Google Researchers Successfully Broke SHA-1 Web Security Tool

According to Google’s research team, they have successfully broken Secure Hash Algorithm 1 encryption, commonly referred to as SHA-1, which is a vital internet security tool. They believe that with this new breakthrough they can limit the widespread use of encryption technology. It is indeed a breakthrough since SHA-1 has been touted as vulnerable so […]

Researchers Create New System That Makes Bitcoin Transactions Harder to Track

Researchers from Boston University, North Carolina State University, and George Mason University have created a new protocol called TumbleBit that they say can anonymize Bitcoin transactions better than any other previously developed Bitcoin mixing service. Bitcoin mixing services, also known as mixers or tumblers, are services that offer to anonymize Bitcoin transactions. They usually realize […]

Researchers Discover Yet Another Malware Designed to Compromise Mac Devices

Bitdefender, renowned IT security/antivirus firm, has identified that the latest strain of Xagent for Mac is being used as a backdoor for intruders. After the malware is installed via Komplex downloader, it looks for a debugger’s presence and if it isn’t found it waits for network connection to be enabled to contact its C&C servers. The attackers then activate […]

These hackers set a ‘trap’ for security researchers probing their malware

Malicious Word document with ‘Russian doll’ technique targets NATO countries. Security researchers have identified a hacking campaign seemingly targeted at NATO members, which employs a sophisticated method to infect victims and lays a trap for those investigating it. The researchers said the attack, in the form of a malicious Word document, is unusual in that […]

Researchers condemn unsubstantiated WhatsApp “Backdoor” story by Guardian

The Guardian, a well known UK-based newspaper, is being heavily criticized by security researchers for publishing an unverified story on WhatsApp vulnerability. Reportedly, the news service published a report citing that it was possible to intercept encrypted messages on WhatsApp because the application contained a Backdoor. The Guardian’s report claiming a security flaw may be […]

Researcher claims to expose identity of Mirai Botnet Author

Brian Krebs, the famous Infosec journalist whose website KrebsOnSecurity was targeted with a massive amalgamation of Mirai botnets to launch a notorious DDoS attack in October 2016, has managed to identify the perpetrator of the crime. It seems Brian Krebs has been working hard to unmask the creator of Mirai botnet that has been creating havoc […]

Researchers Expose Fake Android Apps Stealing Instagram Passwords

Instagram undoubtedly is a very popular social networking platform, which is the main reason why it attracts the attention of cyber-criminals, hackers and scammers so frequently. According to latest findings from the mobile malware research team at Intel Security, Google Play store has become a haven for Instagram password stealers. These malicious cybercriminals are distributing […]

Researchers Warn Against “free internet without Wi-Fi” WhatsApp Scam

WhatsApp has lately become the prime target of malicious threat actors and scammer probably due to the widespread global following that the platform enjoys. Eset Security researchers are unearthing one scam after another that is making use of WhatsApp. On the other hand, scammers are coming up with innovative new strategies to lure victims towards […]

Japanese researchers: your peace-sign selfies are putting you at risk

If flashing a peace sign is your go-to selfie move, you might want to think about coming up with a new signature look. Turns out, your light-hearted display of goodwill to the world could be putting your personal data at risk — if you come across a truly determined hacker, anyway. According to research from […]

Researchers work to save trusted computing apps from keyloggers

SGX needs I/O protection, Austrian boffins reckon. Intel’s Software Guard Extensions started rolling in Skylake processors in October 2015, but it’s got an Achilles heel: insecure I/O like keyboards or USB provide a vector by which sensitive user data could be compromised. A couple of boffins from Austria’s Graz University of Technology reckon they’ve cracked […]

Researcher found a severe flaw in the MONyog monitoring tool

A security expert discovered a vulnerability in the MONyog tool that could be exploited by a normal user to elevate his privilege access. The security researcher and penetration tester Mutail Mohamed (@muleyl) discovered a vulnerability in the MONyog, the most secure and scalable MySQL monitoring tool of the server monitoring tool. The application URL is https://www.webyog.com/product/monyog and the affected version is MONyog […]

Global Leading Cyber Security Firm “Comodo Threat Research Labs” warned Be aware from “Airtel broadband Malware”

Cyber Security firm Comodo Threat Research Labs Discovered new Airtel Broadband Malware which mainly Spreading via Email Attachment with fake invoice with the subject of “Re:”  pretending to come from unknown sender of “airtelbroadband.in (or random senders)”  with a malicious zip attachment having “.JS” inside which works as Trojan downloader. Comodo Researcher’s Said ,This malware […]

Comodo Threat Research Labs discovered new sophisticated malware “Tordow v2.0” easily gain your mobile root privilege

Android malware “Tordow v2.0” which specifically affected to mobile bank user in Russia has been discovered by Threat Researchers of comodo TRL. spoke person said ,Tordow is the first mobile banking Trojan for the Android operating system that seeks to gain root privileges on infected devices. Root access of mobiles no needed to perform its […]

Researchers Bypass Apple’s Activation Lock on iPhones and iPads

Two researchers have found a way to bypass the Apple Activation Lock on both iPhones and iPads, running the two most recent versions of iOS, 10.1 and 10.1.1. If you’re not familiar with the Activation Lock, this is the lock screen that appears on Apple devices when they’ve been locked through the Find My iPhone […]

Global Cyber Security Firm “Comodo Threat Research Labs” (CTRL) Detects New Family of Sophisticated Financial Malware

Comodo Threat Research Labs (CTRL) has announced that it has detected a new family of financial malware dubbed as “Gugi/Fanta/Lime”. It is a sophisticated Banking Trojan that can bypass the standard security protocols of an Android operating system (version 6), and take over the operating system. The financial malware seeks system privileges and user credentials, […]

Researcher finds the Karma Ransomware being distributed via Pay-per-Install Network

A security researcher named slipstream/RoL has discovered the Karma Ransomware, which pretends to be a Windows optimization program called Windows-TuneUp. What is worse is that this sample was discovered as software that would potentially be distributed by a pay-per-install software monetization company when people install free software downloaded from the Internet. I have been railing against adware […]

Researchers expose Mirai vuln that could be used to hack back against botnet

Security researchers have discovered flaws in the Mirai botnet that might be used to mitigate against future attacks from the zombie network. Scott Tenaglia, a researcher at endpoint security firm Invincea, found a weakness in the HTTP flood attack that Mirai is capable of mounting. Specifically a stack buffer overflow vulnerability in the code that […]

Hackers Steal Research and User Data from Japanese Nuclear Research Lab

Spear-phishing and malware at the root of the intrusion.From November 2015 to June 2016, hackers targeted researchers at the University of Toyama’s Hydrogen Isotope Research Center, the University told Japanese media. Officials said the attacker managed to steal files on multiple occasions, taking both research data and the personal details of nuclear scientists. Malware infection […]