the speed of encryption that was never found in ransomware history. Interestingly, Threat actors behind the ransomware implemented […]

The biggest crypto scam in Instagram history

Jason Sallman is a cryptocurrency investment advisor who enjoys considerable popularity on social media, primarily Instagram, where he has nearly 40,000 followers. Unfortunately, profiles like Sallman’s never go unnoticed by threat actors, who have found a new method of fraud using fake profiles of businessmen, celebrities and other public figures. According to a CNBC report, […]

2019 will be known as the year with the most cyberattacks in history

Information security experts anticipate that the balance in cybersecurity by the end of 2019 will be disastrous. According to figures collected up to this time of year, incidents of reported data breaches increased by about 30% compared to the previous year. In addition, this year it reached an all-time high of nearly 8 billion exposed […]

Russia’s Secret Intelligence Agency Hacked – One of the Largest Hack in the Russian Secret Service History

Hackers compromised the Russian Federal Security Service (FSB) servers where they gained access to 7.5 terabytes of data from a major FSB contractor named “Sytech”. Intruders leaked the dozens of data that related to non-public Internet projects such as how Russia trying to de-anonymization of users of the Tor browser, collecting information about users of social networks, […]

How To Auto-Delete Google’s ‘Location History’ Tracking Data?

Back in May 2019, Google promised that it would let you auto-delete the web activity and location history it collects through your Google account. The company is keeping its word by releasing new tools to set a time-limit for the expiration of your personal data. Now users can delete their location history, both on Android […]

4 Most Memorable Botnet In History

What is Botnets? Botnets are artificial networks created by malware, which can be controlled by the virus author remotely. Here in Hackercombat.com, we have featured stories of companies which had their devices becoming a member of botnets without them knowing. Being a member of a botnet means the infected devices are kept running as usual, […]

Why are hackers interested in people’s medical history?

A few days ago, information security specialists reported a massive data breach in American Medical Collections Agency (AMCA) that affected nearly 20 million patients in U.S. clinical companies; according to experts, records of credit cards and stolen clinical details may be sold for negligible amounts (less than $50 USD).  What is the reason for the […]

Microsoft Wanted To Create History With UWP; Now It’s Turning Back

The UWP is dead. That’s what the internet and various reports have started to say about the platform. In addition to many reasons, what led to this conclusion is one big announcement made by Microsoft that its app store will now offer support for Win32 games. Win32 is the same old legacy platform Redmond wanted […]

Google Helps Identify Crime Suspects Using Location History

Google, by using the location data in devices, helps identify suspects of crimes in many instances of criminal investigation. Google keeps tracking your device constantly, even when you disable the Google Location History feature. Using many apps- Google Maps, weather update app etc- Google keeps tracking all devices, collecting the precise latitudes and longitudes as […]

Cops Are Increasingly Using Google’s Location History Data To Nab Criminals

A New York Times report has revealed that federal agencies and cops use Google’s location history data trove to keep an eye on suspects and track their location. Google has a huge database called Sensorvault that contains location records of hundreds of millions of devices – both Android as well as iOS. The fact that […]

Google Photos Vulnerability Allows Hackers To Track Location History

A vulnerability exists with the web version of Google photos allows malicious websites to extract the photos metadata information. Google photos will tag your photos automatically based on the metadata information such as geographic coordinates, date, etc. The Photo metadata allows information to be traveled along with the image file that can be read by […]

Facebook Suffers Biggest Ever Outage in its History

Facebook, which has suffered the biggest ever outage in its history, is struggling to deal with it. The partial outage that affected some users of Facebook and other platforms owned by Facebook, including Facebook Messenger, WhatsApp and Instagram, seems to be abating. CNN.com reports that Facebook had to use the services of its rival Twitter […]

Google Maps Will Bring A Feature To Automatically Delete Location History

Back at CES 2019, Google introduced a couple of features for its Maps app, and it appears we are most likely to see new ones pretty soon, as part of its upcoming update, in version 10.10. According to APK files acquired by 9To5Google, Google Maps is likely to start deleting the location automatically for users. […]

Safari vulnerability allows stealing your browsing history

To exploit the vulnerability, attackers need physical access to the computer, as well as installing a malicious application Network security and ethical hacking specialists from the International Institute of Cyber Security report the emergence of a new vulnerability in a developer API that allows a malicious app installed on the Mojave MacOS to access a […]

New Unpatched macOS Flaw Allow Hackers to Spy on Safari Browser History

Security Researcher discovered a vulnerability in macOS Mojave let malware apps bypass the privacy protection and read the safari browser web history. macOS Mojave has strictly restrict some of the folder by default and it provide special access for very few apps. But the newly uncovered flaw bypass the Mojave privacy protection and allow the […]

New Unpatched macOS Flaw Lets Apps Spy On Your Safari Browsing History

A new security vulnerability has been discovered in the latest version of Apple’s macOS Mojave that could allow a malicious application to access data stored in restricted folders which are otherwise not accessible to every app. Discovered by application developer Jeff Johnson on February 8, the vulnerability is unpatched at the time of writing and […]