Posts

Showing posts from October, 2019

NordVPN Launches Bug Bounty Program Along With Other Security Upgrades

NordVPN has recently announced major security upgrades. The changes came following a security breach that hit the firm in the NordVPN Launches Bug Bounty Program Along With Other Security Upgrades on Latest Hacking News . from Latest Hacking News https://ift.tt/2WwpQ1F

iPhone 5 users may lose access to internet services

Image
Users who are still using iPhone 5 are advised to update their device software by the end of this weekend. If not, users can lose their internet access. The users are being pushed to update their former iOS gadgets. Many of them have got the popups on iPhone 5. However, software update notifications on iPad 4 have not appeared yet. The issue with this is that those devices are jailbroken. The main problem is that these devices are now outdated. "People who are unable to install iOS 10.3.4 updates by 3 November can be deprived of features that depend on the right time and date," says Apple. This covers Apple's iStore, email, online surfing, and iCloud. While iOS 10.3.4 may not be the newest variant of the iOS system, it is the most up-to-date available for the model. Users of former iPhones are also notified to revive their system software if they want to have precise GPS tracking services. How can iPhone 5 users update their devices? The users have been getting p...

Thousands Of Android Users Fall Prey To xHelper Malware Menace

A new Android malware has made it to the news as it has taken thousands of devices by storm. According Thousands Of Android Users Fall Prey To xHelper Malware Menace on Latest Hacking News . from Latest Hacking News https://ift.tt/2PAn3TG

US Fast Food Restaurant Krystal Warns Users Of A Security Breach

US-based chain of restaurants Krystal has recently alerted customers about a security breach. As revealed, the security incident affected a US Fast Food Restaurant Krystal Warns Users Of A Security Breach on Latest Hacking News . from Latest Hacking News https://ift.tt/2pk354T

Not All Hackers are Larcenists

When you hear the word hacker, what is the first thought that pops into your mind? Does it have negative Not All Hackers are Larcenists on Latest Hacking News . from Latest Hacking News https://ift.tt/2JCQ5hA

Security Vulnerability Discovered in Xiaomi Pet Feeders

While each passing day makes the internet-of-things more popular, it also makes it more likely to exhibit security bugs. Earlier Security Vulnerability Discovered in Xiaomi Pet Feeders on Latest Hacking News . from Latest Hacking News https://ift.tt/2Nt4huI

Vulnerability has been found in the Xiaomi Feeder through which thousands of cats and dogs around the world can be left without food

Image
Russian IT specialist Anna Prosvetova discovered a vulnerability in Xiaomi Furrytail Pet Smart Feeder. Since feeders are used when the owners leave the house for a long time, pets may starve to death. The vulnerability was discovered in the application API through which feeders are controlled. The researcher believes that she has access to all such feeders, which are now active in the world. Smart feeders work on the principle of a dispenser that gives a cat or dog a certain amount of dry food at a time. The owner of the animal can set the schedule of meals and the amount of portions in the mobile application. Thanks to this device, the animal can be left for a long time in an empty apartment, without worrying that it will die of hunger. “I have logs running on the screen from all existing feeders, I see data on the Wi-Fi networks of poor Chinese who bought these devices. I can suddenly feed all the cats and dogs with a couple of clicks, but I can delete the schedules from the d...

Microsoft has launched a new service, providing customers a direct line to the top security experts from the company when the threat is bad enough that it can't be dealt by the customer alone. Threat hunting service, Threat Experts on Demand is now a part of Microsoft Defender Advanced Threat Protection (ATP), and will be available to the customers with Windows 10 Enterprise E5 and the Microsoft 365 bundle subscription. The venture is basically for large organisations that although have good and strong security but may encounter a sticky problem such as NotPetya outbreak, insider threats and cyber-espionage threats. This is a development and add on to Microsoft security services for customers, complimenting targeted attack notifications and Azure Sentinel cloud-SIEM service, which became available in September. Microsoft says, that once clicking the button, the security team will send the problem to Microsoft's incident response services and it also promises technical consultation to customers on adversaries and relevant issues by their threat experts. "Customers do what they can to deal with these threats but sometimes they need additional help," said Brian Hooper, senior research lead at the Microsoft Defender research group. "Sometimes they just want a trusted partner. Microsoft has visibility of over a billion machines worldwide and we're able to use that to bring out and deeply understand the threats that enterprises face. We help them become aware of those threats in their environment, reduce dwell time, and give them visibility into those critical threats so they can prioritize and respond with confidence." He also said, Threat Experts on Demand does allow enterprise customers to "tap into the 3,500-plus security professionals Microsoft has globally". After receiving a threat, which the customer can't deal, he/she can contact Threat Experts with a click of a button and there will be a full time Microsoft employee to handle each and every request for help. "This is our managed threat hunting capability. It combines expert human hunters with our own artificial intelligence and automation to help our enterprise customers deal with those critical threats", said Hooper. ZDNet explains that the Experts on Demand human element includes: 1.Additional clarification on alerts, including root cause or scope of the incident. 2.Clarity into suspicious machine behavior and recommended next steps if faced with an advanced attacker. 3.Determines risk and protection regarding threat actors, campaigns, or emerging attacker techniques. 4.Seamlessly transitions to Microsoft Incident Response (IR) services when necessary.

Image
Microsoft has launched a new service, providing customers a direct line to the top security experts from the company when the threat is bad enough that it can't be dealt with by the customer alone. Threat hunting service, Threat Experts on Demand is now a part of Microsoft Defender Advanced Threat Protection (ATP) and will be available to the customers with Windows 10 Enterprise E5 and the Microsoft 365 bundle subscription. The venture is basically for large organizations that although have good and strong security but may encounter a sticky problem such as NotPetya outbreak, insider threats, and cyber-espionage threats. This is a development and adds on to Microsoft security services for customers, complimenting targeted attack notifications and Azure Sentinel cloud-SIEM service, which became available in September. Microsoft says, that once clicking the button, the security team will send the problem to Microsoft's incident response services and it also promises tech...

Bitcoin and the Cryptocurrency Market Surged At Large

Image
The bitcoin and the cryptocurrency market yet again become the center of attention as they experience a colossal upsurge at large. While this surge is by all accounts partially predicated by many economists, investors as well as commentators on equities and other hazard or risk assets arriving at new highs or flooding to the upside, they likewise bring into center a couple of other factors at play as well that may further explain the cryptocurrency market's outstanding performance on the 25th and the 26th of October. BitcoinEconomics, a Twitter account investigating this space, noticed that they accept that this 42% move (42% at the pinnacle of $10,600) was something driven by the news that Chinese President Xi Jinping had embraced blockchain innovations, as on the 25th the 'world leader 'openly support blockchain advancement and appropriation to improve quite a few numbers of industries. The previously mentioned analyst even claims that this announcement from Xi l...

Italian Financial Service UniCredit Discloses Data Breach Affecting 3 Million Customers

This time, the victim is an Italian financial service that confessed to the security incident. Specifically, the firm UniCredit has Italian Financial Service UniCredit Discloses Data Breach Affecting 3 Million Customers on Latest Hacking News . from Latest Hacking News https://ift.tt/2MVlQUX

MageCart Gang Recently Targeted P&G E-Store

The notorious MageCart Gang once again made it to the news since attacking another e-commerce store. This time, it is MageCart Gang Recently Targeted P&G E-Store on Latest Hacking News . from Latest Hacking News https://ift.tt/34a4c5O

Adobe Leaked 7.5 Million Records Of Creative Cloud Users’ Data

Once again, a prominent technology firm has made a blunder with regard to users’ privacy. This time, Adobe inadvertently exposed Adobe Leaked 7.5 Million Records Of Creative Cloud Users’ Data on Latest Hacking News . from Latest Hacking News https://ift.tt/36dbzv5

Attackers Exploiting Bugs in PHP7 to Hijack Web Servers

Image
Last week, Russia-based security researcher Emil 'Neex Lerner has discovered a remote code execution vulnerability in the PHP bug tracker - classified as the CVE-2019-11043. The vulnerability allows the attackers to gain control of servers running PHP7 with NGINX and the PHP-FPM extension, simply by adding "?a=" to the URL of the website. Evidence shows that this critical PHP issue is being actively exploited by the threat actors. Reportedly, the vulnerability did not affect all the PHP-capable servers, only NGINX servers with PHP-FPM enabled are exposed to the risk. The FPM is the PHP-FPM module which is employed for the purpose of performance enhancement and the vulnerability which lets a remote net server to execute its own arbitrary code simply by accessing a specially designed URL, resides in env_path_info in the file fpm_main.c of the FPM component. PHP (Hypertext pre-processor) is a wide-open source general-purpose scripting language that is used in the deve...

Russian school hackers hacked the NATO website

Image
Russian hackers who are members of the well-known on the Internet 2ch imageboard hacked the website of NATO Rapid Deployable Corps Italy. This is one of NATO’s most combat-ready formations on the European continent. Unlike Russian military units and formations, NATO formations have direct access to the Internet and even their own websites linked to each other via the Internet. Russian school hackers from the 2ch portal took advantage of this loophole to guide the Italian Corps website. Hackers renamed the name of the corps, it began to be named NATO Rapid Deployable Corps 2ch. Then they added the name of their organization 2ch to the number of special forces that are part of the corps. And finally, the name and biography of the corps commander, Lieutenant General Roberto Perretti, were replaced with the data of the administrator of 2ch portal Nariman Namazov, better known under the nickname Abu. Thus, the Russian hacker commanded the Italian NATO corps for some time. In addit...

Two New MageCart Attack Victims: Sixth June, American Cancer Society

Today we report about further prey of the notorious MageCart attack. This time the victims turn out to be the Two New MageCart Attack Victims: Sixth June, American Cancer Society on Latest Hacking News . from Latest Hacking News https://ift.tt/2WmGErJ

Researcher Finds Vulnerability in Japanese Hotels Tapia Robots

Internet-of things is seemly always vulnerable to security flaws. From individual users to the corporate sector, these IoT flaws have Researcher Finds Vulnerability in Japanese Hotels Tapia Robots on Latest Hacking News . from Latest Hacking News https://ift.tt/2PlOkci

Libreoffice Users Receiving Security Warnings While Installing Macos 10.15 Catalina

Image
Users of the open-source office productivity software LibreOffice have reported keeping running into numerous security warnings when installing the app on the newly released macOS 10.15 Catalina. It was during the public beta for macOS Catalina that some LibreOffice users observed that Apple's GateKeeper warnings were competent enough to scare off many users. Despite the fact that Apple had cautioned macOS designers in June that all Mac applications that are marked with a Developer ID would likewise be 'notarized' by Apple and furthermore guaranteed this would empower a "more streamlined Gatekeeper interface" when users download macOS applications from the web. While LibreOffice version 6.2 was not authorized, the most recent 6.3 version evidently has been. Be that as it may, as per LibreOffice, users are as yet getting the GateKeeper alert with the extra notice that "macOS cannot verify that is app is free from malware”. "Although we have dul...

17 Malicious iPhone Apps On App Store Found Targeting Users With Adware

Scammers and criminal hackers always seem to find a way to ditch various security checks implemented by the tech giants. 17 Malicious iPhone Apps On App Store Found Targeting Users With Adware on Latest Hacking News . from Latest Hacking News https://ift.tt/2piw7BC

Samsung Patched The Galaxy S10 Fingerprint Reader Flaw

A few days earlier, Samsung’s flagship phone came into limelight owing to a glitch. The fingerprint reader of Galaxy S10 Samsung Patched The Galaxy S10 Fingerprint Reader Flaw on Latest Hacking News . from Latest Hacking News https://ift.tt/2Wk8WD0

FTC Banned Retina-X Spying Apps Until Proven For Legitimate Use

The Federal Trade Commission has taken some robust steps towards ensuring user privacy. Reportedly, the FTC has banned Retina-X Studios FTC Banned Retina-X Spying Apps Until Proven For Legitimate Use on Latest Hacking News . from Latest Hacking News https://ift.tt/31TskYW

IoT Devices Fall Prey to Attacks up to 10 Crore by Hackers

Image
With more than 40 lakh attacks on IoT (Internet of Things) devices, India is among one of the Top 10 Victims Countries lists in the world. This can be a disappointment for Tech Freaks and companies that have just begun using IoT devices but don't consider protecting their IoT devices such as smart cameras. Hackers didn't even flinch while penetrating the systems. That's how simple the breakthrough was. Simple methods like password guessing are used for getting the entry in IoT devices. Some sufferers of these attacks set passwords as naive as 'Admin.' And now, India has made it to the index of the top 10 countries that fell prey to IoT attacks in 2019. As shocking as the disturbance was, all of these hacks have happened in just the first half of the year. Nevertheless, it's ironical that India wasn't on this list at the same time last year. That is how distressing the circumstance has become. In a study titled, 'IoT: A Malware Story,' Kaspersk...

A New Malware that steals Personal Information via Discord App

Image
Hey there, all the gamers and tech freaks. Beware! A new malware is coming right at you. Also known as 'Spidey Bot' by its researchers, this malware is quite dangerous as it can take all your personal information such as passwords, IP addresses, emails, contacts, and Discord usernames. The Windows Malware does this by inserting itself into the Discord app's cipher. As if this wasn't enough, the malware can also get a backdoor entrance into your device by copying the first 50 letters typed in your keyboard which may contain critical information such as recently used passwords. This is done in order to get more malware fixed in your device. Discord is an application that is specifically designed for the video gaming community. It is also a digital platform where various PC gamers from across the world can connect and form a community of their own. Lately, Discord has also become an ideal platform for users who have been thrown out from Twitter and Reddit for their ...

17 Trojan infested apps you need to delete from your iPhone right now!

Image
Just like the ancient Greek story, where soldiers sneak into the gates of troy by hiding inside a wooden horse similarly Trojans sneak in your phone in the face of harmless apps that you voluntarily install. Apple users are being warned about such apps, to check their devices against a list of malware apps and delete them according to a report by Wandera. Research team at Wandera, a software-as-a-service firm, has identified 17 apps that install malicious Trojan module on iOS devices. Apple says that the infected apps have been removed from the app store but after examination they found that the apps did not contain the claimed Trojan malware. Instead, the apps were removed because of being adware specifically called the "clicker Trojan malware" and included code that enabled artificial click-through of add and made it seem like you viewed an advertisement which is against App Store's guidelines. Apple further said that the protective tools of App Store have been upd...

Russian Companies infected by a virus masquerading as accounting documents

Image
In September, Russian companies faced the problem of malicious software disguised as accounting documents. The launch of the virus led to leaks of personal data of users and the connection their computers to the botnet. Check Point company claims that 15.3% of Russian Internet users received such letters only in a month. According to Check Point, the Pony malware has been activated since the beginning of the business season, in September, and was in second place on the list of the most active malware by the end of the month. The company said that Pony was distributed via email through malicious EXE files simulating accounting requests. Topics and titles of such letters were called something like this: "Closing documents Tuesday" and "Documents September". Pony is able to steal user credentials, monitor system and network operations, install additional malware and turn devices into a botnet. Specialists of Rostelecom-Solar recorded in September phishing emai...

Mobile Malware: The next biggest security threat around the world

Image
BlackBerry reveals Advance Persistence Threats and players targeting several enterprises. This entire time, the world had no clue about how widespread and common mobile malware is, and how it is being used for constant monitoring and reconnaissance. In truth, there are several hot actors and high-level safety threat that we didn't know until now. An advanced persistent threat (APT) is a long-time and pointed cyber invasion in which an invader gets entrance to a system and stays anonymous for a while. The purpose of an APT intervention is usually to spy mobile actions and unlawfully take data instead of causing any harm to the company or the network. "It is Fertile, Prevalent and Multi-Platform," concludes Blackberry in a report titled 'Mobile Malware and APT Espionage.' The analysts recognized three superior harmful attacks, dawning essentially in countries like China, North Korea, Vietnam, and Iran, which further strengthens mobile malware, along with comput...

Pos Malaysia: Malware Attack Disrupts Internal Systems and Online Services

Image
IT infrastructure of Pos Malaysia, postal delivery service in Malaysia, took a major hit from ransomware which rendered some of its online services inaccessible. After detecting the attack on Sunday, the company took immediate measures to shut down internal systems and parts of its online systems; they also lodged a police report with Royal Malaysia Police for attempted malware attack and reached out to concerned authorities to ensure the safety of their systems and database. The website of the company was displaying an error message during the downtime, which said, “Sorry, we are under maintenance.” It was discovered during a system update on October 20 and since then, the company released three statements insisting on the safety of customers’ personal data and sensitive information. It assured that no user data was compromised and the issues are being rectified. Gradually, several of Pos Malaysia’s online services have been made accessible while over the counter services rema...

Companies Unintentionally Exposing Data by Misusing a Virus Scanner

Image
Security analysts from OTORIO have as of late discovered that a huge number of unprotected files from companies over the pharmaceutical, industrial, automotive and food sectors have been unintentionally exposing data including blueprints and intellectual property by misusing Alphabet's virus scanner. Daniel Bren, CEO at Otorio said that, “From what we found, we could design a very constructive hack. We found files that gave us a blueprint of how to infiltrate the production floor. The companies’ trademarked secrets are on those blueprints,” All this was however possible on account of VirusTotal, a virus scanner, owned by Alphabet’s cybersecurity subsidiary Chronicle. This virus scanner makes 'scanned documents' accessible to organizations for the identification of malware; be that as it may, a few companies are abusing the virus scanner and are uncovering sensitive documents. Bren noticed that researchers can gain admittance to the uploaded files with a deal to a...

NordVPN agrees to 'private' server infringement

Image
NordVPN, a VPN provider has affirmed an intrusion on one of its servers in Finland, although the damage done was nothing serious. There were no dubious records on the server. “We don't trace, retrieve or distribute users' data. It is almost impossible for the attacker to obtain usernames and identifications and also, the hacker couldn't decipher the VPN traffic to different servers,” says the company. "The only probable way to exploit website traffic was by doing an individual and complex MiTM breach to prevent a private connection that attempted to locate nordvpn.com," commented the company on its website. The attack happened in March 2018, when an unapproved user located the NordVPN server in Finland. They used an "unsafe remote administration system" that the data hub provider had forgotten.  The company didn't know of any such system. The server misused was attached to NordVPN's server record on January 31. The service provider caught...

Malspam Campaign attacks German organizations with Buran ransomware

Image
As of Oct 2019 researchers have discovered malicious spam (malspam) campaign targeting German organizations that delivered Buran crypto-ransomware family. The emails are crafted so as to appear to be coming from online fax service eFax. Public reporting indicates that Buran malspam campaigns began on 13 September 2019, corroborated by metadata found in emails and Microsoft Word documents. Then the campaign on 1 October 2019 copied the eFax brand, an online fax service. German organizations were targeted using an email that seemed like it was from eFax and Word document in German.   Technical Details  On opening the mail, the user is given a hyperlink, which if clicked directs the user to a PHP page that contains the malicious word document. The document then contains a Visual Basic for Applications (VBA) macro, when enabled, downloads the malicious executable. On Activation, the Buran ransomware performs the following tasks- (Sc.Itssecure.com) •Sends an HTTP GET r...

B2B Payment Service Billtrust Went Down After Ransomware Attack

One more firm has now emerged as a victim of a ransomware attack. This time, it is the B2B online B2B Payment Service Billtrust Went Down After Ransomware Attack on Latest Hacking News . from Latest Hacking News https://ift.tt/32MjAFg

Group-IB reported on the five hacker groups threatening to Russian banks

Image
The main hacker groups threatening Russian banks are Cobalt, Silence, MoneyTaker, Lazarus and SilentCards. They can hack a Bank, reach isolated financial systems and withdraw funds, said Ilya Sachkov, CEO and founder of Group-IB, a company specializing in preventing cyber attacks. At the same time, hacker groups are shifting their focus from Russia to other countries. According to the founder of Group-IB, "it is curious that three of the five groups (Cobalt, Silence, MoneyTaker) are Russian-speaking, but over the last year Cobalt and Silence began to attack banks mainly outside Russia". "For example, Silence began its activities in Russia, but gradually shifted its focus to the CIS, and then entered the international market. Group-IB analysts have detected Silence attacks in more than 30 countries in Europe , Asia and the CIS for the current year," said Sachkov. According to him, the pro-government hackers of developed countries are the most dangerous, si...

Tehran has no data on alleged use of Iranian devices by Russian hackers

Image
Iranian authorities do not have information about the alleged use of Iranian devices by Russian hackers to carry out cyberattacks on dozens of countries around the world, said an official representative of the Iranian government Ali Rabiya. A report by the UK’s National Cybersecurity Center (NCSC) and the United States National Security Agency (NSA) reveals that the Turla hacking group, allegedly associated with “Russian entities", hacked software of Iranian hackers to cyber-spy and attack government and industry organizations in dozens of countries. The content of the document is published on the NCSC website. It is claimed that, according to British intelligence services, the hacking campaign was most actively carried out in the Middle East. No evidence of cyberattacks is provided. However, the Iranian government said they did not have information about Turla hackers. According to political scientist Alexander Asafov, the assignment of the Turla hacker group to “Russi...

Remote Code Execution Vulnerability Found In Trend Micro Anti-Threat Toolkit (ATTK)

The Anti-Threat Toolkit (ATTK) by Trend Micro is a dedicated tool for fending off malware infections. However, like any other Remote Code Execution Vulnerability Found In Trend Micro Anti-Threat Toolkit (ATTK) on Latest Hacking News . from Latest Hacking News https://ift.tt/2JfnApM

Social Media Regulations: Need 3 Months To Frame Rules, Centre Informs SC

Image
NEW DELHI: The Centre on Monday informed the Supreme Court that it would need 3 more months to finalize the process of updating and notifying the intermediary guidelines for social media in India, as per the reports by PTI. These new rules will be aimed at curbing the alleged exploitation of various social media platforms like Facebook and WhatsApp; major issues like fake news, hate speech, defamatory posts and anti-national activities will be regulated by the updated guidelines which are expected by the last week of January. After the top courts inquired about the steps taken on this subject, an affidavit had been filed, in which the government said that the country witnessed an exponential increase in the kind of posts and messages that incite hatred, disrupts social harmony and threatens country’s integrity, and therefore, a greater control over the internet is required to safeguard national security. On the basis of the appeal filed by social media giants like WhatsApp, Fac...

Hackers Breach Avast Through Old Internal VPN Profile

The popular cybersecurity firm Avast has revealed a cyber attack that it endured recently. Reportedly, Avast faced a security breach Hackers Breach Avast Through Old Internal VPN Profile on Latest Hacking News . from Latest Hacking News https://ift.tt/31HnONb

Hackers Deployed Fake UpdraftPlus Plugins With Backdoor To Infect WordPress Websites

Once again, hackers have devised a new strategy to infect WordPress websites. This time, researchers have found them exploiting fake Hackers Deployed Fake UpdraftPlus Plugins With Backdoor To Infect WordPress Websites on Latest Hacking News . from Latest Hacking News https://ift.tt/2N5Ty95

NordVPN Discloses Server Breach That Could Have Potentially Allowed For Traffic Monitoring

Extending the list of firms suffering a breach, now joins NordVPN. However, they didn’t suffer any ‘direct’ security breach, rather NordVPN Discloses Server Breach That Could Have Potentially Allowed For Traffic Monitoring on Latest Hacking News . from Latest Hacking News https://ift.tt/32Bsg1b

Wi-Fi Bug in Amazon Echo and Kindle Devices Assist Attackers in Stealing Sensitive Data

Image
There is no denying the fact that Amazon Echo and Kindle devices are extremely popular and are utilized by a large number of users around the world. The news, therefore, comes as a huge shock to those millions of users that some researchers from ESET Smart Home saw that Amazon Echo and Kindle Echo are vulnerable against KRACK attacks. The KRACK attacks, discovered and published by two Belgian researchers in October 2017 are based on the weaknesses in the WPA2 protocol utilized in modern-day Wi-Fi devices. The weakness is said to have been exploited by the attackers utilizing key reinstallation attacks if the victim resides within the system and the successful exploitation of the attack enables attackers to steal sensitive details, for example, credit numbers, passwords, chat messages emails, photos, etc. Researchers tried the first generation of the Amazon Echo devices with original Amazon Alexa as well as the eighth generation of Amazon Kindle and concluded that they are vuln...

The Russian Embassy in Prague denied the statement of a Russian spy network in the Czech Republic

Image
The Russian Embassy in Prague denied the statement of the head of the Czech Security and Information Service, Mikhail Koudelka, who announced the disclosure of the activities of the Russian spy network allegedly operating in the country. On Monday, the head of the Czech Security Information Service (BIS), Mikhail Koudelka, said that his agency and the Czech police had exposed the activities of a Russian spy network, which operates through the Russian Embassy in Prague. "This network was completely defeated and beheaded," said Koudelka during a speech in the Czech Parliament. According to the head of BIS, this network "was created by people associated with the Russian intelligence services, and funded from Russia and the Russian Embassy." Koudelka claims that members of the network planned attacks against targets in the Czech Republic and other countries via the Internet. He also said that this network was part of a larger structure created by Russia in ot...

Hackers on behalf of the Lithuania issued false news about the deployment of nuclear weapons

Image
Hackers on behalf of the Ministry of Foreign Affairs of Lithuania spread the news about the request of the President of the country Gitanas Nauseda to the United States to establish a military base in Lithuania and transfer nuclear weapons to the country from the Incirlik base in Turkey. The report also said that in October about 500 US troops will arrive in Lithuania to build the necessary infrastructure. A battalion of this size is really sent to Lithuania for a period of six months to conduct joint exercises with local military units. According to the media reports, the Lithuanian Foreign Ministry denied the information about the intention of the country's leadership to create an American base. The Foreign Ministry believes that they were subjected to an Internet attack, which is being investigated by law enforcement agencies, in particular, the National Center for Cyber Security. The spokesman for the Lithuanian Foreign Ministry Rasa Yakilaitene informed the internat...

UC Browser Exposed Millions Of Users To MiTM Attacks via Third-Party APK Download

Once again, the UC browser has made it into the news. This time, researchers found them to be exposing millions UC Browser Exposed Millions Of Users To MiTM Attacks via Third-Party APK Download on Latest Hacking News . from Latest Hacking News https://ift.tt/2W1xVem

A new Malware that makes ATMs to dispense all the cash is making the hype, here's everything you need to know.

Image
Malware isn't a new thing, as we all are quite aware of it, but it varies with time, and so does the threat levels that it imposes. A Malware may attempt to swipe your password, or infiltrate your system, or quietly monitor your browsing activity. However, the most threatening Malware is one that tries to steal all that you have earned. This is known as Jackpotting, which targets only ATMs. The name is termed so because jackpotting forces the ATMs to give all the cash that it has inside it. This can be a concern for the general public as the cases of jackpotting are rising every day. "Hackers throughout the globe are apprehending this is a low-cost and simple way to get some easy money. The ATMs with old software are targeted using black market code software, and the hackers are strolling off with millions in their pockets," says a collaborative study of Motherboard and German newsroom Bayerischer Rundfunk. When jackpotting occurs, it doesn't matter how tech-sa...

Researcher Discovers Critical Linux WiFi Vulnerability That Existed For Four Years

Linux users unknowingly remained vulnerable to a serious security flaw for almost four years. Recently, a researcher highlighted a critical Researcher Discovers Critical Linux WiFi Vulnerability That Existed For Four Years on Latest Hacking News . from Latest Hacking News https://ift.tt/31yJHxX

Google Pixel 4 Has A Nasty Face Unlock Bug

Google’s latest high-end phone Pixel 4 has just released. However, the upcoming phone which is about to ship has a Google Pixel 4 Has A Nasty Face Unlock Bug on Latest Hacking News . from Latest Hacking News https://ift.tt/2Bs07NQ

Phishing Attack Targets Stripe Users With The Aim to Steal Banking Credentials

Once again, a peculiar phishing attack has surfaced online, this time, targeting Stripe users. The attack not only aims at Phishing Attack Targets Stripe Users With The Aim to Steal Banking Credentials on Latest Hacking News . from Latest Hacking News https://ift.tt/2qxpqMB

Multiple Security Flaws Found In Cisco Aironet Access Point Software

Cisco has recently released patches for numerous serious security vulnerabilities. The flaws existed in the Cisco Aironet Access Points Software, Multiple Security Flaws Found In Cisco Aironet Access Point Software on Latest Hacking News . from Latest Hacking News https://ift.tt/2Mx2Vjd

Amazon Kindle And Echo Devices Affected By KRACK WiFi Vulnerability

Researchers have recently discovered a security vulnerability targeting Amazon Kindle and Echo devices. The KRACK WiFi vulnerability discovered back in Amazon Kindle And Echo Devices Affected By KRACK WiFi Vulnerability on Latest Hacking News . from Latest Hacking News https://ift.tt/2MTIoEu

Researcher Creates ‘Qu1ckR00t’ Jailbreak From Android Zero Day Exploit

It hasn’t been longs since we heard of a zero-day vulnerability affecting numerous Android phones. Now, a researcher has leveraged Researcher Creates ‘Qu1ckR00t’ Jailbreak From Android Zero Day Exploit on Latest Hacking News . from Latest Hacking News https://ift.tt/2qnneH8

Hackers Now Employ Steganography To WAV Audio Files For Hiding Malware

Despite the presence and implementation of robust security protocols, various persistent and ever-evolving hacking strategies continue to exist. This clearly Hackers Now Employ Steganography To WAV Audio Files For Hiding Malware on Latest Hacking News . from Latest Hacking News https://ift.tt/2MuAvGE

Cybersecurity Researchers Discovered Attack Which Uses WAV Audio Files to Hide Malicious Code

Image
We are living in an age where user security being breached is one of the most familiar headlines we come across in the cybersecurity sphere, attackers have continued to discover unprecedented ways to compromise user data and have strengthened the older ones. A widely used technique which allows hackers to break into computers and extract user data without getting noticed is resurfacing again, this time making the detention even more complex by embedding the malware inside audio files resembling the regular WAV format audio files on the computer, according to the cybersecurity researchers at Cylance, a California based software company that develops antivirus programs and other software to prevent malware. Hackers employed a method known as ‘Steganography’ to hide and deliver malware, it involves hiding a file, video or message with the help of some other file. Researchers at Cylance discovered the malicious code embedded inside the WAV audio files with each file containing a ‘lo...

iPhone Users Being Tricked With Fake Checkra1n Jailbreak Tool

Checkm8 has emerged to be a real pain in the neck for Apple. Owing to the wide span of the iPhone Users Being Tricked With Fake Checkra1n Jailbreak Tool on Latest Hacking News . from Latest Hacking News https://ift.tt/2J8wbKW

Credit histories of a million Russians were in the public domain

Image
The microfinance company’s database with passport data, phone numbers and residential addresses was made publicly available. Credit histories of more than 1 million Russians with data of mobile operators obtained from the Bureau of Credit Histories (BKI) were in the public domain since the end of August. Independent cybersecurity researcher Bob Dyachenko first discovered this data on October 10. According to him, he reported a problem to the BKI, after which the database was closed. However, it is not known whether anyone had time to download the publicly available information. As Dyachenko noted, specialized search engines indexed it on August 28. According to media reports, the database could belong to GreenMoney microfinance company, which gave the online loans. It contains passport data of borrowers, other documents, addresses of registration and actual place of residence, phone numbers, information about loans. GreenMoney CEO Andrei Lutsyk said that an audit is being ca...

More than 300 hundred arrested in "dark web child abuse" sting!

Image
Hundreds, around 338 people have been arrested in the worldwide sting of "largest dark web child porn marketplaces", investigators said. The now seized English website, "Welcome to Video" hosted 2,00,000 videos showing illegal acts committed to children, which were downloaded more than a million times. The site had eight terabytes of data containing gruesome acts being done to infants, toddlers and children. The site's owner Jong Woo Son, 23, from Korea is currently in prison, serving a sentence of 18 months. Unites States officials have unsealed nine allegations against him. "You may try to hide behind technology but, we will find you and arrest you and prosecute you." Jessie Liu, the US attorney for the District of Columbia said in a press conference. The site was shut down a year ago in March by US authorities, but on Wednesday officials said 338 users have been arrested from 38 countries including UK, Ireland, US, South Korea, Germany, S...

The Head of the FSB spoke about the threat of massive terrorist hacker attacks

Image
Director of the FSB Alexander Bortnikov said that terrorist can disguise their hacking attacks under the actions of special services of specific States and this threatened to political and military conflicts. He stated this at the XVIII international meeting of heads of intelligence, security and law enforcement agencies in Sochi. According to the FSB, terrorist groups create and develop their own cyber units. Bortnikov called on intelligence agencies of other countries to support Russia's demand to deposit encryption keys for mobile devices. Fighting terrorism is ineffective as long as they use closed channels of communication on the Internet, he explained. "The main tool of communication between bandits are still Internet Messengers with high crypto protection. In this regard, we consider it a serious problem that a number of the world's leading IT companies do not want to cooperate with intelligence agencies in the field of information security,” Bortnikov said...