Browsing tag

Internet

Researchers demonstrate how to unlock Tesla wireless key fobs in 2 seconds

Vulnerabilities and security flaws in vehicle security systems aren’t as surprising for us as it is that even the most renowned car manufacturers aren’t able to provide consumers with fool-proof systems. Wired reports that Tesla recently fixed a vulnerability in the security systems of its cars after a group of researchers in Belgium proved that the […]

British Airways hacked- Private & financial data of 380,000 customers stolen

Hackers are always looking for new and profitable targets for their own malicious gains. So, it is quite natural that the world’s favorite airline is on their radar. Reportedly, British Airways has become a victim of a “worrying” and “astounding” data breach in which private and financial information of about 380,000 of the airlines’ customers has […]

Misconfigured Tor sites using SSL certificates exposing public IP addresses

Tor is a browser known to keep the IP addresses of its users private and confidential due to which users can surf the web anonymously. However, according to RiskIQ’s threat researcher Yonathan Klijnsma, it is possible to identify the IP addresses of Tor users. Klijnsma states that misconfigured Dark Web servers are mainly responsible for […]

Parental control spyware app Family Orbit hacked; 281 GB of data exposed

Spyware is supposed to spy upon people, most notably criminals or threat actors. However, nowadays even spyware aren’t protected from vulnerabilities and are exposed to hackers. Recently we reported on the hacking of several spyware apps including FlexiSpy, Retina-X and TheTruthSpy. Now there is another spyware to join the list of victimized apps. Motherboard reports that a parental […]

MagentoCore Malware That Steals Payment Card Details While You Shop Online

A new payment card stealing campaign with skimmer script targeting Magento stores. The malicious campaign is embedding Javascript based MagentoCore Malware on Magento stores that record keystrokes from customers and transfer the data in real-time to magentocore command and control servers. A Netherland security researcher Willem uncovered the attack, it appears a single group of […]

RIG Exploit Toolkit Distributing CeidPageLock Malware to Hijack Browsers

A previously discovered browser hijacker malware dubbed as CeidPageLock has resurfaced again, in a bigger and better avatar, reveal researchers at Check Point security firm. This time around it is loaded with new features and is being distributed through the RIG Exploit kit. Trend Micro states that among all the exploit kits, the RIG is […]

How to find what your router exposes on the Internet

  These devices are easy prey for hackers Sometimes a home use router may look like an open door to the leaking of some of our information, cyber security organization experts discuss how we can find out if our devices are vulnerable. First of all, it’s important to start by implementing basic security measures to protect our […]

6 Tips to Protect Your Online Business from Cyber Attacks

Cybercrime is on the rise, there is no denying this fact. With people becoming more reliant on technology, using their smartphones to log into their bank accounts and using social media which stores and uses your data, hackers are sometimes able to take advantage of this. You may think your business is impenetrable, however, this […]

You can now run Windows 95 on your Mac, Linux and Windows 10 devices

The maximum RAM that Windows 95 consumes within Windows 10 is just 200 MB. We have seen hackers doing wonders like hacking PlayStation 4 to run PS2 emulation or homebrew software, hacking Android-compatible Google Daydream VR Controller to run on iOS or run Linux OS on Nintendo Switch. But now, a developer has gone one step ahead […]

Hackers can intercept and manipulate DNS queries, researchers warn

DNS Queries Intercepted Due to Bogus DNS Traffic Protection Standards. Would you believe that a majority of the DNS queries that are sent remain unprotected on the web? We would never have believed it but the fact is that DNS traffic interception is a reality and it is happening quite extensively. This issue has been […]

IoT botnet of heaters & ovens can cause massive widespread power outages

Botnet of Smart Power-Consuming Appliances May Cause Widespread Power Outages. Digital technology has revolutionized the way we use appliances and perform day-to-day chores. Nowadays, our air conditioners are smart enough to be turned off or on remotely, washing machines send us a message to notify about finished laundry and refrigerators email us the grocery list. […]

Millions of Android Devices At Risk of Man-in-the-disk Attack

Thanks to Ignorant App Developers At Defcon 2018, we have so far witnessed many innovative forms of compromising devices including electoral voting machines. However, this latest revelation “Man-in-the-disk Attack” is quite surprising and to a great extent concerning for Android users. According to researchers at CheckPoint security firm, the new attack method dubbed as Man-in-the-disk […]

PGA Golf Championship hit with Bitcoin ransomware

Hackers Demand Ransom to Unlock Hijacked Files of Upcoming PGA Golf Championship. Hackers seem to have a penchant for targeting high-profile events. After successfully attempting to make American presidential elections questionable, now cybercriminals have their eyes set on key PGA tournaments. Reportedly, to jeopardize this week’s PGA Championship, which is due to be held at […]

Sensitive data on 31,000 GoDaddy servers exposed online

All thanks to Unsecure AWS S3 Bucket. GoDaddy is the latest victim of cybercriminals and has joined the league of companies that got confidential data leaked due to unsecure Amazon S3 buckets. The world’s leading domain name registering platform, GoDaddy, boasts of more than 18m customers, which makes cyber-attack on this organization a high-profile feat. […]

5 Ways the Cloud is Beneficial to Businesses

Businesses are constantly on the lookout for ways to improve and grow. There are so many things taking place on a daily basis, that looking for ways to enhance operations is key. One trend that is becoming common is using the cloud for multiple purposes in a business. This is likely because it offers several […]

Windows 10 May Not Be Free for Businesses Anymore

Microsoft Launching Dedicated Program To Manage Windows 10 Related Updates… But with a Monthly Fee. Microsoft has always referred to Windows 10 as a service, which we suspected was a hint that the software giant may at some point start charging some fee for the maintenance of the OS. Now, a report suggests that it […]

HP Bug Bounty Program: Hack HP Printers & Earn Up To $10,000

HP Discloses its Bug Bounty Program and Here’s What You Need To Know. The Palo Alto Calif. based HP Inc., has disclosed what it terms as the industry’s first-ever bug bounty program, which has been launched to inspect printer security relates issues. The print security bug bounty program will be offering up to $10,000 as […]

Reddit hacked: Hackers steal complete copy of old database backup

Reddit says the breach took place after hackers intercepted SMS that were supposed to be delivered to employees. The social media giant Reddit has announced that it has suffered a data breach in which attackers hacked into its system and ended up stealing data of its registered users including emails and encrypted passwords. Reddit discovered the […]