Browsing tag

Infosec

Santa Claus Malware In Christmas Apps Targeting Android, iOS, PC Users

A group of hackers have designed a malware for users looking out for Christmas themed desktops and mobile apps — The malware is targeting iOS and Android users. The Santa-APT [Advanced persistent threat] was discovered by CloudSek, a security firm who was researching on a malware in the black market. Capabilities of the Malware This newly discovered malware […]

Ghostware and Two-Faced Malware Coming in 2016

Summary: Malware is increasingly sophisticated. In 2016, look for two developing malware families. First, as law enforcement becomes more specialized in identifying cybercriminals, ghostware will help hackers conceal indicators of compromise. It will be more difficult for companies to know a compromise has taken place. Second, be on the lookout for “two-faced malware”: malware that […]

Internet Connected Car Hacked and DDoSed via Smartphone

Hiroyuki Inoue, associate professor at Hiroshima City University’s Graduate School of Information Sciences in Japan showed how an app and a custom wifi device can be ingredients for car hacking. For the demonstration he used a 2013 Toyota Corolla Fielder Hybrid and was able to control its doors, speedometer displays and the accelerator, reports the Japan […]

Researchers Found Windows’ Malware Similar To The One Used by NSA

NSA’s one of the known snooping tactics is installing a malware into hard drive’s firmware which makes the deletion of the malware nearly impossible even the malware can avoid formatting of the hard drive. Nemesis is a malware that can be used for similar purposes as it can avoid clean-up software and can even avoid […]

Hackers Can Exploit Security Flaws In Drones To Hijack Flight Controller

Security flaws have been found in drones that could allow hackers to target and attack the flight controller which includes numerous sensors as well as the processing unit, reveals a research conducted by Oleg Petrovsky, Senior AV researcher of HP Security. We all know that there have been number of recent developments in the manufacturing […]

Apple XcodeGhost Malware: List of iOS Apps You Should Delete Immediately

Apple’s App Store in China has apparently been penetrated by Hackers which experts say has placed the devices of hundreds of millions of people at risk. The malware named XcodeGhost, believed to be a malicious and modified version of Apple‘s very own development software, is said to have compromised a significant number of applications. Apple […]

How Your ATM Card Data Could Get Hacked

Security experts have warned ATM (Automated Teller Machine) users to stay clear from suspicious ATMs for past several years because of numerous security vulnerabilities but people are still carrying out transactions from hacked and infected ATMs, only to later find out that their accounts are emptied unknowingly. As new methods to hack ATMs are being […]

Searching For Hacking Software Leads to Vulnerable Spammy Sites

Thousands of legit websites’ security has been compromised to secretly redirect the visitors, coming through specific search terms, to prospective fraudulent websites offering hacking schemes and services. This was revealed in a recent investigation by one of the Malwarebytes researcher, Steven Burn, responsible for scrutinizing Facebook hacking frauds. Those readers who are not aware of […]

Genieo Adware Installer Left Mac OS X Keychain Vulnerable

Security researchers have found out that the latest version of the ever-popular Genieo installer adware has fetched a new system to access the Mac Keychain without any prior involvement from the user, allowing this adware to access and distribute sensitive data and user credentials stored within the credential manager. In a nutshell, what Genieo adware […]

Kaspersky Accused of Producing Fake Malware to Sabotage Competitors

Reportedly, Kaspersky has been accused of making malware for more than ten years — The firm tricked other antiviruses into labeling it as infected. Last time when Kaspersky was in the news it was about its relationship with Facebook so it can help the users identify and remove malware from their computers. Now, the firm […]

Hackers Can Disable House Arrest Ankle Bracelet without Raising Alert

Another blow to the law enforcement agencies – researcher from leading security group hacks his way out of ankle bracelet without raising an alert. In July 2015, we reported how your wearable fitness trackers can be hacked. Now, researchers have demonstrated how easy it is to hack tracking bracelets with no strings attached. [must url=”https://www.hackread.com/unexpected-hacks-defcon-23-black-hat-2015/”]7 Unexpected […]

8 Technologies That Can Hack Into Your Offline Computer and Phone

Whenever your computer, smartphone device or any other Internet-capable gadget is connected to the Internet, there is always a risk of security threats. This is the reason why hacking has now become the norm. The privately funded organizations, as well as the government agencies, are using various cyber spy technologies and tools so that they […]

John McAfee supports his pal who found security flaw, hacked an aircraft

Summary: An official statement issued by an FBI agent reveals that InfoSec researcher Chris Roberts has confessed to hacking into the controls of a flying aircraft triggering it to climb — John McAfee (founder of McAfee anti-virus software) is supporting Roberts on this issue. Earlier we reported how vulnerable In-Flight systems can be taken over by […]

Man who revealed plane can be hacked offloaded for the second time

Earlier this week the FBI denied air travel to Chris Roberts due to his sarcastic tweets about United Airlines’ security system on board. Now, for the second time in a row, Roberts has been denied air travel via United. Apparently, United Airline isn’t very keen on letting Chris Roberts travel on their planes. Roberts, acclaimed […]

From Hacker to a Spy: What happens when a hacker is misunderstood for a spy

In March this year, Kaspersky Lab, an international software security group based in Russia and with business operations in more than 200 countries worldwide has recently been put in the spotlight for an accusation closely associating them with Russian intelligence agencies and thereby posing a threat to their very own US clients. Of course, Kaspersky […]

How To Steal Data and Information From Computers Via Heat

The security researchers at Ben Gurion University in Israel have identified the method of obtaining air-gapped system data through heat emissions and the built-in thermal sensors of a computer. The method has been named BitWhisper. Air-gapped systems that generally are not linked with other systems and are also isolated from the Internet can be utilized in circumstances […]

Managing Insider Threats with Internal Monitoring

The number of annual security incidents caused by insider threats is increasing. InThe CERT Guide to Insider Threats, Capelli et al write, “Insider threats are an intriguing and complex problem. Some assert that they are the most significant threat faced by organizations today.” Disgruntled system administrators damage data and systems, skilled professionals steal intellectual property, […]

US Military to Hire 3,000 New Cybersecurity Professionals by 2016

Around 3,000 new security professionals will be added to the United States military’s infosec unit by 2016, according to reports. It says that the move to increase its already overwhelming security workforce comprising of 1,100-personnel has been approved by the government and reportedly 3,000 new hires will be added across multiple disciplines. These include strategic and […]