Posts

Showing posts from June, 2020

Facebook To Alert Users When Sharing Old Content

Continuing further with fighting back fake news and encourage useful content sharing, Facebook has taken another step. As revealed, Facebook Facebook To Alert Users When Sharing Old Content on Latest Hacking News . from Latest Hacking News https://ift.tt/2NLCJRy

Golang: A Cryptomining Malware that Maybe Targetting Your PC

Image
Cybersecurity experts at Barracuda Networks have discovered a unique kind of crypto mining malware called "Golang." The malware can attack Windows as well as Linux systems, according to the experts. This latest malware is targeting Monero cryptocurrency with the help of Xmrig, a popular miner. The number of attacks related to the malware may be relatively low, but the cybersecurity experts have discovered 7 IP addresses associated with this malware, all originating from China. The experts also observed that the Golang malware's primary targets are non-HTTP features like MSSQL and Redis, app servers, web apps frameworks, whereas easy to attack targets like end-users are safe. If we look back into the issue, we will find that the earlier versions of Golang only affected the Linux systems; however, the present version targets Windows and the former. The attacks are carried out using various exploits such as IoT devices, Hadoop, Drupal, ElasticSearch, and Oracle Weblogic...

53 Different Apps Including TikTok Spy On iPhone/iPad Clipboard Data

Apple has always boasted privacy and security in favour of its users. Nonetheless, the snoopers never miss a chance to 53 Different Apps Including TikTok Spy On iPhone/iPad Clipboard Data on Latest Hacking News . from Latest Hacking News https://ift.tt/31Ckh62

What are the Benefits of Getting PSM Certification?

Scrum is one of the frameworks of the Agile environment that helps an organization in developing successful products through quick What are the Benefits of Getting PSM Certification? on Latest Hacking News . from Latest Hacking News https://ift.tt/2YMfcX8

IM Platforms Increasingly Used by Threat Actors in Place of Dark Web Marketplaces

Image
Researchers at IntSight have discovered that IM platforms such as WhatsApp, Telegram, Discord, IRC, and Jabber are being used by cybercriminals for advertising and putting their goods and services on sale. One of the major reason as to why cybercriminals are switching to these IM platforms from the conventional ones is 'law enforcement practices'; law enforcement operations have been targeting online darknet markets one after another. Earlier in 2017, the world's largest dark web market, AlphaBay was taken offline, sending darknet users into chaos. Immediately after, the cyberspace witnesses the shut down of Hansa, another major darknet market. As more and more major dark web markets went offline due to the law enforcement penetrations, cybercriminals are wisely migrating to new platforms. Although threat actors are loving IM platforms, the regular cybercrime sources such as dark web markets, credit card shops, and forums are still witnessing their web usual traffic. T...

Russian Medvedev pleaded guilty to cybercrime in a US court

Image
The US Department of Justice considers Sergei Medvedev one of the founders of the transnational organization Infraud, which sold stolen personal, banking and financial data, as well as information from credit and debit cards Russian Sergei Medvedev, accused in the United States of cybercrime and causing damage of $568 million, pleaded guilty, said the US Justice Department on June 26. "Sergey Medvedev, also known as Stells, segmed, serjbear, aged 33, from the Russian Federation, pleaded guilty to US District Court judge James Mahan in Nevada," said the Department in a statement. According to the Ministry of Justice, Infraud engaged in large-scale acquisition, sale and distribution of stolen identification data, information from compromised debit and credit cards, personal information, banking and financial data, and malicious computer programs. The prosecution believes that Infraud was created in October 2010 by a native of Ukraine Svyatoslav Bondarenko, also known a...

Sneaky Glupteba Malware Creates Backdoor In Windows PCs

A new malware ‘Glupteba’ threatens the security of Windows systems. This sneaky malware remains hidden as it continues to create Sneaky Glupteba Malware Creates Backdoor In Windows PCs on Latest Hacking News . from Latest Hacking News https://ift.tt/2BmVdVZ

Mitsubishi And LG Recent Victims Of Ransomware Attack

Two corporate giants, Mitsubishi and LG have emerged as the latest ransomware victims. Though, the attack was from different threat Mitsubishi And LG Recent Victims Of Ransomware Attack on Latest Hacking News . from Latest Hacking News https://ift.tt/2Vvaaw5

Vulnerabilities Found In GeoVision Fingerprint And Card Scanners

Numerous critical vulnerabilities existed in the GeoVision card and fingerprint scanners. These include some critical vulnerabilities as well, one of Vulnerabilities Found In GeoVision Fingerprint And Card Scanners on Latest Hacking News . from Latest Hacking News https://ift.tt/3iaThR7

Apple catches TikTok spying on million of iPhone users globally

Image
Apple announced its latest OS iOS14 at this year's WWDC and during the beta testing for the same, the tech giant caught TikTok recording user's cut-paste data and whatever the user was typing on their keyboard. The new alert on iOS14 lets the user know if any app is pasting from the clipboard and if they are reading from the cut-paste data. This alert leads to TikTok's reveal. This alert was added based on the research by German software engineer Tommy Mysk in February; he discovered that every app installed on an iPhone or iPad can access clipboard data. And thus Apple added this new banner alert in its latest OS. Soon after the update, many users started complaining about the issue, “Hey @tiktok_us, why do you paste from my clipboard every time I type a LETTER in your comment box?” wrote @MaxelAmador actor and podcast host on Twitter. “Shout out to iOS 14 for shining a light on this HUGE invasion of privacy.” Though many other apps like Accu Weather, Call of Duty M...

Twitter Admits Business Data Breach For Some Users and Conveys Apologies

Once again in a while, Twitter has made it to the news due to a cybersecurity incident. This time, Twitter Twitter Admits Business Data Breach For Some Users and Conveys Apologies on Latest Hacking News . from Latest Hacking News https://ift.tt/3ic4xg7

VMware Fixed Multiple Vulnerabilities In Workstation, Fusion, and Others

VMware has recently patched multiple vulnerabilities affecting Workstation, Fusion, and more. These vulnerabilities also included some critical severity bugs. Critical VMware Fixed Multiple Vulnerabilities In Workstation, Fusion, and Others on Latest Hacking News . from Latest Hacking News https://ift.tt/2YI8Kk4

Hackers Leak Tons of Personal Data as IndiaBulls Fails to Meet the Firs Ransomware Deadline

Image
Hackers demanding ransom released data, as the IndiaBull failed to meet the first ransom deadline. It happened after a 24-hour ransomware warning was issued, and when the party was unable to make ends meet, the hackers dumped the data. According to Cyble, a Singapore based cybersecurity agency, the hackers have threatened to dump more data after the second deadline ends. The hackers are using ransomware, which the experts have identified as "CLOP." The hackers stole the data from IndiaBulls and released around 5 Gb of personal data containing confidential files and customer information, banking details, and employee data. It came as a warning from the hackers, in an attempt to threaten the other party, says a private cybersecurity agency. About the data leak- The dumped data resulted in exposing confidential client KYC details like Adhaar card, passport details, Pan card details, and voting card details. The leak also revealed personal employee information like offici...

Business Email Compromise: Most Common Online Scam?

Image
More and more small and medium enterprises are being affected by business e-mail compromise, according to a webinar, conducted by the PHD Chamber of Commerce and Industry. Business Email Compromise also known as BEC is a security exploit in which the threat actor obtains access to a corporate email account having links to company funds and then attempts to defraud the company or the employees by spoofing the targeted employee's identity. The attackers manipulate the target to transfer money into a bank account that belongs to them. In the year 2019, BEC scams have amounted for losses of more than $1.77 billion, as per the FBI's Internet Crime Report. Businesses are being warned as BEC exploits surge due to the ongoing pandemic; companies that rely primarily on wire transfers to transfer money to international customers are the most common target of BEC. An infected email network can cause a significant amount of damage to a company's interests, therefore safeguardi...

Texas Hit By a Human-Operated Ransomware That Targets against Government Agencies and Enterprises

Image
May 2020 was not a good month for both the Texas Courts and the Texas Department of Transportation (TxDOT) as the month marked the discovery of a new ransomware called Ransom X, being effectively utilized in human-operated and focused on attacks against government agencies and enterprises. Advanced Intel's Vitali Kremez discovered a 'ransom.exx' which was believed to be the name of the ransomware. As this is human-operated ransomware, as opposed to one distributed by means of phishing or malware, when executed the ransomware opens a console that shows info to the attacker while it is running. As indicated by Kremez, Ransom.exx works to terminate 289 procedures identified with security software, database servers, MSP softwares, remote access devices, and mail servers. Ransom X will likewise play out a series of orders all through the encryption process that: Clear Windows event logs Delete NTFS journals Disable System Restore Disable the Windows Recovery Enviro...

Hackers abusing .slk files to attack Microsoft 365 users

Image
Avanan’s Security Analysts have recently discovered a threat bypassing Microsoft 365 security, the attack uses .slk files to avoid detection. The attack groups send emails containing .slk file as an attachment with macro (MSI exec script) to download and install the trojan. Although this attack is limited to Microsoft 365, bypassing both of its default security (EOP) and advanced security (ATP), it does put around 200 million-plus users in jeopardy.  By far Gmail users are safe from this threat as Google blocks .slk files and does not allow to be sent as an attachment. The attack “Symbolic Link” (SLK) file is an older human-readable text-based spreadsheet format last updated in 1986. Back when XLS files were private, .slk were open-format alternative for XLS but then XLSX was introduced in 2007 and there was no longer the need of .slk. Now, to the user, these .slk files look similar to an Excellent document and let the attacker move through Microsoft 365 security. This...

Sony Announce Bug Bounty Program For PlayStation

Sony have recently launched their bug bounty program for PlayStation. Security researchers and bug bounty hunters can now report any Sony Announce Bug Bounty Program For PlayStation on Latest Hacking News . from Latest Hacking News https://ift.tt/2ZfWQg5

The database of millions of Telegram users from Russia and Iran appeared on the Darknet

Image
On one of the forums in the Darknet, a database appeared with information about several million users of the Telegram messenger. The data file is about 900 megabytes.  The Telegram press service confirmed the existence of the database, explaining that information is collected through the built-in contact import function even when the user registers. Representatives of the company added that not a single service that allows users to communicate with contacts from their phone book can completely exclude such a search. Telegram also assured that most of the fused accounts are no longer relevant. In addition, the messenger has a function "Who can add me to contacts by phone number". This setting makes it difficult for regular users to communicate (they become invisible even to those who know their phone number), but it allows you to completely hide the connection between the account and the phone number. It became known that the Telegram user contact database did not appe...

Experts have discovered a data leak of almost five million Russians

Image
DeviceLock experts discovered a data leak of almost 5 million users in the Russian Federation, presumably from one of the employment portals; the database contains contact information and last names, first and middle names of users, said Ashot Hovhannisyan, founder and technical Director of DeviceLock, a developer of data leakage control systems. "A set of files was published yesterday (on 22 June), it is likely to be unloaded from the SuperJob portal database. In total, all files contain 5 million lines. Files can be downloaded for free," said he. According to Hovhannisyan, the files contain last names, first and middle names, gender, date of birth, phone number, email address, city, desired salary level, as well as the name of the mobile operator, region and time zone of users. The expert noted that the leak could have occurred due to a vulnerability in the database server. According to Hovhannisyan, the database has a similar volume and format to the data from th...

Cyberattacks in the U.S. Hit an All-Time High due to Covid-19, Says Black Hat Report.

Image
Due to the coronavirus pandemic, cybersecurity experts suspect a rise in cyberattacks and cybercrimes, says a survey by Black Hat earlier this week. Around 275 cybersecurity professionals (respondents in the study) have expressed concerns about potential breaches in the U.S. infrastructure and the I.T. industry. More than 90% of these experts believe that due to coronavirus, there has been a jump in cyber threats in the U.S., resulting in data leaks and privacy breaches. Around 24% of experts believe that the current danger is very severe and critical. Among the cybersecurity threats, work from vulnerabilities in the remote access systems tops the list, accounting for 57% of the attacks. Meanwhile, phishing scams and spam attacks account for a hefty 51%. Around 85% of these experts claim that there might be a targeted cyberattack on the U.S. infrastructure in the next two years. The threat figures went up from 69% in 2018 to 77% in 2019. Among these, around 15% of the respondents ...

How to download 4K and 8K YouTube videos on Mac with Airy

It seems just recently 1080p was the gold standard for consumer displays everywhere, but video resolutions are continually improving. And How to download 4K and 8K YouTube videos on Mac with Airy on Latest Hacking News . from Latest Hacking News https://ift.tt/381klxC

Top Battery Hacks That Will Save You Money

How many devices in your home use batteries? The answer to that should be many devices ranging from toys to Top Battery Hacks That Will Save You Money on Latest Hacking News . from Latest Hacking News https://ift.tt/2NxgxL4

Lucifer Malware Emerges As New Threat To Windows Devices

A new malware dubbed ‘Lucifer’ (or Satan) is actively targeting Windows systems. This malware exploits various vulnerabilities in the system Lucifer Malware Emerges As New Threat To Windows Devices on Latest Hacking News . from Latest Hacking News https://ift.tt/31iIvSJ

Group-IB disclosed data about a Russian-speaking hacker who hacked hundreds of companies

Image
Computer security specialists at Group-IB have identified a suspected hacker with nickname Fxmsp who has been trading on the Darknet for three years with access to corporate networks of international companies. He is called one of the most dangerous criminals in this area: more than 130 companies around the world, including the leading American antivirus corporations, were affected by the actions of this representative of the Darknet. Allegedly, the attacker is a resident of Kazakhstan, Andrei Turchin. Group-IB believes that the hacker compromised 135 companies in 44 countries, including the United States, England, France, Italy, the Netherlands, Japan, Australia and others. Allegedly, the attacker earned about $1.5 million through criminal means. Materials on the hacker were transferred to international law enforcement agencies. For the first time, a criminal with the nickname Fxmsp became active in the second half of 2017. Group-IB noted that the attacker attacked banks, telec...

Bharti Airtel on cyber high alert - upgrades security measures

Image
New Delhi: Bharti Airtel, India's major telecom service provider has upgraded it's cyber security to a higher threat level for the next week in the aftermath of various cyber attacks. They have increased their SOC (System On Chip) to withstand upcoming attacks and are working on eliminating any vulnerability that could welcome an attack.   "We have come across media reports on the potential surge in cyber-attacks such as DDoS, Malware attacks, and defacement of websites. We have also witnessed an increase in such Cyber activity during our security operations. These attacks threaten to not only disrupt critical business operations but also impact your brand’s reputation," Airtel said in communication with their many enterprises.   Airtel that associates and work with half a million small-medium enterprises and 2000 large enterprises has communicated the security concern and requested them to take preventive measures as well. And Airtel is not wrong in estima...

CryCryptor Android Ransomware Poses As COVID-19 Contact Tracing App

New Android ransomware already active in the wild has caught the researchers’ attention. Identified as CryCryptor, this ransomware masks itself CryCryptor Android Ransomware Poses As COVID-19 Contact Tracing App on Latest Hacking News . from Latest Hacking News https://ift.tt/2Z8xyk3

Twitter Data Breach: Apology Sent to Potentially Affected Business Clients

Image
The cyberspace has reportedly witnessed a fivefold increase in malicious attacks since the spread of the Coronavirus pandemic, it's primarily because people have been sidetracked due to systematic threat posed by the coronavirus that cybercriminals are not missing any chance of capitalizing on the adversity. Another reason guiding the crisis is based on the fact that IT has become the backbone of organizations as more and more employees turn to work remotely. In light of that, Twitter has become the latest victim of the crisis as the officials apologize for a business data breach. Attackers have yet again gained access to personal details of Twitter users following a data breach that led the social media owners to seek an apology from its business clients and other users as well. The allegedly compromised data includes highly sensitive information related to the company's business clients' i.e., their phone numbers, email addresses, and last 4 digits of credit card num...

XSS Vulnerability Discovered In YITH WooCommerce Ajax Product Filter WordPress Plugin

One more WordPress plugin potentially risked the security of over 100,000 websites due to a security flaw. Reportedly, a serious XSS Vulnerability Discovered In YITH WooCommerce Ajax Product Filter WordPress Plugin on Latest Hacking News . from Latest Hacking News https://ift.tt/2NttSE5

Serious Remote Code Execution Flaw Found In Bitdefender Total Security 2020

A serious security flaw existed in the Bitdefender Total Security 2020 software. As discovered by the researcher, this vulnerability could Serious Remote Code Execution Flaw Found In Bitdefender Total Security 2020 on Latest Hacking News . from Latest Hacking News https://ift.tt/385jwUr

Critical Vulnerability Found In Russian Payment Service QIWI

Amidst the ongoing times when the world is relying heavily on online payment service, it’s a requisite to ensure that Critical Vulnerability Found In Russian Payment Service QIWI on Latest Hacking News . from Latest Hacking News https://ift.tt/3hV0swG

New Shlayer Trojan Variant Threatens Mac Devices As It Bypasses macOS Security

Heads up Mac users. A new Mac malware has surfaced online that can infect your device sneakily. This new malware New Shlayer Trojan Variant Threatens Mac Devices As It Bypasses macOS Security on Latest Hacking News . from Latest Hacking News https://ift.tt/2AWZxLJ

Microsoft Warns Users Of Excel Malware Campaign Asking Users To Solve CAPTCHA

Heads up Microsoft users! A new malware campaign is in the wild that exploits Microsoft Excel. It also requires the Microsoft Warns Users Of Excel Malware Campaign Asking Users To Solve CAPTCHA on Latest Hacking News . from Latest Hacking News https://ift.tt/2AW0kMY

Best Way To Upgrade Your Passwords & Web Security

When using the Internet for your business or personal inquiries, your information can be stolen if not well protected. Find Best Way To Upgrade Your Passwords & Web Security on Latest Hacking News . from Latest Hacking News https://ift.tt/3hZ9MQj

High-Severity Vulnerability Discovered In Argent Ethereum Wallet

Researchers caught a security bug in a cryptocurrency wallet that could allow hackers to steal funds. This time, the product High-Severity Vulnerability Discovered In Argent Ethereum Wallet on Latest Hacking News . from Latest Hacking News https://ift.tt/31aor4X

Experts discovered phishing emails in Office 365 accounts

Image
Check Point experts discovered a sophisticated phishing campaign aimed at collecting corporate data and compromising Microsoft Office 365 accounts. To avoid detection, hackers used the servers of well - known organizations such as Oxford University, Adobe and Samsung. 43% of these attacks were targeted at European companies, while the rest were seen in Asia and the Middle East. According to experts, as part of one of the phishing campaigns, hackers sent their victims emails that contained links to the Adobe server. "Previously, the server was used by Samsung. This allowed hackers to create the appearance of a legitimate Samsung domain, this increased the confidence of victims. Thus, the victims were redirected to the login credentials page for entering Office 365," said experts. At the beginning of April 2020, another phishing campaign was recorded, the subject of the letter indicated “Office 365 voicemail”. The email said that to listen to the message, you need to cli...

Over 100 Malicious Google Chrome Extensions Found Spying On Users

Once again, cybercriminals have stealthily preyed on millions of Google users. Reportedly, Google removed numerous malicious Chrome extensions after researchers Over 100 Malicious Google Chrome Extensions Found Spying On Users on Latest Hacking News . from Latest Hacking News https://ift.tt/2YWJnJW

Firefox Web Browser Launching Its Own Paid VPN Service

Image
The Firefox Private Network service launched in beta just the previous year as a browser extension for desktop versions of the Firefox web browser is all set to be renamed as Mozilla VPN. According to a blog post, Mozilla VPN will move out of the beta and be available as a standalone service later this year with select regions, which will include the United States. The VPN will be accessible for $4.99 every month and the user will have the option to utilize around five devices with a similar account. Mozilla specifies this pricing is just temporary yet has not clarified whether the price will be increased or new plans introduced for fewer devices. Mozilla VPN will be launched as a standalone and system-wide VPN service for Android, iOS, Windows, ChromeOS, macOS, and Linux platforms throughout the next few weeks. While the Android, iOS, Windows, and Chromebook clients will be available at first, Mozilla is likewise chipping away at Mac and Linux clients which have additional...

Expert says Durov the main role in the process that will end the US monopoly

Image
One of the most discussed news in the Internet community was the unblocking of the popular Telegram messenger by Roskomnadzor. Experts have different views on this event. Yaroslav Bogdanov, Chairman of the Board of the Investor Protection Fund for the Foreign States, predicts that Pavel Durov will play a special role in the process that will end the US monopoly in the financial and digital spheres. The lawyer is convinced that there is an urgent situation when the IT industry needs an international Global Digital Alliance. A non-governmental independent structure could interact with both state governments and cryptocurrency creators in compliance with crypto and cybersecurity standards. Yaroslav Bogdanov notes that all the best leaders of the crypto industry are from the former republics of the Soviet Union.  For the most part, they are being prosecuted by US intelligence agencies and are often accused of damaging US security. Pavel Durov, among others, suffered from the mono...

CSIRO's Data61 Developed Voice Liveness Detection 'Void' to Safeguard Users Against Voice Spoofing Attacks

Image
Spoofing attacks that impersonate user's devices to steal data, spread malware, or bypass access controls are becoming increasingly popular as the threat actors expand their horizon with the improvisation of various types of spoofing attacks. Especially, voice spoofing attacks that have been on a rise as more and more voice technologies are being equipped to send messages, navigate through smart home devices, shop online, or to make use of net banking. In a joint effort for the aforementioned concern, Samsung Research and South Korea's Sungkyunwan University and Commonwealth Scientific and Industrial Research Organisation's (CSIRO) Data61, came up with 'the voice liveness detection' (Void) to keep users safe against voice spoofing attacks. In order to detect the liveness of a voice, Void gains insights from a visual representation of the spectrum of frequencies known as 'spectrograms' – it makes the functionality of void a little less complex compared...

Cisco Patched Multiple High-Severity Flaws In Webex Meetings Desktop App

Cisco recently issued numerous security fixes for bugs affecting a range of products. These also include some high-severity flaws in Cisco Patched Multiple High-Severity Flaws In Webex Meetings Desktop App on Latest Hacking News . from Latest Hacking News https://ift.tt/2YodBql

One Of Tech Giant Oracle’s Many Start-ups Uses Tracking Tech to Follow Users around the Web

Image
The multinational computer technology corporation Oracle has spent almost 10 years and billions of dollars purchasing startups to fabricate its own one of a kind ‘panopticon’ of users' browsing data. One of those startups which Oracle bought for somewhat over $400 million in 2014, BlueKai, is scarcely known outside marketing circles; however, it amassed probably the biggest bank of web tracking data outside of the federal government. By utilizing website cookies and other tracking tech to pursue the user around the web, by knowing which sites the user visits and which emails they open, BlueKai does it all. BlueKai is supposedly known to depend intensely on vacuuming up a 'never-ending' supply of information from an assortment of sources to comprehend patterns to convey the most exact ads to an individual's interests. The startup utilizes increasingly clandestine strategies like permitting websites to insert undetectable pixel-sized pictures to gather data abo...

Drupal Patched Numerous Vulnerabilities Including Two Critical Issues

Drupal has made it to the news this week as it addressed numerous security flaws affecting its platform. In brief, Drupal Patched Numerous Vulnerabilities Including Two Critical Issues on Latest Hacking News . from Latest Hacking News https://ift.tt/2YmsCcd

79 Netgear Router Models Vulnerable To Cyber Attacks Due To An Unpatched Flaw

Heads up Netgear router users! An unpatched flaw has made around 79 different Netgear router models vulnerable to remote attacks. 79 Netgear Router Models Vulnerable To Cyber Attacks Due To An Unpatched Flaw on Latest Hacking News . from Latest Hacking News https://ift.tt/2YYUxhD

Sberbank Says Cyber Criminals Using Artificial Intelligence In Banking Trojan

Image
Hackers, using artificial intelligence, created a new generation of banking Trojans, which is quite difficult to recognize, said Deputy Chairman of the Board of Sberbank Stanislav Kuznetsov. "Banking Trojans have become more sophisticated, they have become a new generation of banking Trojans that are difficult to recognize," said he at a press conference. Kuznetsov stressed that these viruses are developed using elements of artificial intelligence and pose a great threat to organizations that have a low level of protection from hacker attacks. The Deputy Chairman of the Board of Sberbank points out that, as a rule, such viruses most often get into companies through phishing. Kuznetsov earlier on Thursday said that the Russian economy due to hacker attacks at the end of this year may lose about 3.5 trillion rubles (50 billion dollars), and next year the losses may double. At the same time, the focus of cyber fraudsters is currently shifting from citizens to companies a...

Cognizant Reveals Employees Data Compromised by Maze Ransomware

Image
Leading IT services company, Cognizant was hit by a Maze Ransomware attack earlier in April this year that made headlines for its severity as the company confirmed undergoing a loss of $50-$70 million in their revenues. In the wake of the ransomware attack, Cognizant issued an email advisory alerting its clients to be extra secure by disconnecting themselves for as long as the incident persists. Cognizant is one of the global leading IT services company headquartered in New Jersey (US). It started in 1994 as a service provider to Dun & Bradstreet companies worldwide; later in 1998, it became independent when D&B split into three, and one group of companies came under Cognizant corporation. Since then, the company has grown leaps and bounds making a name for its consulting and operation services in the industry. The threat actors involved carried out the attack somewhere between 9-11 April, during this period of three days when the company was facing service disruptions, ...

SMS System Now A Long-Gone Era; Google Brings Out A New Update

Image
With the rise of encrypted alternatives of SMS messages, WhatsApp, iMessage, and Signal, the SMS system has become a 'throwback to a long-gone era'.  But ironically, that same SMS system has additionally been on the rise as the default delivery mechanism for most two-factor authentication (2FA) codes.  The issue is being viewed as a critical one in light of the fact that an SMS is delivered to a phone number with no user authentication—biometric or password security efforts secure our physical devices, not our numbers, they are separated.  What's more, this explanation alone clears a path for SIM-swapping, social engineering scams to take those six-digit codes, to malware that catches and exfiltrates screenshots of the approaching messages. For each one of those reasons, and a couple of additional, the advice is currently to avoid SMS-based 2FA if feasible for the user.  But still,  if the user can tie 2FA to the biometric or password security of a k...

How can address validation protect your business from hackers

Hackers have become progressively smarter over the years. Businesses need to stay one step ahead of them to safeguard themselves How can address validation protect your business from hackers on Latest Hacking News . from Latest Hacking News https://ift.tt/2UWXgXl

Virtual Private Network: Reasons To Have It

A virtual private network (VPN) allows the user to get a secure connection over the internet via another network. However, Virtual Private Network: Reasons To Have It on Latest Hacking News . from Latest Hacking News https://ift.tt/3hL9f48

Data Collection in the Web – How Does it Work?

There is a massive amount of data available on the internet, and it keeps growing by the day. Businesses, both Data Collection in the Web – How Does it Work? on Latest Hacking News . from Latest Hacking News https://ift.tt/3dheBRk

Does Buying CBD Products Online Guarantee Privacy?

One of the best things about the Internet is the fact that most things you might want to purchase are Does Buying CBD Products Online Guarantee Privacy? on Latest Hacking News . from Latest Hacking News https://ift.tt/2CgnGNk

How to Build RESTful API for Your Mobile App?

A mobile application should have an API in order to connect to the various web services that are in existence. How to Build RESTful API for Your Mobile App? on Latest Hacking News . from Latest Hacking News https://ift.tt/3enLTje

Medvedev: law enforcement agencies will need new technologies for detecting cybercrime

Image
According to the Deputy head of the Russian Security Council, the Internet is becoming more open, and this makes it an ideal field for criminal communities. Dmitry Medvedev, Deputy Chairman of the Russian Security Council, wrote an article "Security Cooperation during the new coronavirus pandemic".  In it, he said that the new schemes of cybercriminals will require law enforcement agencies to use new technologies for fixing crimes.  "Cybercrime will also gain momentum, creating new fraudulent schemes that law enforcement agencies will have to respond very quickly, and due to the cross-border nature of transactions, new forms of cooperation between law enforcement agencies from different countries and the most modern technological means of detecting and fixing crimes will be required," said Medvedev. In his article, he noted that the coronavirus pandemic has led to a surge in virtual crime. The Deputy head of the Security Council also stressed that the Intern...

Secondary Infektion: A Russian Disinformation Operation Agency You Need to Know About

Image
The secret campaign was famous as " Secondary Infektion ," and it worked separately from the IRA and GRU, staying hidden for many years. The IRA (Internet Research Agency) is known for its notorious disinformation campaigns, where it floods the social media platforms with false information and propaganda. Whereas the GRU, also known as the Main Intelligence Directorate in Russia, is infamous for planning cyberattacks and even strategic data leaks. But in recent times in Russia, it is suspected that there might be a third intelligence agency responsible for such cyberattacks and was able to penetrate even more in-depth. It is believed that this third party that worked distinctly from the former two managed to stay undercover for a long time in Russia and only recently came to public knowledge. Here's what we know. Known as Secondary Infektion, cybersecurity experts found about the operation in 2019. As of now, a social media analyst firm named Graphika  published a re...

Hackers can now spy your conversations via a simple house bulb

Image
What if hackers can spy and record your conversation without a digital device? What if your conversations could be retrieved by a simple, dumb bygone old-fashioned light bulb? Well, it might so be true. Researchers from the Ben-Gurion University of the Negev and the Weizmann Institute of Science in Israel have been researching on sound waves as a means for eves dropping by studying the effect of these waves on objects and they successfully discovered a method of retrieving conversations through a simple light bulb from as far as 25 meters. When we think of a privacy breach, it tends to come from android devices or hacked accounts or in some cases devices like Alexa or Google Home or Siri but these researchers don’t even need to plant a device much than implant a malware. They just need a clear vision of a bulb from less than 25 meters, bizarre isn’t it? They called this method "Lamphone" – a side-channel attack for eavesdropping sound. But there are some major limitat...

Lamphone Attack Exploits Vibrations From Light Bulb To Spy On Users

Recently, various studies regarding side-channel attacks surfaced online that exploited hardware to hack air-gapped systems. However, this time, a similar Lamphone Attack Exploits Vibrations From Light Bulb To Spy On Users on Latest Hacking News . from Latest Hacking News https://ift.tt/3dgZpDR