Posts

Showing posts from July, 2018

Hacker Allegedly Hijacked Phone Numbers and Stole Millions of Dollars Worth of Cryptocurrency

Back on July 12th in California, a college student was arrested for being a participant in a group of crooks Hacker Allegedly Hijacked Phone Numbers and Stole Millions of Dollars Worth of Cryptocurrency on Latest Hacking News . from Latest Hacking News https://ift.tt/2AsX0b3

Hackers create fake websites with resources for stealing money from accountants

Image
One of the global leaders in preventing and investigating cyber crimes Group-IB reported on the blocking of 5 accounting sites created specifically for stealing money through the Bank Client system. According to Group-IB, the goal of hackers is to infect visitors with viruses Buhtrap and RTM. Accountants, lawyers and other professionals working with remote banking services (RBS) have become victims of attacks. From April at least 200 thousand people have already visited three of five websites. The scheme was detected after trying to load Malware in one of the Russian Banks. During the investigation police established that Trojan was loaded from the website buh-docum[[dot]]ru containing hundreds of specialized documents for accountants. The resource was in the top place in all search engines. According to Group-IB, hackers received about 1.2 million rubles (1.3 million INR) of each successful attack per day. Experts note that owners of legitimate sites can easily detect presenc...

Does Your Antivirus Software Work? – How To Test it Securely

In a world bombarded with malware threats, you never know what’s lurking around the corner. Viruses are always looking for Does Your Antivirus Software Work? – How To Test it Securely on Latest Hacking News . from Latest Hacking News https://ift.tt/2Kciybz

Data Breach At UK Ecommerce Websites Exposed 1.4 Million Customers’ Records

Reportedly, 1.4 million customers’ records were exposed to hackers as a result of a data breach at UK ecommerce service Data Breach At UK Ecommerce Websites Exposed 1.4 Million Customers’ Records on Latest Hacking News . from Latest Hacking News https://ift.tt/2vouTnx

Vietnamese Crypto Sky Mining CEO Disappears With $35 Million

Regardless of how often those involved in the industry try to persuade us on the increasing stability of cryptocurrency, the Vietnamese Crypto Sky Mining CEO Disappears With $35 Million on Latest Hacking News . from Latest Hacking News https://ift.tt/2vn1Mky

Telstra Data Breach – A Website Error Exposed Customers’ Information Online

Telstra, an Australian telecommunication company disabled their “Your Telstra Tools” service after a customer notified a glitch. Reportedly, the unsuspecting Telstra Data Breach – A Website Error Exposed Customers’ Information Online on Latest Hacking News . from Latest Hacking News https://ift.tt/2AoechV

KICKICO Lost $7.7 Million After KickCoin Smart Contract Was Hacked

Continuing with the trail of crypto hacks, this time, an ICO suffered security breach losing crypto tokens worth millions of KICKICO Lost $7.7 Million After KickCoin Smart Contract Was Hacked on Latest Hacking News . from Latest Hacking News https://ift.tt/2vkfeWl

Latest Hacking News Podcast #88

Here we have episode 88 of our daily podcast. Todays Agenda is as follows: New Spectre Variant Allows Remote Attack Latest Hacking News Podcast #88 on Latest Hacking News . from Latest Hacking News https://ift.tt/2KdXph4

Cansina – Open Source Hidden Content Discovery Tool

Reconnaissance is one of the first steps to conduct within a pen test engagement. During this stage, information is gathered Cansina – Open Source Hidden Content Discovery Tool on Latest Hacking News . from Latest Hacking News https://ift.tt/2NSCJ0n

Recent Uprising Cyber Crimes Overview

With the rise of new technologies, there is as expected a spike in the associated security risks which come as Recent Uprising Cyber Crimes Overview on Latest Hacking News . from Latest Hacking News https://ift.tt/2v2Eh0L

AI Protects DoD Networks from Zero-Day Exploits

The Department of Defense’s network is protected from malware threats by Sharkseer, one of the top National Security Agency or AI Protects DoD Networks from Zero-Day Exploits on Latest Hacking News . from Latest Hacking News https://ift.tt/2vfB3Gx

Bengaluru Techie Blackmailed To Transfer $2,200 through Bitcoin

FELIXROOT Backdoor Has Resurfaced In Environmental Spam Campaign

After having disappeared for a few months, the FELIXROOT, a backdoor that is capable of dropping additional malware and executing FELIXROOT Backdoor Has Resurfaced In Environmental Spam Campaign on Latest Hacking News . from Latest Hacking News https://ift.tt/2AqsnD6

LifeLock Bug Leaked Customers’ Email Addresses Online

Sometimes, slight glitches can put millions of customers on the verge of hacking. This recently happened to LifeLock customers but LifeLock Bug Leaked Customers’ Email Addresses Online on Latest Hacking News . from Latest Hacking News https://ift.tt/2M1g7dm

US State Governments Receive Malware-Laden CDs From China Via Snail Mail

In more unusual news some US government agencies have reportedly been receiving ‘phishing letters’ by snail mail. The package is US State Governments Receive Malware-Laden CDs From China Via Snail Mail on Latest Hacking News . from Latest Hacking News https://ift.tt/2K7fQUK

Photon- A Web Crawler which Extracts URLs, E-mails, Files, Website Accounts and much more.

Image
Incredibly fast crawler which extracts urls, emails, files, website accounts and much more. Photon is a lightning fast web crawler which extracts URLs, files, intel & endpoints from a target. 160 requests per second while extensive data extraction is just another day for Photon! Photon has been tested on Linux (Arch, Debian, Ubnutu), Termux, Windows (7 & 10), Mac, and works as expected. Main Features Data Extraction Photon extracts the following data while crawling by default: URLs (in-scope & out-of-scope) URLs with parameters (example.com/gallery.php?id=2) Intel (emails, social media accounts, amazon buckets etc.) Files (pdf, png, xml etc.) JavaScript files & Endpoints present in them Strings based on custom regex pattern The extracted information is saved in an organized manner. Intelligent Multithreading Here's a secret, most of the tools floating on the internet aren't properly multi-threaded even if they are supposed to. The...

Latest Hacking News Podcast #87

Here we have episode 86 of our daily podcast. Todays Agenda is as follows: Black Hat USA 2018 Preview Researchers Latest Hacking News Podcast #87 on Latest Hacking News . from Latest Hacking News https://ift.tt/2Aia4Qp

Time Travel Debugging Under Testing by Mozilla For the Next Firefox Build

Mozilla is currently testing a new feature called Time Travel Debugging which is currently aimed for developer use and presently Time Travel Debugging Under Testing by Mozilla For the Next Firefox Build on Latest Hacking News . from Latest Hacking News https://ift.tt/2LAsqBi

Blue Springs Family Care Data Breach Enables Ransomware Attacks, Endangers patient records

A data breach at a healthcare provider based in Missouri has reported a ransomware attack. Recent news reports revealed that Blue Springs Family Care Data Breach Enables Ransomware Attacks, Endangers patient records on Latest Hacking News . from Latest Hacking News https://ift.tt/2LB5li8

Adobe Flash will be removed from US Government Websites

The US Government has decided to remove Adobe Flash from their websites by the end of July 2019. Senator Ron Adobe Flash will be removed from US Government Websites on Latest Hacking News . from Latest Hacking News https://ift.tt/2viGMv4

Cyberstrike at Kickico: $8 million looted

Image
Despite umpteen numbers of mechanism to firmly deal with the hacking menace, the hackers keep striking in the cyber world making money to leave millions of people poor indeed.  Yet another hacking incident rattles the cyber community where the attackers are said to have stolen a huge $8 million from a blockchain network. The sensational hacking incident took place at KICKCO blockchain network where the cybercriminals siphoned off nearly $8 million leaving even sensitive cybersecurity agencies and experts in a state of utter cluelessness this week Cybersecurity experts have called it an incident of security breach in the Initial Coin Offering (ICO) project which resulted in the theft of 70 million KickCoins this week.  The blockchain networks allow the users to conduct ICOs, cow investing and cow funding campaigns. The cybercriminals struck immediately after they had the access into the crucial key of the smart contact attached to the KickCoin that allowed them to g...

Phony Websites for Audacity, Keepass, 7Zip & Others Discovered Pushing Adware

An adware delivery ploy involving replica websites was uncovered by a French security researcher. These clone sites are essentially utilizing Phony Websites for Audacity, Keepass, 7Zip & Others Discovered Pushing Adware on Latest Hacking News . from Latest Hacking News https://ift.tt/2AmLwpq

Facebook removed hundreds of offensive posts

Image
Facebook claims that they have deleted or blocked hundreds of objectional posts over the past six months in order to follow Germany's new law banning online hate speech. In January this year, Germany has introduced a new strict law known as 'NetzDG,' which imposes heavy fines on social media companies if they don't remove offensive posts within 24 hours of receiving a complaint. The fine could reach up to  $58 million. According to a blog written by Facebook’s vice president for global policy solutions, Richard Allan, between January and June, the company has received total 1,704 complaints under the law, while they removed 262 posts.  "Worldwide, we removed approximately 2.5 million pieces of content in the first quarter of 2018 that violated our policies," wrote Allan. "We are convinced that the vast majority of content that is considered hate speech in Germany would be removed if checked for a violation of our community standards." F...

In cyber, Germany needs to counter-attack, minister says

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits:  reuters Germany is considering laws that would let it respond actively to foreign cyber-attacks, Interior Minister Horst Seehofer as he presented a domestic intelligence agency report showing Iran was the latest power to ramp up hack attacks on German systems. The agency also reported that the volume of cyber-attacks from China had seemingly dwindled as the number of acquisitions of German high-tech companies by Chinese firms had risen. The report, released on Tuesday by the domestic intelligence service (BfV), said numbers of cyber attacks with a likely origin in Iran had been rising since 2014, with a sharp increase last year. In response to the report, which highlighted cyber-attacks by Iran, Russia and China, Seehofer said the agency needed to acquire the power not just to track and clean u...

Defense bill requires cyber warfare doctrine

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits: ABC NEWS The final 2019 National Defense Authorization Act could bring the U.S. one step closer to developing a cyber warfare doctrine. The must-pass defense spending bill will establish the Cyberspace Solarium Commission , which will “develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences,” according to bill text included in the final conference report released July 23. “The Cyberspace Solarium Commission is an opportunity to set America’s cyber doctrine before it’s too late,” said Sen. Ben Sasse (R-Neb.), who championed the amendment, in a statement. “This is a major victory for those who have been sounding the alarm on cybersecurity…we don’t have a playbook and our enemies are already on offense...

COSCO Shipping Company Services Down Due to Ransomware

An infection in the COSCO’s network has crippled the network of the US’s largest shipping network COSCO (China Ocean Shipping COSCO Shipping Company Services Down Due to Ransomware on Latest Hacking News . from Latest Hacking News https://ift.tt/2vc14qd

Inmates in a Prison in Idaho Stole $225,000 in Digital Credits by Hacking JPay tablets

364 inmates in a prison located in Idaho stole around $225,000 in digital credits by hacking handheld prison tablets. The Inmates in a Prison in Idaho Stole $225,000 in Digital Credits by Hacking JPay tablets on Latest Hacking News . from Latest Hacking News https://ift.tt/2NSLCXA

Android Users: Beware of Exobot Malware Targeting Banking Apps

Attention all Android device users: another Exobot banking malware source code (version 2.5)has been leaked online. The first time it Android Users: Beware of Exobot Malware Targeting Banking Apps on Latest Hacking News . from Latest Hacking News https://ift.tt/2uVQT9K

Riverside, Ohio Police Cut Off from Database due to Multiple Ransomware Attacks

Riverside, Ohio’s police department was cut off from accessing the Ohio Law Enforcement Gateway or OHLEG back on May 14,  Riverside, Ohio Police Cut Off from Database due to Multiple Ransomware Attacks on Latest Hacking News . from Latest Hacking News https://ift.tt/2LSnyn9

Iranian Cyber Activity Rising: Leafminer, OilRig Leading the Way

Once again, cybersecurity researchers have Iran in their sights. Symantec, Palo Alto Networks, and German intelligence are all accusing Tehran Iranian Cyber Activity Rising: Leafminer, OilRig Leading the Way on Latest Hacking News . from Latest Hacking News https://ift.tt/2NTDW7N

Mixed-up Biometric affects 2 crore Aadhaar holders

Image
A contract laborer from Raichur had to spend Rs 30,000 and wait for over seven years to receive his correct Aadhaar number. His biometric analysis of his fingerprint was mixed up with his son's, reported New Indian Express. According to a senior UIDAI official, this is not the only case of mixed-up biometric, around 1.3 to 1.9 crore people have suffered from "'mixed biometrics.' As per an internal communication of UIDAI recently, in over seven years there is about 1-1.5 percent of all enrolments have had incorrectly biometric data, which make them unable to claim basic services or benefits that the government has tied directly to the program. An anonymous official of UDAI said: "There are also several cases of biometric data not being captured properly. UIDAI is identifying such cases and addressing their grievances." Now a team of UIDAI is trying to identify the mix-up cases, has informed the ones with the wrong biometrics, and are now organizin...

Virginia Bank Loses $2.4 Million In A Digital Heist

Latest Hacking News Podcast #86

Here we have episode 86 of our daily podcast. Todays Agenda is as follows: Microsoft Discovers Supply Chain Attack to Latest Hacking News Podcast #86 on Latest Hacking News . from Latest Hacking News https://ift.tt/2OlsWAN

Physical USB security keys in Google

Image
A physical USB security key has been a crucial mechanism for Google to help thousands of its employees get rid of the hackers who keep looking for formulas to infect the devices these days. But the hackers have not been able to take on none of the employees working with the global search engine. The reason for this safety is none but the USB security key. The physical security keys is said to have replaced the one time code of the around 85,000 employees working with the global platform. Security keys, precisely, comprises Keys two- authentications (2FA). If the users log log into a website with a password before entering an extra one time code meant for smart devices then it is 2FA. Google keeps sending the one time password to its employees with the help of an app which indeed is the in house mechanism. According to an expert associated with the search engine, Google keeps using the physical security keys for all works-related account access for the last one and a half years. Googl...

New wave of ransomware attacks in India

Image
Ransomware worm WannaCry made headlines last year after it created panic in various countries across the globe. India was no exception from the attack. A year later when most of the infrastructure associated with the ransomware has been taken down, new reports have emerged stating that WannaCry still exists in dormant form. For the people who don’t know what a Ransomware attack is, it is when a cybercriminal infects a computer system with a malicious piece of software and encrypts the data of the user on that system. The criminal then locks the system down asking for money or other aid of financial aid in a particular period of time while threatening that the victim will lose their data if they fail to comply. This is observed by telemetry servers of the internet security provider eScan. In a statement, the company stated that eScan's telemetry servers have been picking up reminiscent artefacts of WannaCry ransomware on regular basis. According to the report, Maharashtra re...

Hackers threaten to disrupt Moscow Domodedovo Airport navigation system unless they Bitcoin Ransom

Image
Unknown Hackers demand several hundred of Bitcoins from the administration of the Airport "Domodedovo" (Moscow International airport), otherwise they will intervene in the navigation systems of the Airport. According to the Airport staff, the attackers sent threatening e-mail to the Domodedovo Contact Center.  They said they will interrupt the function of the Airport's navigation equipment this weekend on July 28-29. The hackers have claimed that they have the technical capabilities to do it. Should people be worried about this? Vladimir Ulyanov, Head of the Analytical Center "Zecurion", believes that if cyber criminals have an accomplice inside the Airport "Domodedovo", then there are reasons to be concerned. But a person who is sitting in another country or inside the country can't simply hack into these system via Internet, says Ulyanov.  "In this case, threats were sent to some common box. If we are talking about serious attac...

Mobile Gadgets and SmartTVs Susceptible to Mirai Botnet Variant

Trend Micro researchers uncovered a new exploit that essentially takes advantage of the continuous open-port issue plaguing lots of IoT Mobile Gadgets and SmartTVs Susceptible to Mirai Botnet Variant on Latest Hacking News . from Latest Hacking News https://ift.tt/2NMTJ8a

Malware Sneaking Onto Your Android Device Via Google Play Store

Image
Is your Android device working very slowly or prompts up annoying pop-ups, if yes, then your device has contracted malware through the Google Play Store. A security research firm BleepingComputer reported a spreading number of mobile malware has started using a tool known as a "dropper," which hides code inside an app. "In the Android malware ecosystem, it is quite common for threat actors to buy so-called 'loader' (dropper) services from other actors," security researcher Gaetan van Diemen told BleepingComputer.  The droppers are very cordial and contained within an app, making it difficult for Google  Play Store to detect it using its standard security tests. "It is quite difficult to detect dropper apps," van Diemen says. "As you can imagine, threat actors will put a lot of energy in keeping those apps undetected." The droppers generally use dual or multiple-stage infection technique, the first stage of this process is to...

Osiris Malware: Has Kronos Been Reborn?

Security researchers have uncovered a new version of Kronos, a banking Trojan, that utilizes the TOR network. First uncovered back Osiris Malware: Has Kronos Been Reborn? on Latest Hacking News . from Latest Hacking News https://ift.tt/2uMrMX5

Why Parents Need to Use iPhone Spy App

For parents whose kids use mobiles, the amount of time they spend on their gadget is the biggest concern. As Why Parents Need to Use iPhone Spy App on Latest Hacking News . from Latest Hacking News https://ift.tt/2LFL4qO

300 malicious websites were blocked in Kazakhstan

On 24th July, the Ministry of Defense and Aerospace Industry of the Republic of Kazakhstan reported about the detection of malicious websites. Phishing pages, virus programs and other malicious software were detected at about 300 websites in Kazakhstan. According to the Ministry, it threatens the security of Internet users. The Computer Incident Response Service (KZ-CERT) in the form of an order forced companies KazNic and Hoster.kz to block 288 websites in one evening. The site owners are puzzled about why the company KazNic blocked websites without a reason, without any notice or warning. Hoster.kz and KazNic answered:"We got an order to disable — we disabled". It turned out that on 14th March Mr Daulet Yergozhinhe, Deputy Chairman of the Committee on National Security of Kazakhstan said that the Committee can block IP addresses in exceptional cases, for example, in the case of cyber attacks on information resources of the executive bodies or important infrastructur...

Apache Tomcat Releases Patch For Important Security Vulnerabilities

Security updates have been released by the Apache Software Foundation or ASF. These updates address numerous vulnerabilities within the software’s Apache Tomcat Releases Patch For Important Security Vulnerabilities on Latest Hacking News . from Latest Hacking News https://ift.tt/2mIRsPR

Etherscan.io Hack Can Manipulate Cryptocurrency Markets

Online panic occurred earlier this week when the users of a popular Ethereum blockchain explorer site has been opening up displaying Etherscan.io Hack Can Manipulate Cryptocurrency Markets on Latest Hacking News . from Latest Hacking News https://ift.tt/2LQnLHx

Latest Hacking News Podcast #85

Here we have episode 85 of our daily podcast. For daily updates you can subscribe: via iTunes here  Alternatively, if Latest Hacking News Podcast #85 on Latest Hacking News . from Latest Hacking News https://ift.tt/2JSf2Tv

Poor router security makes Indians vulnerable to cyber attacks

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits: NewToday Indian consumers who practice poor router security are at high risk from cyberattacks designed to take over their connected devices, steal passwords and gather other sensitive personal information, a study has revealed. New research from digital security provider Avast carried out July, polling over 1,044 consumers in the country states that 32 per cent of Indians have never logged into the web administration interface to change the factory login credentials. Another finding is that nearly one fourth (23 per cent) of Indians have logged into their router’s web administration interface, but continue to use the default login credentials their router came with, the study said. According to the research, only 44 per cent of Indians have changed the login credentials of their router’s web adminis...

Chennai sees alarming rise in cyber crime

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits: News Today “At the beginning of this decade, the number of cases related to social media used to be in single digit. But, today, we register around 10 to 15 cases per day,” a senior police officer revealed to  News Today , highlighting the alarming rise in cyber crime incidents connected to social media. Recent statistics show that India has the highest number of Facebook users with 270 million people using the social media, which is well ahead of second-ranked United States with 240 million FB users. However, this development might not bring cheer to the cyber wing attached to the Central Crime Branch here, as, according to reports, over 60 per cent of the cases that the wing handles comprise social media complaints. The officer said, “This is a double-edged sword. It means the number of cases,...

Reddit Making Changes to Users’ Privacy Settings

Facebook’s Cambridge Analytica Scandal has shocked many companies and has been on everyone’s minds, however we must also consider that Reddit Making Changes to Users’ Privacy Settings on Latest Hacking News . from Latest Hacking News https://ift.tt/2A9y3RH

Israel looking to work with India on cyber security

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits: dnaindia As dozens of official websites, including those of defence and home ministries, were hit by cyber hacking two months ago, Israel has sought to support and collaborate with Indian agencies to prevent such attacks in the future. Israel, which has some 400 cyber companies and accounts for eight per cent of global cyber exports, is planning to collaborate with the Indian government and agencies, given the kind of threat in the virtual world. Indian agencies are also trying their best to protect state secrets from anti-national elements across the world. An Israeli expert on homeland and cyber security and who has recently retired from the Israeli Security Agency (ISA), Zori Kor, said, “Today, physical and virtual world is on the same platform. So, as life is shifting from the physical world ...

Cyber deal with US signals more assertive counter-hacking operations

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits: ABC News Australia will work more closely with the United States on offensive cyber capabilities in a deal that presages a more aggressive approach by the nation’s electronic spooks in carrying out operations abroad. Defence Minister Marise Payne has confirmed an arrangement she has struck with American counterpart James Mattis will include jointly developing capabilities to attack adversaries overseas as well as defending computer systems in Australia. She has told Fairfax Media the memorandum of understanding signed as part of the Australia-United States Ministerial talks in San Francisco this week means greater “research, development, testing and evaluation of cyber capabilities” with the US Cyber Command, which has itself flagged taking a more assertive posture in recent months. “The MOU will ena...

Dark web cyber crime markets thriving

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits: computerweekly The analysis, by researchers at Positive Technologies, included 25 sites on the dark web in Russian and English, with a total registered user base of about three million people. The researchers examined whether the advertised tools and services would be enough for a real attack and how much technical knowledge was required by prospective clients. They found that cyber criminals no longer require deep technical knowledge and that any type of attack is now feasible given sufficient funding. The researchers also examined the costs of cyber crime services across the dark web and found that compromising a site and obtaining full control over a web application costs as little as $150, for example. However, a targeted attack on an organisation, depending on difficulty, can cost more tha...

Google Play Store Apps Could be Sneaking Malware onto Your Android Device

If you’ve noticed your Android phone or tablet running slower of late, or perhaps the device is producing a number of Google Play Store Apps Could be Sneaking Malware onto Your Android Device on Latest Hacking News . from Latest Hacking News https://ift.tt/2LOJrnB

Apple T2 Chips Offer Encrypted Storage In The New MacBook Pros

The new MacBook Pros bring with them some incredible features, however there are a few things weren’t announced on-stage. One Apple T2 Chips Offer Encrypted Storage In The New MacBook Pros on Latest Hacking News . from Latest Hacking News https://ift.tt/2mJ111j

The jQuery Mega Cheat Sheet by Make a Websitehub

Image
Feel free to share this graphic with work colleagues and anyone you think may find this cheat sheet useful. Download a printable PDF of this graphic here SOURCE:  makeawebsitehub.com   The post The jQuery Mega Cheat Sheet by Make a Websitehub appeared first on Hakin9 - IT Security Magazine . from Hakin9 – IT Security Magazine https://ift.tt/2OfjGOP

Security Warnings On Daily Mail And Other Sites If Using Updated Chrome Browser

A security warning will pop up for many sites if users have upgraded to the latest version of the Chrome Security Warnings On Daily Mail And Other Sites If Using Updated Chrome Browser on Latest Hacking News . from Latest Hacking News https://ift.tt/2uNuyvh

D-Link, Dasan routers under attack

Image
D-Link and Dasan routers with GPON (Gigabit Passive Optical Network) firmware running on them have been targeted by hackers to essentially build a botnet army, according to research published Friday by eSentire Threat Intelligence. According to the report, hackers are targeting unpatched versions of these router vulnerabilities and there was a huge increase in exploitation attempts from more than 3,000 separate source IPs targeting D-Link 2750B and certain Dasan GPON small and home office routers on July 19. The operation may have been an attempt to compromise routers so they could be leveraged to launch distributed denial of service attacks, distribute malicious content or spy on browsing activity, suggests the eSentire Threat Intelligence team, which authored a corresponding blog post and threat advisory after it observed the incident while monitoring its customers. “A successful recruitment campaign has the potential to arm the associated threat actor(s) with DDoS artillery ...

Spectre Rises Yet Again With a Vulnerability In Tow

Oracle WebLogic Servers Attacked Following Publication Of PoC Code

Hackers have attacked the Oracle WebLogic servers and attempted to take control of those vulnerable who have not received the Oracle WebLogic Servers Attacked Following Publication Of PoC Code on Latest Hacking News . from Latest Hacking News https://ift.tt/2mK9IrX

Нackers deprive Ukrainians of apartments on the Internet

Hackers started changing data more often in Ukrainian government databases than before. It is almost very hard to cancel such actions. If a person is cross off the apartment owners list in the registry, it will be very difficult to get the property back. The Ministry of Justice introduced mandatory use for notaries of hardware key. But it took only two months for attackers to find a way to bypass the registry security system. Previously hackers broke the register, and it could be proved. Now hackers break the computer of notaries sending to them fake e-mails from the Justice Ministry. Hackers attach spyware to the letters that infect the computer and tell hackers of all actions of the notary. The fact of hacking is almost impossible to prove and to cancel it according to the laws. Sergei Prokopenko, Director of the Computer Forensics Laboratory "СyberLab", said that hacking the computer of a notary in the new scheme makes any citizen defenseless. Even the leadership of ...

Google Employees Successfully Using Security Keys To Protect Against Phishing

Ensuring adequate protection against phishing attacks is a pain in the neck even for the smartest security systems. However, Google Google Employees Successfully Using Security Keys To Protect Against Phishing on Latest Hacking News . from Latest Hacking News https://ift.tt/2uZDbC9

Latest Hacking News Podcast #84

Here we have episode 84 of our daily podcast. For daily updates you can subscribe: via iTunes here  Alternatively, if Latest Hacking News Podcast #84 on Latest Hacking News . from Latest Hacking News https://ift.tt/2LOlNaO

Evilginx – The Free Advanced Phishing Attack Framework

Evilginx is framework that is able to steal user credentials through a man in the middle attack. Evilginx uses the Evilginx – The Free Advanced Phishing Attack Framework on Latest Hacking News . from Latest Hacking News https://ift.tt/2JQDYe6

Crypto bug in bluetooth ans OS drivers

Image
A newly identified vulnerability starts hovering over the cyberworld posing no less threat to umpteen numbers of Bluetooth and OS drivers. Popularly known as cryptographic bug, the vulnerability allows a hacker to get crucial data exchanged between two smart devices with the help of Bluetooth connection . The experts who claimed to have discovered the bug in question said it affects the Bluetooth operation system of many hardware vendors. But basically it targets Intel, Apple, Broadcom and Qualcomm. A cryptographc bug affects the pairing devices since there is hardly any encryption mechanism in the Bluetooth connections. Named as CVE-2018-5383, the bug was spotted by a small group of experts who are attached to the Israel Institute of Technology and Lior Neumann. A stunnedCERT/CC has already released a slew of security advisories narrating the vulnerability. According to these researchers, Bluetooth keeps running a mechanism of elliptic-curve Diffie-Hellman (ECDH) and it allows an e...

US electric utilities controlled by Russian hackers

Image
Russian hackers were able to gain access into the control rooms of U.S. electric utilities last year, which could have possibly caused blackouts, The Wall Street Journal reported on Monday. The hack was carried out by a shadowy Russian state-sponsored group previously known as Dragonfly or Energetic Bear. They broke into the networks by penetrating into the networks that belonged to a third party vendor who had very cordial relationships with the power companies, Department of Homeland Security official in a press briefing. "They got to the point where they could have thrown switches" to disrupt the flow power, Jonathan Homer, chief of industrial-control-system analysis for DHS, told the Journal. The disruption in power flow was first detected in 2016 and continued throughout 2017, the Journal reported. Since 2014, DHS has been giving alert to various utility executives about the Russian group’s threat to critical infrastructure. However, many companies are still...

$14 Million Stolen by Hackers from UK Law Firms

The National Cyber Security Centre or NCSC of the UK found that cybercriminals stole a total of over $14 million $14 Million Stolen by Hackers from UK Law Firms on Latest Hacking News . from Latest Hacking News https://ift.tt/2mI08Wx