Browsing tag

Hacks

Hacker Selling 100 Million Russian VK.com Login Details on Dark Web

Russian Version of Facebook Vk.com has its 100 Million Accounts Exposed on the dark web where hacker is asking for 01.0000 BTC / 583.42 US Dollar! Social networking is quite fun and entertaining for sure. However, when massive data breaches like the one we are about to inform you about occur then users have to pay […]

Modified version of Skimer malware makes stealing cash from ATMs easy

Skimer malware is back to steal your cash from ATMS! A new malware program named Skimer has been discovered by security researchers. The malware is designed in a way that it infects the ATMs that run with the Windows operating system and therefore be used in stealing of money and payment card details. Source: JoyReactor […]

This Hacker Got Bored, Wanted Some Fun So He Defaced Several Subreddits

A hacker is taking over subreddits and exposing Reddit’s poor security! Some hack for cause, some hack for money but @TehBVM on Twitter hacks for fun. Yes, this hacker has hacked and defaced several Reddit‘s subreddits just because he felt bored. He has been doing it for more than a week and the targeted subreddits […]

Newly discovered PWOBot malware is a total keylogger

Security Researchers Discover a Potentially Dangerous Cross-Platform PWOBot Malware Family- PWOBot Now this can be termed as devastating news for computer users around the world. Palo Alto Networks has discovered a family of malware that is capable of attacking a variety of platforms including Windows, Linux, and OS X. The malware is written in Python, […]

Coinbitclip Trojan: A Grave Threat to BitCoin Wallets

Coinbitclip Trojan: Is it really A Grave Threat to BitCoin Processor — Going by the precautionary tactics adopted by Bitcoin, it certainly is a threat Infostealer Coinbitclip, a Trojan that has been developed primarily to access and steal the Bitcoin Wallets, is emerging as a grave threat to the peer-to-peer, decentralized virtual currency exchange Bitcoin. […]

Are You Ready for Firewall Protection for Your Car?

The Internet-connected cars will require firewall protection and some companies are already providing it The Internet has invaded most of the things in our world and its scope is broadening day by day. This time, it is our vehicles that will be receiving a digital boost. The reason is that cars are already being connected […]

SQL injection bug found in PanamaPapers Law Firm Mossack Fonseca

A hacker by the name, 1×0123, has revealed he found a flaw in the Panamanian tax company, Mossack Fonseca, which was involved in the #PanamaPapers leak of last week. The hacker who found the SQL bug on Saturday might be too late for the Panamanian firm, which is busy handling the aftermath of the offshore […]

KickassTorrents Becomes First Torrent Site to Introduce Two-Factor Authentication

KickassTorrents add Two-Factor Authentication feature, vows to protect users’ account and privacy  The Pirate Bay may be the most popular torrent site but KickassTorrents is putting money on security. That’s why it has become the first ever torrent website to put two-factor authentication for its visitors — The new feature is known as “multi-factor authentication” […]

Verizon Hacked Again, 1.5M Customers Data Available for Sale

San Francisco’s Verizon Enterprise solution’s computer security wing suffered an abrupt massive hack of 1.5 million customers’ records. Brian Krebs who is an ace computer security writer stated that the whole database was on sale for $100,000 at a discreet underground cybercrime forum. The offer also holds increments of 100,000 records for $10,000 per piece. […]

Anonymous Leaks Data of Cincinnati Police Department Officers

The Anon Verdict hacktivists from Anonymous leaked personal information of around 52 Cincinnati Police Department employees on Sunday — Motive: Death of Paul Gaston. The group revealed in a video that it has acquired personal details of dozens of Cincinnati police employees from rank-and-file officers to Chief Issac. The 3-minute long video was posted on […]

Apple defiant in San Bernardino Shooting Case; says no to backdoor access

Judge Issues Order to Apple to Unlock iPhone Vital in the San Bernardino Shooting Case — Apple refuses to follow orders The ruling judge in the San Bernardino shooting case, US Magistrate Judge Sheri Pym, issued an order to the technology giant to find a way to bypass the iPhone’s security mechanism and thereby provide […]

Cybercriminals Hack Hospital PCs Demand Whopping 9000 BTC Ransom

Ransomware Infects Hollywood HealthCare Facility Computers – Attackers Demand $3.6M Computers are an integral part of almost every field and industry nowadays and perhaps, no department can work well without them. Therefore, it is understandable that when the computer systems of a high-profile health care facility are compromised with such severity that it becomes difficult […]

Iranian Hackers Breached Computer of Ex-Israeli Army Chief-of-Staff

Computers of 1800 Key Personalities including Ex-Israeli Army Chief-of-Staff Penetrated by Iran-Sponsored Hacker Last year, some private pictures of IDF’s women soldiers were stolen and used by hackers to breach Israeli military server — Now top Israeli figures may have been hacked by Iranian hackers. Israel happens to be quite ahead in cyber-security technology as it ranks […]

Armenian Hackers DDoS Azerbaijani Government Portals, Leak A Trove of Data

The cyber war between Armenians and Azerbaijani hackers seems never ending — Like this recent cyber attack in which the Armenian hackers from The Monte Melkonian Cyber Army (MMCA) hacked Azerbaijani government portals and stole sensitive data.  The Armenian hackers from Monte Melkonian Cyber Army (MMCA) are back in action and this time with yet another cyber attack […]

Re-Booted Hell Hacking Forum on Dark Web Hacks Car Breathalyzers Manufactures

It has now been proven that almost anyone and any company can get hacked including the firm that manufactures car breathalyzers. A hacker dubbed as ROR[RG] reportedly hacked into LMG Holdings’ data and dumped some of its internal documents on Dark Web. The hacker acts as the moderator of the newly re-booted Hell hacking forum. Among […]

Surprise, Apple’s OS X comes out as most vulnerable software of 2015

In a study conducted by CVE Details, the most vulnerable software of the previous year has been identified as Apple’s OS X and the tech-giant is also the company with most bugs. With 2016 coming, people in all sectors have been busy summarizing 2015 with reports and lists of who have been the winners and […]

Powerful DDoS Attack Shuts Down All BBC Websites

A powerful cyber attack earlier today forced all British Broadcasting websites (BBC) to go offline and unavailable for readers for several hours. The cyber attack started at 0700 GMT forcing visitors to view the offline page of all BBC website with a 500 Internal Error. Screenshot from BBC website showing Internal error after the DDoS attack / […]

Tor Project To Launch Bug Bounty Program

Tor would soon be launching a bounty program which would reward any person who finds a vulnerability in one of the most popular anonymity programs these days. This was announced during “State of the Onion” talk at Chaos Communication Congress, an art, politics, and security conference that is held annually in Hamburg, Germany. “We are […]

Yahoo To Notify Users If Government is Trying To Get Into Their Account

Yahoo has followed the footsteps of Facebook and Twitter and has announced they will also alert its users regarding state-sponsored attacks — So if any user is found to have been targeted by state-sponsored hackers they will receive an alert from Yahoo. Though, the company did not disclose how it will be identifying state-sponsored attacks […]

Learn How to Identify, Protect Yourself from Phishing Scams

Each day we hear about new phishing attacks being carried out by hackers or scammers and despite the continuing awareness from multiple sources and media platforms regarding these attacks, there are still people who continue to fall victim to such attacks. For this very reason, in this article, we will be providing you with all […]