Blog

identity fraud and identity theft protection

When Aaadhaar leaks are real despite denial: This time an LPG Company did it

What is new? This time a record number of 6.7 Million records were leaked through an LPG company. Not necessarily that they did it, but their complacency on their cyber security infrastructure made them vulnerable to data theft. Take note that Aadhar data were leaked through this company. It makes sense that if you cannot hack...
Continue Reading
Evernote for Windows

Evernote Flaw Allowed Hackers to Create XSS Vulnerability and Steal Data

A researcher who uses the online moniker Sebao identified a stored XSS flaw in the Evernote app. He found that when a picture was added to a note and later renamed, JavaScript code could be added instead of a name. If the note was shared with another Evernote user, the code would get executed when the...
Continue Reading
Artificial Intelligence

How Artificial Intelligence Will Become Weaponized in Cyber Attacks

On Thursday, analysts from Darktrace (.PDF) said that the present risk scene is loaded with everything from content kiddies and shrewd assaults to cutting edge, state-supported ambushes, and in the last sense, assaults keep on developing. Be that as it may, for each refined assault presently being used, there is the potential for further advancement through...
Continue Reading
Macos Malware

Macos Malware Releases an MITM Attack

Malware creators are continually searching for new and inventive approaches to stay away from location and increment benefits, so a report that an evidently new method was being conveyed against macOS clients a week ago made them start up our Virtual Machines to perceive what our foes had concocted this time.   Old Dog, New Tricks...
Continue Reading
DNS burrowing

MTN Vulnerability Could Allow Hackers To Steal Data

A security analyst as of late reached MyBroadband to report a weakness in the MTN arrange that could enable programmers to get free information utilizing DNS burrowing.   The Domain Name System (DNS) is an arrangement of servers on the Internet which empower the interpretation of comprehensible spaces, as mtn.co.za, into Internet Protocol addresses.   Burrowing...
Continue Reading
CryptoJacking

Massive CryptoJacking Carried Out Using Canadian University Network

Malicious cyber criminals have just utilized a Canadian college’s system to do a huge cryptojacking effort. Nova Scotia’s St. Francis Xavier University found the assault a week ago and handicapped its system to remove the assault. The programmers allegedly introduced a malware to direct the assault.   In a statement released on Nov. 4, the university...
Continue Reading
BitCoins

Necurs Sextortion Movement Sifted Almost US$150,000 in BitCoins

Two new sextortion movements being appropriated by means of the infamous Necurs botnet have as of late been distinguished by threat security specialists. The malicious con artists behind these fraudulent crusades are focusing on exploited individuals whose information has already been spilled.   The con artists guarantee to have trading off recordings of the person in...
Continue Reading
MyFitnessPal

Under Armour’s MyFitnessPal Hacked – User Data Exposed

Another data has surfaced with respect to the Under Armor’s MyFitnessPal application information break. The information rupture that happened in February 2018, has influenced around 3,977,385 Australian clients.   MyFitnessPal lets users monitor their calorie intake and measure it against the amount of exercise they are doing, with a database of more than 2 million foods...
Continue Reading
Healthcare industry

42K Clients’ Data Exposed In New Health First Hacking Incident

Health First just uncovered an information rupture that influenced its online application seller. It may have traded off the individual information of around 42,000 clients. The firm guaranteed that the information broke incorporated clients’ Social Security Numbers, locations and dates of birth.   In any case, the social insurance association asserts that no therapeutic data was...
Continue Reading
cryptocurrency mining malware

CryptoJacking Malware Uses Victims’ Machines to Mine CryptoCurrency

Cyber Security researchers have just discovered a new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies.   Coin mining malware is difficult to detect. Once a machine is compromised, a malicious app runs silently in the background with just one sign: performance degradation. As the malware increases power consumption, the machine...
Continue Reading
DarkHotel

DarkHotel: NoKor Hacking Elite Targeting IE Scripting Engine

The stealthy North Korean APT group dubbed DarkHotel, otherwise known as APT-C-06, Fallout Team, SIG25, and so on, has been progressively focusing on Internet Explorer (IE) scripting motor. Security specialists as of late found that DarkHotel made new endeavors for two more seasoned vulnerabilities influencing the Internet Explorer scripting motors.   Despite the fact that DarkHotel’s...
Continue Reading
BotNet

New BotNet Army Slowly Spreading Mayhem On The Net

Security specialists have revealed the noxious exercises of another botnet named BCMUPnP_Hunter. It has just subjugated around 100,000 switches and has been unobtrusively becoming in the course of recent months. The botnet is being utilized to convey enormous email crusades and endeavors to interface with webmail administrations.   The botnet’s administrators were spotted utilizing a five-year-old...
Continue Reading
Hospital Data Breach

Huntsville Hospital Data Breach

Huntsville Hospital in Alabama is informing work candidates about a data rupture that may have brought about the bargain of their own information. The data rupture happened in May 2018 yet the doctor’s facility came to think about it just in October 2018.   As indicated by the notice letters conveyed by the healing center, the...
Continue Reading
Banking Malware

Metamorfo Banking Malware Attacking Users In Brazil

Two new Metamorfo malspam battles have been spotted by security specialists. The battles have been pushing keeping money malware variations that are fit for taking certifications and card installment information. These battles are particularly focusing on clients of money related foundations in Brazil. As per the security specialists, who found the new assault incidents, the cybercriminals...
Continue Reading
Google Play

Malicious App Sneaking Around Google Play For A Year

A malware-bound Android application was discovered hanging around on Google Play for very nearly a year. Amid this time, the malignant application was accessible for download by all Google Play clients. The malware was covered up in an application named “Simple Call Recorder”, distributed by the FreshApps Group.   At the season of disclosure, the pernicious...
Continue Reading
Online Dating

Hackers Found Selling Online Dating Profiles for a Measly US$153

In May 2017, Moll and Tactical Tech obtained one million dating profiles from the information representative site USDate, for around $153. USDate asserts on its site that the profiles it’s offering are authentic and that the profiles were made and have a place with genuine individuals effectively dating today and searching for accomplices.   In 2012,...
Continue Reading
Malware Attack protection on The Pakistani Military

Operation Shaheen: Malware Attack on The Pakistani Military

The Pakistan Air Force is the evident focus of a complex new state-supported assault campaign. Security house Cylance said for this present week a state-supported gathering – named the White Company by scientists – has been hoping to get into the systems of the Pakistani military in a long haul focused on assault battle known as...
Continue Reading
crypto exchanges

NoKor Hacked Crypto Exchanges to Fund Regime

As per cybersecurity firm Inksit Group, state-financed programmers in North Korea have been focusing on crypto trades in South Korea to go around different authorizations forced on the routine.   The security firm affirmed the legislature of North Korea of running illegal introductory coin offering (ICO) extends and breaking into substantial crypto trades.   “We found...
Continue Reading
Vishing Scam

Swindling Thru Deception : The New Vishing Scam

Vishing, or voice phishing, is a phishing assault where fraudsters utilize the phone to distort their alliance or specialist with the expectation that unfortunate casualties will uncover qualifications or other individual data for further trade off. Regularly, vishing on-screen characters get the individual data of the person in question, including their telephone number, and start a...
Continue Reading
Website Malware protection

265 Researchers Take Down 100,000 Malware Distribution Websites

Security researchers over the globe joined in a venture committed to sharing URLs used in malicious campaigns managed to take down close to 100,000 websites actively engaged in malware distribution. The task called URLhaus was started by abuse.ch, a non-benefit cybersecurity association in Switzerland. The operations began towards the end of March 2018 and recorded a...
Continue Reading
1 7 8 9 10 11 21