Browsing tag

Infosec

Big Data and Cybersecurity: Opportunity or Threat?

Suppose you write for a living. You write articles and blog posts for a number of clients. In the course of that writing, you have to do a lot of research, accessing data and information from all over the web. The inevitable happens. You get hacked or you pick up a virus. Fortunately, you use […]

Hackers can manipulate Police body cam footages

Kiss goodbye to crucial evidence. Body cameras used by the law enforcement nowadays have already remained controversial but no one has, so far, attempted to assess the credibility of the device itself. But, at Defcon 2018, police body cameras became an object of discussion when a researcher Josh Mitchell identified these cameras to be vulnerable […]

HP Bug Bounty Program: Hack HP Printers & Earn Up To $10,000

HP Discloses its Bug Bounty Program and Here’s What You Need To Know. The Palo Alto Calif. based HP Inc., has disclosed what it terms as the industry’s first-ever bug bounty program, which has been launched to inspect printer security relates issues. The print security bug bounty program will be offering up to $10,000 as […]

How to Generate a PHP Backdoor using Weevely – Kali Linux

Weevely is a web shell designed for post-exploitation purposes that can be extended over the network at runtime. Upload weevely PHP agent to a target web server to get remote shell access to it. It has more than 30 modules to assist administrative tasks, maintain access, provide situational awareness, elevate privileges, and spread into the […]

How to Teach Your Employees About Cybersecurity

In the modern world, threats to security are no longer just physical. In fact, cybersecurity has now become one of the most important parts to keep a business and its employees safe. Without it, many businesses can find themselves in trouble when they least expect. Unfortunately, it can be a tricky area to understand, especially […]

Ex-employee stole secrets of Israeli spyware firm for dark web deals

Israeli authorities have arrested a 38-year-old man for allegedly stealing secrets of the NSO Group, a Herzliya-based firm that specializes in developing spyware and help governments to spy on targets. The firm claims to provide “authorized governments with technology that helps them combat terror and crime.” The man (whose name has not been revealed) worked as a […]

WiFi hacker: 10 best Android & Desktop WiFi hacking apps free download

Hacking is no more the specialty of experts and professionals only. With the emergence of user-friendly hacking tools, the art can be easily aced by average users too. A majority of people want to know the best, free WiFi hacker tools to learn to hack on smartphones and desktops. Despite the availability of so many […]

Hacker access critical code of British cell operator EE

EE, a British mobile network giant owned by BT Group has been accused of leaving a critical code repository on an open-source tool protected by default username and password. A security researcher going by the Twitter handle of “six” found two million lines of code including access to the company’s private employee and developer APIs and AWS secret […]

Firewalls: What They Are & Why You Need Them

There are some phrases that you hear bandied about, and you think that you know what they are. You have a basic understanding and that suits your current needs. Firewall is one of these words. You will be familiar with it already, but do you really know what one is? In its simplest terms, a […]

Master Key Hack Exploits Flaw in Key System to Unlock Hotel Rooms

The master key hack has the capability of unlocking not hundreds or thousands but millions of hotel rooms, claim F-Secure security researchers. Until now, we had believed that it is easier to break into hotel rooms doors using the old-fashioned manual keys and electronic keys are quite reliable in maintaining security. However, cyber-security firm F-Secure […]

All Nintendo Switch Consoles Contain Unpatchable Chip-Level Flaw

Nintendo Switch has fans across the world; the gaming console has garnered success worldwide and has remained in high demand since it was launched last year. According to Katherine or Kate Temkin, the Switch’s Nvidia Tegra X1’s USB recovery mode has a serious hardware flaw that allows running arbitrary code on all current models of […]

Hackers find life-threatening vulnerabilities in Austrian ski lift control unit

Serious Vulnerabilities Identified in Austrian Ski Lifts Control System Can Disrupt its Operations- Researchers Claim. The impact of last year’s hack attack on the internal network of Romantik Seehotel Jaegerwirt, the famous 111-year-old 4-star Austrian hotel, is still far from over. In that particular incident guests at the hotel couldn’t enter their rooms because the […]

Medicine pumps & Pacemaker threat as Dr’s simulate hacked overdose

Doctors Demonstrate Dangers of Hacked Medicine Pumps By Simulating Emergency Overdose. The key points explored at the ongoing RSA 2018 included situations to which medical practitioners aren’t trained to deal with. Such as someone hacking a medicine pump and modifying doses leading to overdosing of a particular medicine. At the conference, doctors also simulated a […]

Security Trends to Watch Out for in 2018

There are many threats in the world, meaning business owners, as well as homeowners, have to be vigilant in their security systems and keeping their sensitive data secure. Threats of malware and break-ins are serious and ever-growing, and in 2017 we saw multiple high-profile and extreme attacks. Therefore, people have to be vigilant in their […]

Hackers attack Casino’s fish tank thermometer to obtain sensitive data

The Internet of Things (IoT) has transformed the way we use everyday objects such as appliances, thermometers, and even lighting. However, despite their various benefits for home and business owners, the IoT cannot be termed as a flawless and productive technology. As they say with blessing come bane; same is the case with IoT devices – […]

Website security firm Sucuri hit by large scale volumetric DDoS attacks

Another day, another series of DDoS attacks – This time Sucuri and its customers have been hit by a series of attacks worldwide. [squaread][/squaread] The California based website security provider Sucuri has suffered a series of massive DDoS attacks (distributed denial-of-service) causing service outage in West Europe, South America and parts of Eastern United States. The […]

Hackers can takeover & control emergency alarm system with a $35 radio

Researcher Identifies Emergency Alert Systems Vulnerable to Exploitation Due to SirenJack Flaw – Critical Military and State Infrastructure at Risk of Attacks by Malicious Hackers.  Warning systems are of vital importance as governments heavily rely upon them for immediate identification of legit threats. Warning sirens are globally used for detecting natural disasters like earthquakes, tornadoes, hurricanes, thunderstorms, volcanic […]

Intel removes remote keyboard app for Android rather than fixing its flaws

Critical Flaws in Intel’s Remote Keyboard App for Android Lead to its Discontinuation. As is the norm with security researchers, when bugs are discovered in any software especially the critical ones, software vendor issues an apology and releases a security update after fixing the flaw. People update the software and carry on with using it. […]

Cyber security developments: Keeping safe and up to date

Cyber security is the backbone of any online businesses – Here are some quick tips to keep yourself informed about the latest threats surrounding your business. Within a standard nine to five working day, it’s said that there are almost two million data records lost or stolen. Cybercrime has become something of an epidemic in […]

Flawed Meltdown patch by Microsoft makes Windows more vulnerable

Microsoft’s January patch was released amidst claims of addressing the risks associated with attacks like Spectre and Meltdown to Windows-based systems. However, according to an independent Swedish security researcher Ulf Frisk, the patch has made security matters even more complicated especially regarding the memory vulnerabilities connected with Intel’s CPU bug Meltdown. Frisk wrote a detailed […]

Hackers can Send Fake Emergency Alerts by Exploiting 4G LTE Protocol Flaws

Researchers at the Purdue University and the University of Iowa, USA, have managed to break the key 4G LTE protocols for generation of fraudulent messages, spy upon users and modify user location data. Researchers Syed Rafiul Hussain, Shagufta Mehnaz and Elisa Bertino from Purdue University and Omar Chowdhury from the University of Iowa collaborated to […]