Browsing tag

Internet

Man used Fruitfly Mac malware to spy on US citizens for 13 years

In 2017 we reported about a notorious malware that was capable of spying upon people through capturing screenshots and webcam footages. Dubbed as Fruitfly or Quimitchin, the malware was identified by chief research officer at Digita Security, Patrick Wardle, and was found in at least 400 computer devices across the United States while it affected Windows, […]

WhatsApp Vulnerability Lets Anyone Spy on Group Chats

A critical vulnerability in WhatsApp has been discovered that lets anyone join the chat and spy on conversations without admin’s permission. With the increasing emphasis on digital privacy, companies are trying their level best to make their services secure and reliable for users. Two years back mobile messaging app WhatsApp was equipped with end-to-end encryption […]

Android Malware written in Kotlin found on Play Store stealing data

Just another day with just another Android malware hosted on Google Play Store targeting unsuspecting users – But this time, the malware is written in Kotlin, a statically-typed programming language. Androidos_Bkotklind.Hrx malware The IT security researchers at Trend Micro have discovered an Android malware Androidos_Bkotklind.Hrx on Google Play Store hiding behind a utility app called “Swift Cleaner.” […]

Netgear’s New Gaming Router Offers Protection Against DDoS Attacks

Netgear LAN Switch and Nighthawk Pro Gaming Router (XR500) Offers Reliable Safeguards Against DDoS Attacks. Netgear has introduced a pair of gaming-oriented connectivity products offering a wide range of customization and prioritization options. The first device is the XR500 gaming router, which is basically an updated version of Nighthawk Pro line from Netgear. The second […]

Best Encrypted Email Services for 2018

Looking for the best encrypted email services for 2018? Here are six encrypted email platforms providing utmost security and privacy orientated services. The year 2017 is gone but the hunt for the most trustworthy and best encrypted email services in 2018 is still on. It is true that email services like Gmail, Hotmail (Outlook) or Yahoo […]

Critical Vulnerability in Electrum Bitcoin Wallets Finally Addressed

Complete Patch Released to Address Critical Vulnerability Found in Electrum Bitcoin Wallets. Electrum, a well-known bitcoin client, has developed a patch for the bug identified in version 2.6-3.0.3 of the JSON-RPC protocol interface. The flaw was identified by a commenter using the alias “jsmad,” in a Github post on 24 November 2017. Jsmad warned that […]

AI-Powered Search Engine Ella Searches Security Footage with Keywords

New AI-Powered Search Engine Ella lets users search their security and surveillance footages with keywords and find the exact thing they are looking for. Searching for a particular vehicle, object, individual or event from recorded footages of security cameras is indeed a daunting task as it requires immense time and effort to scan through the entire […]

New adware attack bombard phones & prevent users from disabling ads

It is just another day for Android users who are yet again under adware attack by malicious apps on Google Play Store. Researchers at Check Point Software Technologies have identified a new mobile adware program, dubbed as LightsOut, in at least 22 illegitimate Android flashlight and utility apps on Google Play Store. These apps have now […]

New Malware Campaign Launched to Disrupt Winter Olympics 2018

The 2018 Olympic Winter Games will be held in Pyeongchang in February 2018 but malware attacks against the event have already begun. According to McAfee researchers, hackers are trying to target the upcoming Winter Olympics due to be held in Pyeongchang, South Korea. As per the findings from McAfee, cybercriminals are hunting for sensitive data from […]

Private Details of 240,000 DHS Employees Accessed after Data Breach

A data breach targeted towards the Department of Homeland Security (DHS) has resulted in the exposure of personally identifiable information of over 240,000 DHS employees (247,167 to be precise) including both current and former personnel. Reportedly, the DHS Office of the Inspector General (OIG) Case Management System was accessed and data belonging to individuals linked […]

New Android Malware Disguised as Uber App

It is just another day with just another Android malware targeting unsuspecting users. Last time Uber was in news for hiding massive data breach of 75 million accounts from its users and paying $100,000 to the culprits. Now, the IT security researchers at Symantec have discovered malware that secretly spies upon Uber’s Android app and extracts […]

Security Flaws in GPS Trackers Puts Millions of Devices’ Data at Risk

Trackmadeddon attack puts millions of vulnerable GPS trackers at risk of data exposure. According to a research conducted by two security experts by Vangelis Stykas (@evstykas) and Michael Gruhn (@0x6d696368), a majority of location tracking devices are flawed and vulnerable to exploitation. There are versatile devices such as child or pet trackers, fitness monitoring gadgets and […]

15-year-old Unpatched Root Access Bug found in Apple’s macOS

An IT security researcher has leaked details on an unpatched Apple’s macOS bug which lets attackers gain root access and take complete control of a targeted device. After a disastrous 2017, where Apple faced all sorts of security-related issues and complaints, the company is in trouble again right from the first day of the New Year! On […]

Teen girl facing up to 10 years for sending nude selfie

As unnerving and concerning as it sounds, the fact is that teen sexting has become a grave issue not only for the parents but also for law enforcement authorities as they often find it difficult to deal with the situation in case something goes wrong. According to a recent survey from Cyberbullying Research Center around […]

Smartphone sensors can leak the four-digit PIN code to hackers

Smartphones have remained the primary domain of experimentation for cybercriminals as they are always finding out ways to exploit and crack smartphones mainly Android devices. Apparently, researchers at Singapore based Nanyang Technology University or NTU Singapore, have identified a brand new way with which cyber-crooks can compromise a smartphone, which involves the use of device’s […]

Reddit user leaks alleged Game of Thrones Season 8 script pages

Game of Thrones season 7 was marred by hacks and leaks to such an extent that apart from seasonal spoilers, hackers managed to obtain and expose personal information of the entire cast. It seems like the world’s favorite, the multi-award-winner show is not going to have a smooth sail in the next season, which will […]

You are not alone, WhatsApp is down for many

If you are wondering why your WhatsApp is down, don’t worry,  you are not alone the messaging service is down for many around the world. It appears the service went down at 2:04 PM ET. The users are reporting on Twitter that they are unable to connect, send or receive messages from their friends and families. According to DownDetector […]

Nintendo Switch Hacked to Run Pirated Games

There is no doubt about the fact that Nintendo Switch is currently the most sought-after device. However, the device is also prone to be hacked. According to hackers Yellow8, Plutoo, Derrek, and Naehrwert, it is possible to hack Nintendo Switch and install unofficial homebrew software and pirated games on the device. The hackers, minus Yehllow8, […]

PS4 Jailbreak possible with newly identified exploit

PS4 Jailbreak is now possible – Thanks to a new exploit identified by researchers. We have always believed gaming consoles to be most well-protected devices but it is about time manufacturers like Sony take notice of security protections in their devices. Seems like troubles for Sony are about to resume with the New Year since […]

Sound Waves can Help Hackers Disrupt Functions of Hard Disk Drives

Hard Disk Drives (HDDs) are most commonly used storage components because these tend to be energy efficient and low cost. HDDs are a mandatory element of any computing system from PCs to CCTV, bedside monitors and ATMs. Until now we never doubted the security of HDDs and stored data without any hesitation. But probably now […]

Spoofed Emails from Supposedly Corporate Printer Vendors Install Backdoor

Corporate printers and scanners related emails are quite common in large organizations and this particular aspect is now deemed as a potential opportunity for exploitation by cybercriminals. According to the findings of Barracuda Networks, there is a sudden rise in attacks involving HP, Canon and Epson printer and scanner email attachments. Reportedly, hackers have launched […]