Browsing tag

Internet

The Pirate Bay alternatives (2018) in wake of Cryptomining scandal

The process of cryptocurrency mining slows down your computer and increases the energy bill – That is why it is time to find The Pirate Bay alternatives. The Pirate Bay is undoubtedly one of the most visited torrenting and file sharing websites. But did you know ThePirateBay.org is using the computing power (CPU) of your computer to mine cryptocurrency? […]

Parasite HTTP RAT loaded with advanced detection evasion capability

Proofpoint researchers have discovered a new remote access Trojan (RAT) as well as an updated version of an already identified banking Trojan and claim that both the RATs are involved in recently detected phishing campaigns targeting the retail, healthcare and IT industries. Emails containing MS Word attachments are being sent, which contain hidden malicious macros […]

Spectre attack variant can be remotely mounted to extract sensitive data

What we know so far about Spectre attacks is that it relies upon execution of malicious code. The code is executed on computers having speculative-execution design flaws in processor chip; once a device is compromised, it becomes possible to obtain sensitive data such as passwords, PINs, and keys. Such data is usually stored in the […]

How to Find Trustworthy Tools and Software for Your Business

Running a business requires a great deal of time, knowledge and expertise. If you want to take it to new heights, it’s imperative that you look for ways to save time by streamlining your processes. If not, you may find that a significant amount of time is being used carrying out mundane tasks and focusing […]

Identity theft protection firm LifeLock may have exposed user email addresses

LifeLock, an Arizona-based identity theft protection firm may have exposed email addresses of millions of its customers – Simply put: A firm vowing to protect online identity of its customers may have exposed their identity to malicious hackers and cybercriminals. It happened due to a critical vulnerability which exposed LifeLock’s customers to phishing and identity […]

Popular Android/iOS apps & Extensions collecting highly personal user data

In May this year, HackRead reported how an Israeli company Unimania was caught collecting personal, Facebook and browsing data of users through Android apps and Chrome extensions. Now, researchers have discovered another “spyware” campaign aiming at stealing personal data of users but this time it is far bigger than the one previously reported. Ad-blockers and security […]

Update your devices: New Bluetooth flaw lets attackers monitor traffic

The Bluetooth flaw also opens door to a man-in-the-middle attack. The IT security researchers at Israel Institute of Technology have discovered a critical security vulnerability in some implementations of the Bluetooth standard in which not all the parameters involved are appropriately validated by the cryptographic algorithm. If the vulnerability is exploited it can allow a remote attacker within the range of […]

Data breach: Millions of SingHealth users affected including Singapore’s PM

SingHealth, the largest health care institution in Singapore has suffered a massive data breach in which records of over 1.5 million patients who visited SingHealth’s polyclinics and clinics between from May 1, 2015, to July 4 this year – One of the victims of the breach is the Prime Minister of Singapore Lee Hsien Loong while prescription details of 160,000 patients including […]

GoogleUserContent CDN Hosting Images Infected with Malware

The malware targets trusted Google sites. The metadata fields of images uploaded on trusted Content Delivery Network (CDN) of Google have been embedded with malicious code by hackers to compromise websites. This approach is indeed damaging because users never scan images for malware. The injected malware uses EXIF (Exchangeable Image File) format to hide the […]

Top 10 vulnerable airports where your device can be hacked

The aviation industry is growing, thanks to millions of passengers traveling around the world. According to Statista, in 2017, 36.8 million flights were operated worldwide while the Bureau of Transportation Statistics revealed [PDF] that in 2017, U.S.-based airlines transported over 746 million passengers to and from airports across the country. For the airports, it is an opportunity to take advantage of […]

Ubisoft Games Hit by Massive DDoS Attacks

France based video game publisher Ubisoft suffered a series of massive DDoS attacks (distributed denial-of-service). As a result, several Ubisoft gaming servers including Ghost Recon Wildlands, For Honor and Far Cry 5 were facing connectivity issues. The DDoS attacks began on Tuesday, July 17th when Ubisoft used its customer support Twitter handle to confirm the outage and that […]

Luminosity RAT author pleads guilty to creating & selling hacking tool

In February this year, we informed our readers about the unceremonious closure met by the infamous hacking tool Luminosity RAT at the hands of law enforcement authorities from Australia, Europe, and North America. Users could no longer feel threatened by the dangerous RAT, which was also known as LuminosityLink, after a joint operation conducted by […]

New sextortion scheme uses victims’ real password for blackmailing

The Sextortion Campaign involves Passwords Stolen from Old Data Breaches. Internet users need to be wary of a new phishing scam that is actually a sextortion scheme, which utilizes old passwords of users and blackmails them for watching pornography. The scammers claim to have recorded footage of the victim while watching porn. They also claim […]

Road navigation systems can be spoofed using $223 equipment

Researchers from a number of renowned institutions including Virginia Tech, the University of Electronic Science and Technology of China and Microsoft Research have concluded that it is possible to spoof GPS signals and send people in the wrong direction. The ironic part is that such an advanced technology can be spoofed using equipment worth no […]

You are not alone; Instagram is down for many

The photo and video-sharing social networking service Instagram has been hit by a massive outage and currently down for many users around the world. According to the outage map displayed on DownDetecter, the scale of this outage can be seen affecting users around the world including Brazil, India, United States, Italy, United Kingdom and some parts of […]

Spectre bug protection forcing Chrome to use 10 to 13% more RAM

The entire tech industry was shaken after the discovery of Meltdown and Spectre, critical security bugs that were found in almost all modern computer processors, and the aftershocks are still being observed. Chrome is the newest victim of the collateral damage that these bugs have brought forth. Reportedly, Google Chrome 67 has now enabled Site […]

Dark web marketplace found selling access to airport’s security system

Dark Web has become the hub of illegal activities over the Internet. Everything from credit card numbers to personal information and even classified data about military equipment is being sold for peanuts. Just yesterday, it was reported that a hacker stole classified information on U.S Airforce’s MQ-9 Reaper Drone and sold it on Dark Web. Now, […]

Timehop database hacked: Hackers steal data of 21 million users

Timehop is a smartphone app for iOS and Android users that was developed in 2011 with the idea of collecting old posts and photos of social media users including Facebook, Instagram, Dropbox and Twitter to display them as the same day in past years. However, now the company is making headlines for all the wrong […]

How a USB could become security risk for your device

A flash drive or USB may provide a capacity as large as 2TB or could have a small space of 256 MB but it caters the individuals in many aspects especially to store data. However, with the perspective of security, these USB drives could prove to be vulnerable to your devices. In the mid of […]

Top 7 Most Popular and Best Cyber Forensics Tools

We often watch experts in movies using forensic tools for their investigations but what cyber forensic tools are used by experts? Well, here are top 7 cyber forensic tools preferred by specialists and investigators around the world. “Torture the data and it will confess to anything” Ronald Coase. Cyber forensic: As the title says, it is […]