Browsing tag

Security

Facebook to end facial recognition and delete billions of records

Facebook has announced that it will shut down its Facial Recognition System and delete the templates of over 1 billion people stored by this feature. This is a significant change, but contrary to popular perception, the social network won’t be forgoing the technology in its entirety because it regards facial recognition as a “powerful tool” […]

Researcher found 70% Wi-Fi networks in Tel Aviv are hackable

While examining Wi-Fi networks in Tel Aviv, Israel, 70% or around three-quarters of home and small-scale office Wi-Fi network passwords were vulnerable to hacking using inexpensive hacking tools. CyberArk’s security researcher made a startling discovery while examining Wi-Fi networks in Tel Aviv, Israel. According to the researcher Ido Hoorvitch, 70% or around three-quarters of home […]

Trojan Source attack lets hackers exploit source code

Trojan Source attack impacts all popular programming language compilers, such as C, C++, C#, Java, JavaScript, Python, Rust, and Go. A research paper published by Cambridge University researchers Ross Anderson and Nicholas Boucher, titled “Trojan Source: Invisible Vulnerabilities,” reveals details of a unique class of vulnerabilities that can be exploited to inject malware in the […]

10 Free and Best OSINT Tools 2021

OSINT or Open source intelligence refers to information about businesses or people that can be collected from online sources. However, it requires tools to do so, and here are the 10 best OSINT Tools for 2020. It’s only natural that we feel the need to weed out what’s most valuable in the age of information […]

New malware lures fake Chrome update to attack Windows PCs

The prime target of this malware campaign is unsuspecting users on Windows 10. Rapid7 Managed Detection and Response team has shared details of their newly identified malware campaign, urging unsuspecting Windows users to remain cautious. This campaign is designed to steal sensitive data and cryptocurrency from infected PCs. In the latest campaign, the attackers install […]

Facebook sues Ukrainian man for scraping and selling 178m users’ data

Facebook tracked down the programmer after he mistakenly used his contact information on email and job portals. On October 21, 2021, Facebook filed a lawsuit against a Ukrainian citizen for allegedly scraping information of 178 million users of the social network and selling the data on hacker forums. Reportedly, the data scraping occurred between 2018 […]

New Linux kernel memory corruption bug causes full system compromise

Researchers dubbed it a “straightforward Linux kernel locking bug” that they exploited against Debian Buster’s 4.19.0.13-amd64 kernel. In 2017, MacAfee researchers disclosed a memory corruption bug inside the Linux kernel’s UDP fragmentation offload (UFO) that allowed unauthorized individuals to gain local privilege escalation. The bug affected both IPv4 and IPv6 code paths running kernel version 4.8.0 […]

WinRAR vulnerability allowed attackers to remotely hijack systems

The vulnerability in WinRAR trialware could be abused by a remote attacker for executing arbitrary code on any system thus, getting an opportunity to launch a range of attacks. According to a report from Positive Technologies, a remote code execution vulnerability was identified in a free trial version of WinRAR. The vulnerability was discovered in […]

Google details cookie stealer malware campaign targeting YouTubers

Google attributed the malware campaign to a group of attackers recruited via a Russian-language hacker forum. Google has disclosed details of a new campaign involving phishing attacks launched against YouTube channel owners with the sole purpose of hijacking their channels. According to the report, threat actors are using cookie theft malware in the attacks to […]

How to fix iPhone boot loop and iPhone black screen by yourself

iPhone boot loop has become more prominent following the recent iOS upgrades. Worse, you might even experience an iPhone black screen – Let’s dig deeper into how to solve these two issues. It can be quite mood-wracking when you reboot your phone only to have it caught in a loop. Regardless, what you can take […]

DDoS booter customers received warning letters by Dutch police

Apparently, the individuals who received the warning were identified as suspects and will be prosecuted for a cyber offense if they continue using DDoS services. Dutch National Police have sent final warning letters to around thirty users of an on-demand DDoS (distributed denial of service) website. The move indicates that the police in Europe are […]

How using the purple team approach helps in addressing cybercrime

Automated purple teaming is one of the best ways to address cybercrime as it does not only test for the deficiencies in existing security controls – Let’s dig deeper into this approach. An IBM report reveals that the cost of data breaches has reached record highs over the past year. The banking industry has also […]

What is a data breach & how to prevent one?

What is a data breach? A data breach is a security lapse where a non-authorized person can assess sensitive information without authorization. Let’s dig deeper into data breach prevention measures. A data breach is among the significant concerns bothering companies today. As more and more data is generated, proper management is where people focus their […]

iPhone 13 Pro, Windows, Chrome, Linux and others pwned at Tianfu Cup

Tianfu Cup is the Chinese version of the Pwn2own in which hackers from Kunlun Lab managed to secure first place by hacking iPhone 13 through a vulnerability in the Safari mobile browser. The Chinese version of the Pwn2own hacking competition called Tianfu Cup took place from Oct. 16 to Oct. 17 in Chengdu, China. The […]

Amnesty Intl. accuses Indian cyber security firm of spyware attacks

According to Amnesty International, it found evidence that attackers testing the spyware were using the IP address of Indian cyber security firm Innefu Labs. Amnesty International has accused an Indian cyber security company of developing Android spyware that has been used in targeted attacks against Togolese activists. The company, Innefu Labs, has denied the allegations. […]

Psst! tool by 1Password lets users share passwords using a link

1Password password manager has introduced a new tool called Password Secure Sharing Tool or Psst! that lets users share their passwords or “anything in their 1Password vault” by simply using a link even with those who don’t use 1Password. We all need to share passwords in the workplace and also at home. It is a […]

OpenSea vulnerability allowed crypto stealing with malicious NFTs

Researchers investigated the issue in OpenSea after an increase in complaints about receiving and opening free airdropped NFTs to steal user funds. The IT security researchers at Check Point identified critical security vulnerabilities in OpenSea (OpenSea.io – the highly popular and world’s largest NFT marketplace), which would allow remote attackers to drain the crypto wallets […]

Ex-army admin jailed for 12 years over US military health data theft

Frederick Brown, a medical data technician & administrator associated with the 65th Medical Brigade of the US Army caused millions of dollars in losses Frederick Brown, a 40-year-old resident of Las Vegas, Nevada, has been sentenced to over 12 years behind bars after pled guilty to his involvement in a fraud scheme. Reportedly, Brown defrauded […]

White House Dark Web Marketplace Shuts Down its Operations

The White House Dark Web Marketplace says “We are retiring!” The White House Dark Web marketplace will cease to exist as the website administrator has announced to shut down its operations and that they are retiring. The admin of the White House market “mr white” explained that the platform would halt its operations as he […]

How Can You Use A VPN On Netflix?

To watch Netflix securely and unlock its international catalog, you just need a reliable VPN – Let’s dig deeper. Netflix is one of the leading streaming platforms that has over 15,000 titles in its library including licensed and original content. A large number of the global population enjoy their favorite movies or TV shows as […]

Twitch hacked- Source code and Streamer payment figures leaked

Twitch has undergone a massive hack resulting in leaking the source code for its unreleased streaming service, creator payout details, and other sensitive information. The attack was carried out by a group that has labeled the leaked data as “Part One,” which indicates more installments will be coming up soon. According to sources, Twitch is […]