Browsing tag

Security

Stealthy RotaJakiro backdoor malware targeting Linux for 3 years

New RotaJakiro Stealthy Linux Malware With System Backdoor Capabilities Went Unnoticed for 3 Years. Qihoo 360’s Network Security Research Lab, aka 360 NetLab, the research team has discovered a new Linux malware with outstanding backdoor capabilities. The malware is dubbed RotaJakiro, and it allows attackers to steal and exfiltrate sensitive system data from compromised devices. […]

Tesla cars can be remotely hacked using drone, WIFI dongle

While analyzing vulnerabilities researchers were able to unlock Tesla Model X’s doors with a remote hack using a DJI Mavic 2 drone carrying a WIFI dongle. Wi-Fi-based hacking could be an issue of concern with automobiles we had never even thought about it. But two security researchers, Kunnamon, Inc.’s Ralf-Philipp Weinmann and Comsecuris GmbH’s Benedikt […]

8 steps to develop secure and unique app for your business

Are you planning to create an app for your business? If yes, you are in the right place! A smartphone app is one of the critical elements of any business’ marketing strategy. It helps various businesses establish better relationships with their users. An app can help you stay in touch with your clients all the […]

How to repair suspect database in SQL Server

Programs work with databases, and if the database crashes essential information can be lost and this will be disastrous to the user. So what are your options? Programmers say that every program has an error, even if it’s just one and if you’ve ever been in close contact with computer software, you’ll understand that even […]

Combatting Email Spam – What you should know

It is difficult to protect yourself from spammers. You can register on the site and leave your mail, subscribe to the newsletter, and become a victim of pranksters. In any case, your email address will be publicly available, which will lead to spam in your inbox. However, it is not a reason to panic – […]

1-click code execution vulnerabilities in popular software apps

The IT security researchers at Positive Security Fabian Bräunlein and Lukas Euler have identified multiple one-click vulnerabilities across various popular software applications that can let an attacker execute arbitrary code on targeted devices. The researchers noted in their research that desktop apps, particularly those that pass user-supplied URLs to be opened by the OS, are […]

A child sent out gibberish tweet from official US Nuclear-agency account

A Child’s Gibberish Tweet from US Nuclear-agency Account Sends Twitter into Frenzy – Sparks Debates on National Security. How is it possible that a child can have access to the official Twitter account of the US Nuclear Agency, which is responsible for the safety of America’s nuclear weapons? It is indeed possible when you are […]

A hacker claims to be selling sensitive data from OTP generating firm

The OTP-generating firm has some of the top giants as clients including Google, Facebook, Amazon, Apple, Microsoft, Signal, Telegram and Twitter, etc. A hacker appears to be selling sensitive data they claim to have stolen from an OTP-generating company. This particular company has some of the most popular tech and business giants on its list […]

Hackers claims to be selling 13tb of Domino’s India data

According to IT security researcher Rajshekhar Rajaharia, “If you ever had ordered pizza online from Domino’s India your data is leaked now.” Among other recent hacks that compromised Indian users’ data, a popular pizza outlet in the country, Domino’s India, seems to have undergone a cyber attack as well. According to Rajshekhar Rajaharia, an Indian […]

Google Argentina domain bought by a random citizen for $5

The official Google Argentina domain went down for hours after its ownership was transferred to an Argentinan citizen. On Wednesday, Google users in Argentina were in for a surprise after the country’s primary search engine went down for almost three hours. Assuming that the server had crashed, many users started expressing concern over what could […]

Signal CEO hacks Cellebrite cellphone hacking, cracking tool

Moxie Marlinspike, CEO of Signal states that since Cellebrite itself makes a living from undisclosed vulnerabilities, he decided to disclose the vulnerability to the public rather than informing the company. In December 2020, Cellebrite claimed that it could easily crack Signal’s encryption. However, it seems like tables have turned for the Israel-based software maker since […]

Hacker dumps sensitive household records of 250M Americans

On April 22nd, 2021, a hacker going by the online handle of Pompompurin leaked a database containing personal and sensitive household data of over 250 million (250,807,711) American citizens and residents. As seen by Hackread.com, the database was leaked on a prominent hacker forum and comprises 263 GB worth of records including 1,255 CSV subfiles […]

Scraped data of 1.3 million Clubhouse users published online

Clubhouse has confirmed that it did not suffer a data breach and leaked records are in fact collected through data scraping. In the last couple of weeks, threat actors leaked a trove of scraped LinkedIn and Facebook user records. In LinkedIn’s case, the leaked records contained personal details of more than 1 billion users while […]

SyncStop Is A USB Condom That You Need To Protect Your Data

Bad actors have evolved over time, and so have techniques for stealing your data from your device. Earlier this month, the Los Angeles District Attorney’s office issued an advisory that warned the public from using charging stations at airports, public places, and restaurants as hackers might install malware on people’s device through it. The technique […]

Wireshark 3.0.7 Released – Fixes for Security Vulnerabilities & Update for BGP, IEEE 802.11, TLS Protocols

Wireshark 3.0.7 released with a number of security updates and fixed several other bugs that reside in the Wireshark components. Wireshark also updated Protocol Support for various protocols such as BGP, HomePlug AV, IEEE 802.11, and TLS. Wireshark is known as the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development, […]

New SMS Alternative ‘RCS Standard’ Is Exposing Users To Security Threats

Replacing the regular SMS with the RCS or Rich Communication Services is making users vulnerable to text-based attacks, call interception, location tracking, and more, according to new research. RCS (Rich Communication Services) standard is a replacement for SMS that will include features such as read receipts, the ability to send media, etc. While the new […]

How Will Blockchain Technology Revolutionize Logistics?

If you haven’t noticed, blockchain technology is taking the world by storm, catapulting technology into unchartered, new territory, allowing for greater transactional accuracy, and more importantly, transparency. The Motley Fool sums up the blockchain, “It’s a brand-new way of transmitting money without the need for traditional banking networks, as well as a means to store […]

Botnet found using YouTube to illegally mine cryptocurrency

Hundreds of botnets operate internationally to achieve various malicious objectives. One such botnet named Stantinko which has been operating since 2012 in countries such as Russia, Ukraine, Belarus, and Kazakhstan controls over half a million computers globally. In its latest update, it has added a new capability of cryptomining making use of the highly anonymized […]

Small businesses also need protection from cyber attacks

If you run a small business, it’s a matter of when, not if, your computer system or cyberinfrastructure falls prey to cybercriminals. Every day, thousands of small companies find their systems compromised and data stolen. When large companies are hacked, the media soon report the details. These giant corporations can afford the most advanced cyber […]

How To Stop Someone From Spying On Your Cell Phone

People have the right to privacy on their mobile phones. However, with the increase of malicious hackers and the use of third-party apps, this privacy is diminishing. Companies and cyber criminals look to obtain your data by any means, and use it to their advantage. However, most consumers don’t want their personal information getting in […]

Facebook & Twitter suffer data breach via third-party developers

Another day, another breach involving Facebook, Twitter, and third-party developers. On Monday, both Facebook and Twitter announced that the data of hundreds of users had been compromised due to a software development kit (SDK) named “One Audience” giving third-party developers access to certain data. The data includes email addresses, usernames and recent tweets of anyone […]