Category

Cyber Security
Cyber Security
An advanced persistent threat group linked to the Chinese government accused of conducting a widespread cyber espionage campaign against IT service providers has gone quiet since two of its members were indicted by the Department of Justice last year, according to a Department of Homeland Security official, but it remains an active threat to American...
Continue Reading
A malicious mobile app impersonating a call recording functionality in the Google Play Store managed to take away thousands of euros from a couple of bank customers in Europe. The malicious malware-laced app was planted in a QRecorder app, being advertised as an automatic call and voice recording tool.   At the time of the...
Continue Reading
identity-theft prevention
Tech Companies have ardently denied Bloomberg’s declaration that China’s Super Micro gave them hardware loaded with spy chips, but that isn’t stopping all sorts of accusations from pouring in.   Bloomberg claims has obtained documents from security researcher Yossi Appleboum that reportedly show evidence of an unnamed major US telecom finding “modified hardware” from Super...
Continue Reading
Domain Factory hacker
One of the largest hosting companies in Germany, DomainFactory, has been penetrated by hackers. The hosting company, which is owned by GoDaddy since 2016, reported that the data breach happened around late April 2019, but the company found out about the incident just last week, May 23rd, after the alleged Hacker began sharing bits of...
Continue Reading
UC Browser Apps
Threat summary This affect latest UC Browser version 12.11.2.1184 and UC Browser Mini version 12.10.1.1192. The vulnerability resides in the way User Interface on both browsers handles a special built-in feature that was otherwise designed to improve users Google search experience.The vulnerability, which has no CVE identifier as its discovered so recently, Browser could allow...
Continue Reading
Cipher Stunting
Threat Summary There has never come a time when TLS signature become focal point of target by malicous actors. Since cipher stunting is fairly new in the threat landscape, and now prevailing as a new vector to be exploited. This approach is found to be the latest evasive technique and more predominately used that reached...
Continue Reading
WI-FI Security
Wireless Fidelity We are all connected with it and used it in on daily basis  using computers, smart phones, iPads, game consoles, even our home appliances and other devices to communicate over high-frequency radio signal or wireless signal, however we have less information on how it originally go about, how secure it is and who...
Continue Reading
Radio Hacking
A couple from Texas were given the shock of their life this week when they say they heard a man’s voice coming from their baby monitor and threatening to kidnap their four-month-old son.   Nathan and Ellen Rigney were sleeping just before midnight on Monday when they heard a beeping sound coming from their Nest-brand...
Continue Reading
MageCart skimmer script
Security experts discovered the Magecart skimmer scripts used to compromise a few hundred e-commerce websites worldwide hosted on GitHub.   Security firms have monitored the activities of a dozen Magecart groups at least since 2015. The gangs use to implant skimming script into compromised online stores in order to steal payment card data on, but...
Continue Reading
Ransomware
Hopkins International Airport is battling a ransomware attack that knocked out some displays and disabled email, according to multiple reports from Cleveland, Ohio. Hopkins International Airport is the largest and busiest airport in Ohio, and the 43rd busiest airport in the United States by passenger numbers, according to Wikipedia.   The City of Cleveland and...
Continue Reading
1 2 3 16