Blog

Google Play

Malicious App Sneaking Around Google Play For A Year

A malware-bound Android application was discovered hanging around on Google Play for very nearly a year. Amid this time, the malignant application was accessible for download by all Google Play clients. The malware was covered up in an application named “Simple Call Recorder”, distributed by the FreshApps Group.   At the season of disclosure, the pernicious...
Continue Reading
Online Dating

Hackers Found Selling Online Dating Profiles for a Measly US$153

In May 2017, Moll and Tactical Tech obtained one million dating profiles from the information representative site USDate, for around $153. USDate asserts on its site that the profiles it’s offering are authentic and that the profiles were made and have a place with genuine individuals effectively dating today and searching for accomplices.   In 2012,...
Continue Reading
Malware Attack on The Pakistani Military

Operation Shaheen: Malware Attack on The Pakistani Military

The Pakistan Air Force is the evident focus of a complex new state-supported assault campaign. Security house Cylance said for this present week a state-supported gathering – named the White Company by scientists – has been hoping to get into the systems of the Pakistani military in a long haul focused on assault battle known as...
Continue Reading
crypto exchanges

NoKor Hacked Crypto Exchanges to Fund Regime

As per cybersecurity firm Inksit Group, state-financed programmers in North Korea have been focusing on crypto trades in South Korea to go around different authorizations forced on the routine.   The security firm affirmed the legislature of North Korea of running illegal introductory coin offering (ICO) extends and breaking into substantial crypto trades.   “We found...
Continue Reading
Vishing Scam

Swindling Thru Deception : The New Vishing Scam

Vishing, or voice phishing, is a phishing assault where fraudsters utilize the phone to distort their alliance or specialist with the expectation that unfortunate casualties will uncover qualifications or other individual data for further trade off. Regularly, vishing on-screen characters get the individual data of the person in question, including their telephone number, and start a...
Continue Reading
Website Malware protection

265 Researchers Take Down 100,000 Malware Distribution Websites

Security researchers over the globe joined in a venture committed to sharing URLs used in malicious campaigns managed to take down close to 100,000 websites actively engaged in malware distribution. The task called URLhaus was started by abuse.ch, a non-benefit cybersecurity association in Switzerland. The operations began towards the end of March 2018 and recorded a...
Continue Reading
Domain Monitoring

DHS issues security alert about recent DNS hijacking attacks

DHS spreads out four-advance activity plan for researching DNS hacks and securing DNS management accounts.   The US Department of Homeland Security (DHS) has distributed today an ” emergency directive” that contains guidance with respect to an ongoing report detailing a wave of DNS hijacking incidents perpetrated by Iran.   The emergency directive [1, 2] orders...
Continue Reading
Cameras

New Security Script Allows Insecure Cameras to be searched by IP Address

There’s no closure to the security bad dream that is the Internet of Things (IoT). Another apparatus created by a security scientist gives you a chance to seek uncertain reconnaissance cameras by essentially entering a location.   Named Kamerka, the apparatus consolidates information of cameras that are associated with the web with area information to make...
Continue Reading
Radisson Hotel Group Hacked

Radisson Hotel Group Hacked!

The Radisson Hotel Group is informing individuals from its Loyalty Scheme about an information rupture that may have brought about the unknowingly illegal presentation of their sensitive personal information. The illegally exposed data incorporates names, physical locations, email addresses, telephone numbers, Radisson Reward numbers and frequent flyer numbers and information of the individuals/members. The malicious hacking...
Continue Reading
Phishing Modus Using WhatsApp

Phishing Modus Using WhatsApp: An alternative to Email Campaigns

What is up with the app? Cybercriminals who take advantage of people through social engineering techniques are now prowling within WhatsApp. Noticeably these threat actors are largely targeting Middle Eastern countries using company logos, and preset messages to lure victims in giving out crucial information. What are the styles of messages? From fake lottery winners up...
Continue Reading
Phishing Blackmail Campaign

New Phishing Blackmail Campaign

Cyber Security analysts have seen an ongoing switch in strategies by malicious threat actors’ resolved to leading shakedown activities. The essentially terrifying strategy in these phishing activities is to tell the beneficiary the blackmailer has humiliating or harming proof against the objective with an interest to pay a set sum all together for the pernicious on-screen...
Continue Reading
Hackers Hide Crypto-Jackers in Windows Installation Files

Hackers Hide Crypto-Jackers in Windows Installation Files

Crypto-jacking plans are getting more complicated continuously. It shows up programmers are currently masking digital money mining malware and passing it off as authentic Windows establishment bundles.   Analysts say the vindictive programming, all the more normally known as Coinminer, was particularly intended to fly under the radar. What makes the assault especially hard to identify...
Continue Reading
Intel CPUs Hyperthreading Weakpoint Steals Crypto Keys

Intel CPUs Hyperthreading Weakpoint Steals Crypto Keys

PortSmash is the second processor assault that objectives hyperthreading. TLBleed unveiled in June likewise utilized hyperthreading to decide a private encryption key. The specialists building up that assault ran a program figuring cryptographic marks utilizing the Curve 25519 EdDSA calculation executed in libgcrypt on one coherent center and their assault program on the other sensible center....
Continue Reading
HSBC USA Hacked

HSBC USA Hacked – User Data Compromised

HSBC Bank USA, an American backup of UK based HSBC, has endured an information rupture that brought about the trade off of individual information of a few clients. Despite the fact that the number isn’t yet known, the bank has affirmed that the assault happened between October 4 and October 14, 2018.   What was the...
Continue Reading
Stuxnet malware

Iran Got Hit by Powerful StuxNet 2.0 Malware

Iranian systems were as of late allegedly hit by another all the more ground-breaking variation of the notorious Stuxnet malware. The new Stuxnet variation is purportedly more forceful and modern. The malware was first found eight years prior when it focused on Iran’s atomic frameworks.   The Stuxnet virus was uncovered some eight years ago, and...
Continue Reading
IronChat Cracked by Law Enforcement Revealing

IronChat Cracked by Law Enforcement Revealing Almost 300K Messages from Suspected Criminals

Dutch police have uncovered that they could keep an eye on the interchanges of in-excess of 100 presumed crooks, observing live as over a fourth of a million chat messages were traded. The scrambled messages were sent utilizing IronChat, an apparently secure encoded messaging administration accessible on BlackBox IronPhones.   The site of Blackbox Security used...
Continue Reading
email phishing scams

Dubai’s Biggest Bank Falls Victim to Tax Refund Phishing Scam

Dubai’s largest bank has cautioned clients to be careful with another phishing email trick which professes to offer VAT discounts. Emirates NBD cautioned that an email with the headline VAT Refund Notification, professing to be from the bank, ought not to be opened.   “We ask you to be very watchful and dependably check the source...
Continue Reading
Default Cisco Admin Account Exposes Switches to Remote Attacks

Default Cisco Admin Account Exposes Switches to Remote Attacks

A default account present in Cisco Small Business switches can enable remote assailants to increase finish access to defenseless gadgets. The systems administration goliath presently can’t seem to discharge patches, yet a workaround is accessible. As indicated by Cisco, Small Business switches running any product discharge accompany a default account that is accommodated the underlying login....
Continue Reading
Elon Musk CryptoJackers Hijack Legit Accounts

Elon Musk CryptoJackers Hijack Legit Accounts

Tricksters are back on Twitter imitating their most loved big name, Elon Musk, in an offer to persuade individuals to put resources into their imposter Bitcoin plot.   This time, the plan brings up difficult issues over the fact that it is so natural to seize and modify confirmed records on the informal organization. For this...
Continue Reading
AI Weapon against Cyber Attacks on The Dark Web

DARKMENTION: AI Weapon against Cyber Attacks on The Dark Web

Cybersecurity is one of the essential worries of web clients these days, which incorporates business and legislative associations too. Later, vast scale information ruptures at Gmail, Equifax, Facebook, Google+ Cathay Pacific Airways, and Yahoo, and so on. Have clarified that the greater the association, the higher would be the cybersecurity danger. The job of Dark Web...
Continue Reading
1 2 3 4 5 15

Categories