WannaCry Ransomware Hits Traffic Cameras in Australia

Just days after infecting the cyber infrastructure of Honda Automobile giant in Japan the WannaCry ransomware attack has now infected 55 traffic cameras in Victoria, Australia. In a statement released by the Victorian Department of Justice, cameras installed on highways and intersections across the state have been infected by the malware. When it comes to fixing the problem […]

Hacking Traffic Lights is Apparently Really Easy

Hacking Internet of Things (IoTs) have become an amazing practice for cyber criminals out there, but messing with Traffic lights would be something more crazy for them. The hacking scenes in hollywood movies has just been a source of entertainment for the technology industry, like we’ve seen traffic lights hacked in Die Hard and The […]

Russian-controlled telecom hijacks financial services’ Internet traffic

Visa, MasterCard, and Symantec among dozens affected by “suspicious” BGP mishap. On Wednesday, large chunks of network traffic belonging to MasterCard, Visa, and more than two dozen other financial services companies were briefly routed through a Russian government-controlled telecom under unexplained circumstances that renew lingering questions about the trust and reliability of some of the […]

How To Increase Website Traffic In Real Time Genuinely

Many Bloggers Have A Major Problem that they are not much traffic as expected. Firstly, you have made everyone engage to your blog and they see it and show interest in that. This is how you increase website traffic. Many people use bots on their websites to get more traffic more instantly. But remember Guys this […]

OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic

People often assume that if you’re running OSX, you’re relatively safe from malware. But this is becoming less and less true, as evidenced by a new strain of malware encountered by the Check Point malware research team. This new malware – dubbed OSX/Dok — affects all versions of OSX, has 0 detections on VirusTotal (as […]

Cracking APT28 traffic in a few seconds

Security experts from security firm Redsocks published an interesting report on how to crack APT28 traffic in a few seconds. Introduction APT28 is a hacking group involved in many recent cyber incidents. The most recent attack allegedly attributed to this group is the one to French presidential candidate Emmanuel Macron’s campaign. Incident response to this Advanced […]

IXmaps Map reveals if your Internet traffic is being monitored by the NSA

A new interactive online tool named Internet Exchange Mapping (IXmaps) appeared earlier this week, and it shows if your data traffic passes through the NSA or not. Many prying eyes are out there, trying to discover everybody’s secrets and take a peek into everyone’s life. [squaread][/squaread] That’s why a team of faculty and students from […]

IXmaps: This Map Tells If Your Web Traffic Is Being Spied On By The NSA

Short Bytes: IXmaps is an online interactive map that can be used to see if your web traffic is being spied on by the NSA. IXmaps is created with the help of OpenMedia and some Canadian organizations. This tool finds out if the path taken by your data involves some NSA listening port. You might be knowing […]

Trojan Transforms Linux Devices into Proxies for Malicious Traffic

Security researchers have uncovered a new trojan that targets Linux devices that is capable of transforming infected machines into proxy servers and relay malicious traffic, hiding the true origin of attacks or other nefarious activities. This new trojan is named Linux.Proxy.10 and its first versions were spotted online towards the end of the year. According […]

This Android Malware Attacks Your Wi-Fi Router And Hijacks Web Traffic

Short Bytes: A dangerous Android malware named Trojan.AndroidOS.Switcher has been discovered by the security researchers at Kaspersky Lab. The malware, disguised as two different mobile apps, tries to brute force the password of Wi-Fi routers and control the entire network. Surprisingly, the malicious settings even manage to survive a router reboot. Researchers have shared few rogue DNS servers […]

Vproxy – Forward HTTP/S Traffic To Proxy Instance

Vproxy is a python script tool which configures a PPTP VPN server that will redirect HTTP/HTTPS traffic to your proxy instance host.   System Requirements: Kali Linux or any Linux distribution   Installation: pip install termcolor   $sudo python vproxy.py -localip 192.168.1.9 -phost 192.168.1.10 -pport 8080 -port 80,443 Download now: vProxy

Your DNS Traffic Can Be Used To Uncover Your Identity On TOR Network

Short Bytes: Researchers from the Princeton University, Karlstad University, and KTH Royal Institute of Technology have published a paper which brings to light the use of DNS traffic of the Tor network to initiate website fingerprinting attacks and reveal the identity of a Tor user. People have started to believe that Tor is losing its […]

DNS traffic monitoring, a threat to Tor users’ anonymity

Tor Network Users May No Longer Enjoy Anonymity due to Exploitation of DNS Traffic Monitoring Karlstad University researchers in collaboration with KTH Royal Institute of Technology and Princeton University have identified that the Domain Name System (DNS) can be monitored to reveal identities of Tor network users. In fact, the researchers have revealed that this […]

​Monitoring SSL traffic now everyone’s concern: A10 Networks

As the uptake of SSL grows, Tim Blombery, systems engineer at A10 Networks, said threat actors are increasingly leveraging SSL-based encryption to hide malicious activity.  As usage of Secure Sockets Layer (SSL) moves beyond the login page or banking website and out into the wider web, Tim Blombery, Systems Engineer at security firm A10 Networks, […]

How the NSA snooped on encrypted Internet traffic for a decade

Exploit against Cisco’s PIX line of firewalls remotely extracted crypto keys. In a revelation that shows how the National Security Agency was able to systematically spy on many Cisco Systems customers for the better part of a decade, researchers have uncovered an attack that remotely extracts decryption keys from the company’s now-decommissioned line of PIX firewalls. […]

Someone Hacked Traffic Sign with Anti-Police Message in Denver

A group of activists or let’s call them anarchists (that’s what they call themselves) hacked a traffic sign and left AN anti-police message against police brutality in the United States! Hacking a traffic sign is become a new trend for people to register their protest or just write stuff that doesn’t make any sense, but a few […]

24 Funny, Upsetting and Shocking Hacked Traffic Signs

You may have seen traffic signs displaying messages like ‘drive safe,’ ‘traffic ahead,’ or road under construction etc but what about when these traffic signs or electronic billboards gets hacked and display unexpected messages? Sometimes the messages are funny, shocking or sometimes they just don’t make any sense. We thought to gather some of them […]

Attack With WPAD Protocol and PAC Files Can Leak HTTPS Traffic

Attackers can collect your HTTPS Web traffic history. Alex Chapman and Paul Stone from Context, a UK cyber security consultancy firm, have discovered a new attack method using the WPAD protocol and PAC files to leak information about the HTTPS sites a user is visiting. Their discovery is yet another drop in the lake of exploits […]

JUNIPER CRYPTO BUG LET ATTACKERS EAVESDROP ON ROUTER, SWITCH TRAFFIC

Juniper Networks patched a crypto bug tied to its public key infrastructure that could have allowed hackers to access the company’s routers, switches and security devices and eavesdrop on sensitive communications. The flaw was tied to Juniper products and platforms running Junos, the Juniper Network Operating System. The bug (CVE-2016-1280) was reported and patched by […]