Blog

Malicious Mobile App Stealing Users’ Money

A malicious mobile app impersonating a call recording functionality in the Google Play Store managed to take away thousands of euros from a couple of bank customers in Europe. The malicious malware-laced app was planted in a QRecorder app, being advertised as an automatic call and voice recording tool.   At the time of the analysis,...
Continue Reading
identity-theft prevention

Major US Server Techs Allegedly Embedded With Chinese Spy Chips

Tech Companies have ardently denied Bloomberg’s declaration that China’s Super Micro gave them hardware loaded with spy chips, but that isn’t stopping all sorts of accusations from pouring in.   Bloomberg claims has obtained documents from security researcher Yossi Appleboum that reportedly show evidence of an unnamed major US telecom finding “modified hardware” from Super Micro...
Continue Reading
Domain Factory hacker

GoDaddy’s Domain Factory Endures Data Breach

One of the largest hosting companies in Germany, DomainFactory, has been penetrated by hackers. The hosting company, which is owned by GoDaddy since 2016, reported that the data breach happened around late April 2019, but the company found out about the incident just last week, May 23rd, after the alleged Hacker began sharing bits of the...
Continue Reading
UC Browser Apps

Unpatched Flaw in UC Browser Apps Could Let Hackers Launch Phishing Attacks

Threat summary This affect latest UC Browser version 12.11.2.1184 and UC Browser Mini version 12.10.1.1192. The vulnerability resides in the way User Interface on both browsers handles a special built-in feature that was otherwise designed to improve users Google search experience.The vulnerability, which has no CVE identifier as its discovered so recently, Browser could allow an...
Continue Reading
Mobile Apps

Your Mobile Apps Are Secretly Sharing Your Data on Social Media

It’s not just dating and health apps that might be violating your privacy when they send data to Facebook.   A Privacy International study has determined that “at least” 20 out of 34 popular Mobile Android apps are transmitting sensitive information to Facebook without asking permission, including Kayak, MyFitnessPal, Skyscanner and TripAdvisor.   This typically includes...
Continue Reading
Huawei devices

Google and Huawei: Temporary License Granted

The US Government’s fraud management efforts appear to have made the world go hysterical as it had ordered Alphabet’s Google to revoke the license of Android and Google proprietary apps from Huawei. In a sudden turn of events the Department of Commerce has given Huawei a temporary general license to maintain its current products.The general license...
Continue Reading
Cipher Stunting

Billions of Malicious Bot Attacks Take to Cipher-Stunting to Hide

Threat Summary There has never come a time when TLS signature become focal point of target by malicous actors. Since cipher stunting is fairly new in the threat landscape, and now prevailing as a new vector to be exploited. This approach is found to be the latest evasive technique and more predominately used that reached up...
Continue Reading
best virus malware protection

This password-stealing malware just evolved a new tactic to remain hidden

Malware Summary Qakbot or Qbot also known as bank malware has been in the threat landscape since 2008 similar to Rubber Ducky, Mimikatz, and is considered one of the most effective malware families of the past decade, in part because its source code is available to cybercriminals, so it can be easily modified and extended. Primarily...
Continue Reading
Radio Hacking

Short Wave Radio Hacking is a Serious Threat

A couple from Texas were given the shock of their life this week when they say they heard a man’s voice coming from their baby monitor and threatening to kidnap their four-month-old son.   Nathan and Ellen Rigney were sleeping just before midnight on Monday when they heard a beeping sound coming from their Nest-brand baby...
Continue Reading
MageCart skimmer script

MageCart Scripts Hosted on GitHub Used to Skim E-Commerce Websites

Security experts discovered the Magecart skimmer scripts used to compromise a few hundred e-commerce websites worldwide hosted on GitHub.   Security firms have monitored the activities of a dozen Magecart groups at least since 2015. The gangs use to implant skimming script into compromised online stores in order to steal payment card data on, but they...
Continue Reading
Ransomware

US Airport Systems Held Hostage By Ransomware

Hopkins International Airport is battling a ransomware attack that knocked out some displays and disabled email, according to multiple reports from Cleveland, Ohio. Hopkins International Airport is the largest and busiest airport in Ohio, and the 43rd busiest airport in the United States by passenger numbers, according to Wikipedia.   The City of Cleveland and Hopkins...
Continue Reading
Cyber Attacks

Amnesty International HK Office Suffers Cyber Attacks

Amnesty International Hong Kong can reveal it has been the target of a sophisticated state-sponsored cyber-attack, consistent with those carried out by hostile groups linked to the Chinese government.   The cyber-attack was first detected on 15 March 2019, when state-of-the-art security monitoring tools detected suspicious activity on Amnesty International Hong Kong’s local IT systems. Cyber...
Continue Reading
CARBANAK Banking Malware

Source Code for CARBANAK Banking Malware Found On VirusTotal

What do we know about Carbanak malware As we all know Carbanak has its impressive portfolio holding in its reputation, considering it as the leading player for Advanced Threat Protection attack and believed to be one of the successful attack in the world used entirely for banks, financial institutions, hospitals, and restaurants. First seen on threat...
Continue Reading
Malware and Spyware Protection

Hidden for 5 years, complex ‘TajMahal’ spyware discovered

From the Abyss Researchers has recently unveil new form of sophisticated cyber espionage framework that has been active since at 2013,dubbed as the TajMahal named after one of its XML file used for exfiltration, and an unknown origin and crafter, Its modules and bundles functionality which have never been before seen in an advanced persistent threat...
Continue Reading
identity theft prevention

Profoundly Database Breach: Revealed User Identities?

Over the past few weeks Facebook has been quite active partnering with different app makers for their Facebook platform to incorporate where users can also enjoy it. Profoundly has been moderately gaining fame and somehow trended. The app Profoundly is used to anonymize users who want to ask questions on Facebook. Despite the apps main feature...
Continue Reading
Phishing Scheme

Phishing Scheme Uses Legit Signup Forms to Steal Payment Card Data

Baiting Scheme Legitimately looking organization newsletter subscription forms to scam unwary victims from making payment transactions leading to hackers’ personal bank account. Phishing Technique Drawn companies such as Audi, Austrian Airlines, and S-Bahn Berlin to Russian users. Here’s how it is pulled off: Email catch line saying “Money for you” either written in English or German...
Continue Reading
anti virus malware protection

Xiaomi Brand Phones: A Slip Up of Anti-Virus App Could Turn Against You as a Malware

Mobile phones in today’s generation are still selling like pancakes despite the stiff competition between different mobile phone manufacturers. Needless to say, mobile phones are still part of our daily lives which serves as a multi-functional tool from communication up to almost anything thanks to the applications made for mobile devices. It is well-known that Android...
Continue Reading
Data breaches

Data breaches more common than rain in the UK

The UK has something of a reputation for its wet climate, and its citizens for constantly talking about the weather. So, it might come as a surprise to find that in the UK the chance of encountering a data breach is higher than that of experiencing a rainy day. A survey by technology services company shows...
Continue Reading
Android malware

New Android Malware Gustuff Targeting 100+ Banking, 32 Cryptocurrency and Messengers apps such as WhatsApp

A newly found type of Android malware has stolen cryptocurrency and banking data from in excess of 125 different applications. The “Gustuff” Trojan virus is said to pick up its popularity in the cybercriminal underworld given that it’s custom-made explicitly to take banking and crypto assets. Gustuff is accepted to be about a year old but...
Continue Reading
hacking

Asus was warned of hacking risks months ago, thanks to leaky passwords

A security researcher cautioned Asus two months back that workers were inappropriately distributing passwords in their GitHub stores that could be exploited to get to the organization’s corporate network. One password, found in an employee repo on the code sharing, enabled the researcher to get to an email account used by internal developers and engineers share...
Continue Reading
1 2 3 4 5 15