Category

Cyber Security
WI-FI Security
Wireless Fidelity We are all connected with it and used it in on daily basis  using computers, smart phones, iPads, game consoles, even our home appliances and other devices to communicate over high-frequency radio signal or wireless signal, however we have less information on how it originally go about, how secure it is and who...
Continue Reading
Radio Hacking
A couple from Texas were given the shock of their life this week when they say they heard a man’s voice coming from their baby monitor and threatening to kidnap their four-month-old son.   Nathan and Ellen Rigney were sleeping just before midnight on Monday when they heard a beeping sound coming from their Nest-brand...
Continue Reading
MageCart skimmer script
Security experts discovered the Magecart skimmer scripts used to compromise a few hundred e-commerce websites worldwide hosted on GitHub.   Security firms have monitored the activities of a dozen Magecart groups at least since 2015. The gangs use to implant skimming script into compromised online stores in order to steal payment card data on, but...
Continue Reading
Ransomware
Hopkins International Airport is battling a ransomware attack that knocked out some displays and disabled email, according to multiple reports from Cleveland, Ohio. Hopkins International Airport is the largest and busiest airport in Ohio, and the 43rd busiest airport in the United States by passenger numbers, according to Wikipedia.   The City of Cleveland and...
Continue Reading
Website Vulnerability
The city of Columbia site had a security flaw in its search tool, according to independent security researchers. The flaw lets anyone view passwords for the website’s database and email protocol servers, creating a massive potential for abuse, researchers said on Thursday.   The vulnerability made it possible for someone to pull sensitive data out...
Continue Reading
Internet Got Hijacked
A measly Nigerian ISP has hijacked internet traffic meant for Google’s data centers. The incident, called a BGP hijack, occurred last November 12, between 13:12 and 14:35, Pacific Time, according to Google.   The incident was first detected and reported by an online service that monitors the routes that internet traffic takes through the smaller...
Continue Reading
Cyber Attacks
Amnesty International Hong Kong can reveal it has been the target of a sophisticated state-sponsored cyber-attack, consistent with those carried out by hostile groups linked to the Chinese government.   The cyber-attack was first detected on 15 March 2019, when state-of-the-art security monitoring tools detected suspicious activity on Amnesty International Hong Kong’s local IT systems....
Continue Reading
ShadowHammer
Latest development As we discussed previously in one of the topic dealing with the emergence of ShadowHammer, this will be the latest update although, investigation is on-going and pretty sure there are more to come in the latter progress report. As we all know by this time similar algorithm was employed for the attack particularly...
Continue Reading
DNS Hijacking Attack
What is Sea turtle attack? It’s not an attack of a vicious sea turtle to human as you are invading their territory. Sea Turtle attack is not like any other DNS hijacking or poisoning, it is labeled as another breed of campaign more refined than its predecessor. How is it different from other DNS hijacking...
Continue Reading
Malware and Spyware Protection
From the Abyss Researchers has recently unveil new form of sophisticated cyber espionage framework that has been active since at 2013,dubbed as the TajMahal named after one of its XML file used for exfiltration, and an unknown origin and crafter, Its modules and bundles functionality which have never been before seen in an advanced persistent...
Continue Reading
1 2 3 4 16