Browsing tag

Internet

HotSpot Shield, PureVPN & ZenMate found leaking users real IP addresses

According to VPN Mentor, a privacy advocate firm which reviews virtual private networks (VPN), after an in-depth research, it has been discovered that three VPN service providers with millions of customers worldwide are leaking sensitive data such as users’ IP addresses – These VPNs include HotSpot Shield, PureVPN, and Zenmate. What is a VPN used for? The purpose of using […]

Hackers allegedly steal confidential reports from Police server

Hackers allegedly stole hundreds of reports using a security flaw in an online tool used by the police. In normal circumstances, police are the investigating authority but Gwent County Police in the United Kingdom is in hot water and being investigated for not informing complainers that reports they filed have been stolen by hackers. Apparently, Gwent Police […]

Hackers can steal data from Air-Gapped PCs with microphones & speakers

A research team from Israel’s Ben-Gurion University of the Negev ‘s cybersecurity research center has discovered a new way of data extraction from air-gapped computers via using passive devices like earbuds, earphones, headphones, and speakers. Now, the same research center has claimed to be able to use computer speakers and headphones to act as microphones […]

Life is cheap! Well it is on Dark Web where your entire identity is for sale

Your Entire Identity Is Up for Sale at the Dark Web – Startling Revelations by UK’s top VPN Comparison Service. Cybercriminals have now come up with another way of exploiting unsuspecting users’ identity. Having multiple accounts online is a common practice as we use all sorts of services from carrying out transactions on PayPal to […]

Keep Your Home Warm with this cryptomining heater

Recently, a French startup Quarnot introduced a cryptomining heater that is capable of paying for itself at some point through harnessing huge reserves of heat that get generated while CPU is busy mining for the cryptocurrency. Labeled as Quarnot’s QC1, the heater is said to keep your house warm during the torturous winter season and […]

Sauna security camera hacked; nude videos of Dutch Women’s Handball Team leaked

The stolen videos from hacked security cameras were leaked even when the system was removed from the sauna. The Dutch women’s handball team is the latest victim of critical vulnerabilities in IoT devices especially security cameras. Reportedly, unknown hackers took over the security camera system installed in the dressing room of the sauna used by […]

New FlawedAmmyy RAT steals data and intercepts audio chat

The FlawedAmmyy RAT has been developed using the leaked source code of Ammyy Admin, a legitimate remote desktop software. Proofpoint researchers have discovered a remote access Trojan (RAT) that remained undocumented until now and is serving as a malicious payload in two heavy-weight email campaigns identified on March 5th and 6th 2018. Researchers have noted […]

Kill Switch Can Mitigate Massive DDoS Attacks Via Memcached Servers

Recently we informed our readers about how attackers are abusing the misconfigured Memcached servers to launch massive DDoS attacks. According to the observation of not one or two but three security firms, massive Memcached reflection distributed denial of service (DDoS) attacks are being launched with an unprecedented intensification factor of 50,000, which is the largest […]

Download Kali Linux from Microsoft Store and use on Windows 10

You can now download Kali Linux and install it on Windows 10, thanks to Microsoft who a few months ago vowed to bring open source software to its store. Kali Linux is a popular Debian-derived Linux distribution developed for penetration testing and digital forensics. The platform is home to hundreds of penetration testing tools making it one of the best and […]

Cortana Lets Hackers Infect Windows PC Even when it is Locked

The voice commands enabled, multi-language Cortana virtual assistant is probably the most talked about feature that comes with Windows 10 desktop and mobile versions. It performs a number of special functions to help users including opening apps, informing about discount coupons and carrying out basic mathematic calculations. Cortana contained a critical vulnerability From the outlook, […]

Facebook Onavo VPN app collects user data even when it’s off

In February this year, Facebook started pushing its Android and iPhone (iOS) users to install a VPN app called Onavo which the social media giant bought from an Israeli firm in October 2013. The reason Facebook claims it wants users to install Onavo is to provide them protection against threats through an encrypted network, however, the reality […]

After Cellebrite, Grayshift Claims to Crack Encrypted iPhone X & 8

Last week we reported about an Israeli firm Cellebrite, which claimed to have developed capability to unlock just about any iPhone even the latest models. Now another startup service called Grayshift is claiming the same including iPhone X and iPhone 8. According to reports, the US-based Grayshift has created a tool called GrayKey that can […]

How to Choose the Best Dedicated Server for Your Online Business

As your online business grows and your client numbers and transaction counts increase, your simple website will start feeling signs of pressure. It will begin slowing down and see downtimes more often. While this indicates online success, it can also set you back if you don’t do anything to fix it. Moving your site to […]

What to Do When Msvcp140.dll Goes Missing in Windows

Imagine that you download a program or a software that you have been looking for and have been craving to work on for the longest period of time. When you finally get your hands on it and you launch the application after installing it, a dialogue box flashes an in-your-face kind of message with a […]

Malware steals data directly from the device to hack Facebook account

Hacking Facebook credentials such as login IDs and passwords have always remained the apple of the eye for cybercriminals and malicious threat actors. In a newly identified scam, a malicious app is being used to obtain user credentials directly from the targeted devices. This is accomplished via new Android malware dubbed as Android.Fakeapp. This time […]

Personal Data of 21,426 US Marine Force Reserve Personnel Leaked

The United States Marine Corps Force Reserve has become a victim of a massive data leak this week due to which sensitive, private data of around 21, 426 Marines, sailors, and civilians got exposed. Reportedly, on the morning of Monday, 26th February, the Defense Travel System or DTS of the Defense Department sent an unencrypted […]

iTunes will no longer work on old PCs & 1st Generation Apple TV

iTunes will stop working on millions of devices as of May 25, 2018. This Monday, 26 February, Apple announced that it will terminate music store support for Windows XP and Vista computers. Another product that will be discontinued is the first generation of Apple TV. Starting in May, users won’t be able to buy or […]

Developer of NanoCore RAT that targeted Canada, US & Steam jailed

The developer of NanoCore RAT (remote access Trojan) has been sentenced to 33 months (2.75 years) in prison for promoting and selling the malware on a popular hacking forum HackForums between 2012 to 2016. The 27-year-old Taylor Huddleston (“Aeonhack” on HackForums) of Hot Springs, Arkansas was arrested in March 2017 and pleaded guilty in July to developing NanoCore malware and admitting that he […]

Chrome OS Will Soon Start Supporting Linux Applications

We do know that there is a deep underlying connection shared by Chrome operating system and Linux. Though Chrome OS is based on Gentoo Linux it is not possible to run traditional desktop Linux applications on it. But that has been solved with Crouton script that lets a chroot of Debian Linux or Ubuntu to […]

Man Sues Feds For Installing Surveillance Camera on his Property

A 74-year old rancher in Texas discovered a small portal surveillance camera installed on his property in the south of Encinal, Texas, while he was walking around the ranch with his attorney. Reportedly, Ricardo Palacios identified the camera installed on a tree in November 2017 and believed that it was installed by the border agents, […]