Posts

Showing posts from July, 2020

Online Michigan Bar Exam Hit by a Distributed Denial of Service (DDoS) Attack

Image
The recently conducted online Michigan bar exam was briefly taken down as it was hit by a rather "sophisticated" cyberattack.  The test had been hit by a distributed denial of service (DDoS) attack, which includes a hacker or group endeavoring to bring down a server by overpowering it with traffic according to ExamSoft, one of the three vendors offering the exam that certifies potential attorneys.  The incident marked the first DDoS attack the organization had encountered at a network level, ExamSoft said, and it worked with the Michigan Board of Law Examiners to give test-takers more time to take the test after it was ready for action once more.  The company noted that "at no time" was any information compromised, and that it had the option to “thwart the attack, albeit with a minor delay” for test-takers.  The Michigan Supreme Court tweeted preceding the organization's statement that a "technical glitch" had made the test go down, and tho...

What Hacking Is And How Should Your Business Protect Itself Against It

In today’s digital world, data is a valuable resource and its security has become a paramount business for digital service What Hacking Is And How Should Your Business Protect Itself Against It on Latest Hacking News . from Latest Hacking News https://ift.tt/2EzW7jn

Worth Watching: 4 Technologies Set to Disrupt Industries

Technology is present in almost everything we do. The digital age has ushered in innovative tech that has reshaped life Worth Watching: 4 Technologies Set to Disrupt Industries on Latest Hacking News . from Latest Hacking News https://ift.tt/30d2nG4

5 Great Study Tools for Your Amazon AWS Certified Solutions Architect Associate Exam Preparation. When Refer to Practice Tests?

Introduction During exam preparation, choosing appropriate study resources is one of the most important factors. This is because when you 5 Great Study Tools for Your Amazon AWS Certified Solutions Architect Associate Exam Preparation. When Refer to Practice Tests? on Latest Hacking News . from Latest Hacking News https://ift.tt/2EAnLg7

Protecting Networks in Today’s At-Home Workspaces

  The rise of remote working is not purely the result of COVID-19’s impact. After all, remote teams and companies Protecting Networks in Today’s At-Home Workspaces on Latest Hacking News . from Latest Hacking News https://ift.tt/30cv0TJ

COVID-19 used as a lure for Cyber Attacks: Report suggest massive increase in Phishing Trends

Image
Since the starting of the year, 2020 has been a bearer of bad news and Covid seems like a bad punch line. With 14 Million cases, the pandemic has wreaked havoc not only on human life but other sectors of business and economy as well; especially impacting cybersecurity, giving a sweet opportunity for hackers and scammers to con people. According to recent research by Positive Technologies, there has been a 25% increase in phishing attacks in quarter one (Q1)of this year as compared to Q4 of 2019 and 13% of these phishing attacks were related to COVID-19. One of the analysts at Position Technologies said, “Hackers were quick to use common concerns about coronavirus as lures in phishing emails. One out of every five emails was sent to government agencies.” The researchers also noted that 23 of the tenacious and active APT (Advanced Persistent Threat) groups targeted financial and medical institutions, government agencies, and industries. Around 34% of the attacks on organizations w...

Google Banned 29 Android Apps Containing Adware

Image
A research discovered that almost all the malware are designed to target android users and in order to prevent users from installing adware filled apps built to stealthily access their banking and social media credentials; Google has made a continuous effort including the introduction of ‘Google Play Protect’. The main idea behind Play protect is to keep your device, apps, and data secure by automatically scanning the apps in real-time and identifying any potentially malicious apps. Despite the strength of Google’s machine learning algorithms and constantly improving real-time technology, the operations of Potentially Harmful Applications (PHAs) do not seem to halt any time soon as cybercriminals are devising new methods to evade detection by Play Protect also. Recently, Google pulled off 29 apps from the Play Store as they were found to be infected with adware, most of these apps were present in the facade of photo editing apps having a feature of ‘blur’, which was also the coden...

US CISA Alerts of Active Exploitation of F5 BIG-IP Vulnerability

Earlier this month, a serious security flaw surfaced online targeting F5 Networks. Now, the US CISA has issued an alert US CISA Alerts of Active Exploitation of F5 BIG-IP Vulnerability on Latest Hacking News . from Latest Hacking News https://ift.tt/333w8uG

The data of clients of the Russian bank Alfa-Bank leaked to the Network

Image
On June 22, a message appeared on the Darknet about the sale of a database of clients of the largest Russian banks. The seller did not specify how many records he has on hand but assured that he is ready to upload 5 thousand lines of information per week. One of the Russian Newspapers had a screenshot of a test fragment of the Alfa-Bank database, which contains 64 lines. Each of them has the full name, city of residence, mobile phone number of the citizen, as well as the account balance and document renewal date. A newspaper managed to reach up to six clients using these numbers. Two of them confirmed that they have an account with Alfa-Bank and confirmed the relevance of the balance. Alfa-Bank confirmed that they know about the data leak of several dozen clients. The seller of Alfa-Bank's database said that he also has confidential information of clients of other credit organizations. "I can sell a database of VTB clients with a balance of 500 thousand rubles or m...

The National Security and Defense Council of Ukraine reported a leak of IP addresses of government websites

Image
The leaked list of hidden government IP addresses of government websites occurred in Ukraine. This is stated in the statement of the National Security and Defense Council (NSDC). It is noted that specialists of the National Cyber Security Coordination Center under the National Security and Defense Council of Ukraine have found in the DarkNet a list of almost 3 million sites using the Cloudflare service to protect against DDoS and a number of other cyberattacks. The list contains real IP-addresses of sites that are under threat of attacks on them. "The list contains real IP addresses of sites, which creates threats to direct attacks on them. Among these addresses are 45 with the domain" gov.ua" and more than 6,500 with the domain "ua", in particular, resources belonging to critical infrastructure objects",  specified in the message on the official website of the NSDC. According to Ukrainian experts, some data on Ukrainian sites are outdated, and so...

New Network Protocols Abused To Launch Large-Scale Distributed Denial of Service (DDoS) Attacks

Image
The Federal Bureau of Investigation issued an alert just the previous week cautioning about the discovery of new network protocols that have been exploited to launch large-scale distributed denial of service (DDoS) attacks.  The alert records three network protocols and a web application as newfound DDoS attack vectors.   The list incorporates CoAP (Constrained Application Protocol), WS-DD (Web Services Dynamic Discovery), ARMS (Apple Remote Management Service), and the Jenkins web-based automation software.  Three of the four (CoAP, WS-DD, ARMS) have just been exploited in reality to launch monstrous DDoS attacks, the FBI said dependent on ZDNet's previous reporting.   COAP  In December 2018, cyber actors began exploiting the multicast and command transmission features of the Constrained Application Protocol (CoAP) to lead DDoS reflection and amplification assaults, bringing about an enhancement factor of 34, as indicated by open-source repor...

Prometei: A Cryptomining Botnet that Attacks Microsoft's Vulnerabilities

Image
An unknown Botnet called "Prometei" is attacking windows and Microsoft devices (vulnerable) using brute force SMb exploits. According to Cisco Talos, these SMB vulnerabilities help in mining cryptocurrency. The botnet has affected around a thousand devices. It came in March; however, according to experts at Cisco Talos, the campaign could only generate a small amount of $5000 in four months of its activities. The botnet was working since the beginning of March and took a blow on 8th June. However, the botnet kept working on its mining operations to steal credentials. According to experts, the botnet is working for somebody based in Europe, a single developer. "Despite their activities being visible in logs, some botnets successfully fly under detection teams' radar, possibly due to their small size or constant development on the adversary's part. Prometei is just one of these types of networks that focuses on Monero mining. It has been successful in keeping ...

Critical Vulnerabilities Found in Chinese DJI Drones Android App

A serious vulnerability has been discovered in the Android app of DJI drones. As observed by the researchers, the vulnerability Critical Vulnerabilities Found in Chinese DJI Drones Android App on Latest Hacking News . from Latest Hacking News https://ift.tt/39BrwgL

Why Not Having An IT Insurance Can Get You In Trouble

As an entrepreneur or a professional, liability insurance is vital in protecting your company or employees of uncertain events such Why Not Having An IT Insurance Can Get You In Trouble on Latest Hacking News . from Latest Hacking News https://ift.tt/2CIs1K1

7 Cyber Security Challenges in 2020!

At one point, the internet has connected us to countless opportunities, on the other, it has also made us prone 7 Cyber Security Challenges in 2020! on Latest Hacking News . from Latest Hacking News https://ift.tt/2EqbWsT

How to look for holidays of any country using Public Holidays API

Holidays information can be difficult to maintain and can sometimes get in the way of building your products. Using Holidays How to look for holidays of any country using Public Holidays API on Latest Hacking News . from Latest Hacking News https://ift.tt/2WYImku

Protect Your Online Privacy – Six Steps You Should Take

The internet is a vast system of an interconnected network that provides information and communication anytime, anywhere. This 19th-century invention Protect Your Online Privacy – Six Steps You Should Take on Latest Hacking News . from Latest Hacking News https://ift.tt/39whcXj

How to Check Someone’s Call History Online for Free

Checking someone’s call history is something everyone dreams. From parents to people in a relationship, everyone wonders for getting their How to Check Someone’s Call History Online for Free on Latest Hacking News . from Latest Hacking News https://ift.tt/3f8BCqu

What is ransomware and how do we fight it?

First things first, what exactly is ransomware? It is a type of malware from crypto virology that encrypts and blocks What is ransomware and how do we fight it? on Latest Hacking News . from Latest Hacking News https://ift.tt/2X0aow2

Firefox expected to release a fix for their "Camera active after phone locks" bug this October

Image
A bug in Mozilla Firefox enabled websites to keep the smartphone camera active even after leaving the browser or locking the phone. The company is working on fixing the bug and are planning to release the fix around October this year. The bug was first reported by Appear TV, a video delivery platform last year in July. The bug activates when a user opens a video streaming app from their Mozilla Firefox browser in their Android smartphone. It was first noticed by Appear TV when the video kept playing in the background even when it should have stopped that is the video kept playing in the background even when the user moved out of the browser or pushed it to the background or locked the phone. This raised concerns over user's privacy and bandwidth loss. "From our analysis, a website is allowed to retain access to your camera or microphone whilst you're using other apps, or even if the phone is locked," said a privacy app, Traced in talks with ZDNet. "While ...

Botnet Activity Goes Down; Revived Emotet Suffers Hindrances in Operations by A Vigilante Hacker

Image
An anonymous vigilante hacker has been actively involved in obstructing 2019's most widespread cybercrime operation, Emotet that made a comeback recently. He has been sabotaging the malicious affairs and protecting users from getting affected by removing Emotet payloads and inserting animated GIFs at their places. Acting as an intruder, he replaced Emotet payloads with animated GIFs on certain hacked WordPress sites, meaning when victims would open the infected Office files, the malware would not be downloaded and executed on their computers, saving them from the infection. Emotet is a banking Trojan that was first spotted in the year 2014 by security researchers, it was primarily designed to sneak onto the victim's computer and mine sensitive data. Later, the banking malware was updated; newer versions came up with spamming and malware delivery functionality. Emotet is equipped with capabilities to escape anti-malware detection, it uses worm-like abilities that help it pr...

Gothic Panda and Stone Panda: Chinese Hackers that Launched Mass Cyber Attacks on Indian Companies

Image
Two Hacking groups from China named Gothic Panda and Stone Panda have been identified for organizing the majority of the cyber attacks on Indian companies in June 2020. Mumbai Mirror reported was the first to know about the incident. On 20th June, it published a report on its website regarding the issue. As per the cybersecurity experts, the word is that both the hacking groups are likely to work independently and not state-sponsored; however, they work in the interests of the Chinese government. According to experts, an anonymous source said that the attacks were launched under the disguise of VPN and Proxy Servers. After investigation, the attacks led us to Gothic Panda and State Panda, say the officials. Chinese hackers launched more than 40,000 attacks. The hackers had used some unique malware to gain confidential data of the companies and later used the information for extortion. According to the reports, the hackers broke into at least six private/public companies' safety...

Databases of users of Russian ad services Avito and Yula have appeared on the network

Image
Six files with tables in CSV format are in the public domain, which means that anyone can download them. Each file contains the data of about 100 thousand users (three databases with information from Avito users, and three more from Yula users). Each record contains information about the user's region of residence, phone number, address, product category, and time zone. The first database was uploaded to the hacker Forum on June 26, and the last one appeared there on July 22. Russian media writes that they confirmed the relevance of at least part of the published data by calling users at the specified phone numbers. A representative of Yula said that the uploaded files do not contain personal data of users of the service. "They only contain information that anyone could get directly from the site, or by parsing (copying using scripts) ads. Yula is extremely attentive to the security of our users and the safety of their data. We do not disclose information about addr...

Aberystwyth University and others affected by Blackbaud Global Ransomattack

Image
Aberystwyth University, a 148-year-old mid-Wales institution was attacked via a hack on Blackbaud, a US company that deals with education financial management and administration software.  It was among the 20 institutions that were affected by the ransomware attack including the University of York, Loughborough University, University of London, and University College, Oxford. The welsh university with an influx of 10,000 students every year said, "no bank account or credit card details were taken".  The ransomware attack occurred around May of this year and targeted Blackbaud which is associated with many education institutes thereby the attack sent shockwaves to at least twenty institutes from the US, UK, and Canada. The company did end up paying the ransom and said that, "confirmation that the copy [of data] they removed had been destroyed" but they were criticized for not informing about the hack and data risk to the victims until July that is after a mo...

Emergency Update Addressed Multiple Adobe Photoshop Vulnerabilities

Adobe have issued an out-of-band update right after the Patch Tuesday update bundle. This update addressed multiple vulnerabilities across different Emergency Update Addressed Multiple Adobe Photoshop Vulnerabilities on Latest Hacking News . from Latest Hacking News https://ift.tt/2BtH2i2

eSIM Swapping Fraud: Cyber Criminals Targeting Airtel Customers in Hyderabad

Image
Hyderabad witnessed three back to back cases of cyberfraud wherein criminals targeted Airtel customers promising them eSIM connection that led to a fraud of more than 16 lakh Rs. In the wake of the frauds, the Hyderabad cyber crime police station issued an advisory alerting Airtel customers regarding the fraudsters befooling people in the name of the eSIM connection. S. Appalanaidu, a resident of Miyapur, Hyderabad received a message on 11th July informing him that if he fails to update his KYC details, his SIM card would get blocked. “Dear Customer Your SIM Card Will Be Blocked in 24 hours Please Update Your eKYC verification Thanks”. The message read. Later, he received a phone call from a person acting to be a customer care executive for Airtel who asked Mr. Appalanaidu to forward the e-mail address sent by him to #121 i.e., Airtel customer care number, in order to get his KYC updated online. Reportedly, after forwarding the email-id, Mr. Appalanaidu got an auto-generated SMS...

Experts found targeted attacks by hackers from North Korea on Russia

Image
Kaspersky Lab revealed that the well-known North Korean hacker group Lazarus has become active in Russia. The attackers attack through applications for cryptocurrency traders in order to steal data for access to the wallets and exchanges. In addition, the group collects research and industrial data. Experts believe that hackers are particularly interested in the military-space sphere, energy and IT, and the interest in bitcoin can be explained by the need for North Korea  to bypass sanctions The first cases of Lazarus targeted attacks on Russia appeared at the beginning of last year. According to Kaspersky Lab,  since at least spring 2018 Lazarus has been carrying out attacks using the advanced MATA framework. Its peculiarity is that it can hack a device regardless of what operating system it runs on — Windows, Linux or macOS. According to Kaspersky Lab, the victims of MATA include organizations located in Poland, Germany, Turkey, South Korea, Japan and India, including a...

Houston consulate one of worst offenders in Chinese espionage, say U.S. officials

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits: Reuters The United States ordered the consulate closed this week, leading China to retaliate on Friday by telling the United States to shut its consulate in the city of Chengdu, as relations between the world’s two largest economies deteriorate. In a briefing for journalists, a senior State Department official linked espionage activity at the Houston consulate to China’s pursuit of research into a vaccine for the new coronavirus. The official said China had been very clear about its intent to be first to the market with a coronavirus vaccine. “The medical connections here aren’t lost on me and… the medical connection in Houston is also pretty specific,” the official said, without giving further details. A senior Justice Department official said it was accepted that consulates of all countries were b...

Shocked I am. Shocked to find that underground bank-card-trading forums are full of liars, cheats, small-time grifters

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits:  The Register The denizens of online forums dedicated to trading in stolen credit cards have been shown to be wretched hives of scum and villainy. This not-so-surprising news comes this week via academics at Washington State University (WSU) in the US, who eavesdropped on the activities of two marketplaces and read over 10,714 posts to those discussion boards. What they found was miscreants, from newly-registered accounts all the way up to the admins, are constantly trying to get one over on one another. We’re told only a small fraction of the crooks lurking on the boards were commercial traders buying and selling stolen cards for cybercrime use. Far more frequent were accounts that were looking for handouts – things like free credit-card lists, malware tools, and tutorials. “These fr...

BadPower Attack Can Burn A Device By Hacking Fast-Charging Devices

While fast-charging helps you use your device without charging breaks, it can potentially harm your device too. The feature isn’t BadPower Attack Can Burn A Device By Hacking Fast-Charging Devices on Latest Hacking News . from Latest Hacking News https://ift.tt/3jAlT72

DeepSource Reset Login Following Phishing Attack On Employee

Developer tools provider DeepSource has recently reset login credentials of employee accounts and users after a cyber attack. The incident DeepSource Reset Login Following Phishing Attack On Employee on Latest Hacking News . from Latest Hacking News https://ift.tt/32NZQE0

Most Popular Cybersecurity APIs for 2020

The latest technology has turned the world upside down, and of course, for good reasons. Speaking of Application Programming Interfaces, Most Popular Cybersecurity APIs for 2020 on Latest Hacking News . from Latest Hacking News https://ift.tt/3eU31fB

Discovery of a New Malware Framework and Its Linkages with a North Korean Hacker Group

Image
The discovery of a brand new malware framework and its linkages with a North Korean hacker group has heightened the panic within the digital world. Kaspersky, the cybersecurity company has already alerted the SOC groups of the discovery. Referred to as  "MATA," the framework has been being used since around April 2018, principally to help in attacks intended to steal customer databases and circulate ransomware. The framework itself gives its controllers the adaptability to target Windows, Linux, and macOS and comprises of a few components including loader, orchestrator, and plugins. Kaspersky associated its utilization to the North Korean group "Lazarus”, which has been engaged for a considerable length of time in 'cyber-espionage' and sabotage and, by means of its Bluenoroff subgroup, endeavors to collect illegal funds for its Pyongyang masters. The group was even pegged for WannaCry, just as refined attacks on financial institutions including the no...

Hackers Breached into Twilio's AWS; Company Confirms the Attack

Image
In a recent cybersecurity breach incident, Twilio acknowledges that hackers breached into the company's cloud services (unsecured) and compromised its javascript SDK. The hackers modified the javascript that the company shares with the clients. Twilio, a famous cloud communications company, told a news agency about the incident, after an anonymous whistleblower had reported the issue to the agency. To summarise it all, a cybercriminal breached into Twilio's AWS (Amazon Web Services) S3 systems. It should be noted that the networks were unsecured and world-writable. The hacker modified the TaskRouter v1.20 SDK and attached some malicious codes designed to tell if the changes worked or not. In response to the incident, Twilio says that the customer's privacy safety is the first and foremost concern for the company. Twilio confirms about the malware in the TaskRouter v1.20 SDK, and that it was the work of a 3rd party. The modification of the S3 bucket made the attack poss...

How to Increase the Security of Internal Company Communications

Security has been a significant concern for companies around the world for a very long time. However, the threats have How to Increase the Security of Internal Company Communications on Latest Hacking News . from Latest Hacking News https://ift.tt/3fUTcPV

Netwalker Ransomware Stole Data After Targeting Lorien Health Services

Maryland-based nursing home facility Lorien Health Services has disclosed a ransomware attack. The incident impacted the data of around 50 Netwalker Ransomware Stole Data After Targeting Lorien Health Services on Latest Hacking News . from Latest Hacking News https://ift.tt/2Bsqkjc

Cloudflare Outage Caused Numerous Websites To Go Down For Some Time

Last week, different websites went down in multiple states of the US. Though, people initially feared a cyber attack. However, Cloudflare Outage Caused Numerous Websites To Go Down For Some Time on Latest Hacking News . from Latest Hacking News https://ift.tt/30DFsTo

An IT expert at the Russian State Duma Explains Data Risks of Using VPN

Image
"To prevent hackers from getting personal data of users, users don't need to use a VPN connection in their daily life", said Yevgeny Lifshits, a member of the expert council of the State Duma Committee on Information Policy, Information Technology and Communications. He explained that a VPN is a virtual network that is supposed to protect the user's personal data from hackers. It is assumed that using this network allows users to maintain network privacy. However, according to the expert, VPN services carry more danger than protection.According to Lifshits, such services are not needed in everyday life. "Sometimes VPN services are necessary for work to transfer commercial data. In everyday life, they have no value." According to the expert, if a person does not commit crimes that he wants to hide with a VPN, then he does not need to protect himself.  Otherwise, passwords may end up in the hands of hackers. "A user installing a VPN believes th...

Cloud Provider Blackbaud Endured Ransomware Attack – Yet, Pays Ransom As Security

Joining the trail of ransomware attack victims, cloud service provider Blackbaud has now joined the list. The company disclosed a Cloud Provider Blackbaud Endured Ransomware Attack – Yet, Pays Ransom As Security on Latest Hacking News . from Latest Hacking News https://ift.tt/2ZNCA7c

Android Malware BlackRock Emerges As InfoStealer Targeting 300+ Apps

Head up Android users! A new Android trojan is active in the wild that pilfers your information. Dubbed BlackRock, this Android Malware BlackRock Emerges As InfoStealer Targeting 300+ Apps on Latest Hacking News . from Latest Hacking News https://ift.tt/3jwHVaI

Cisco Patched Numerous Critical Vulnerabilities In VPN Routers

Alongside Microsoft Patch Tuesday and other vendors, Cisco has also released fixes for numerous bugs. These include multiple critical vulnerabilities Cisco Patched Numerous Critical Vulnerabilities In VPN Routers on Latest Hacking News . from Latest Hacking News https://ift.tt/2OLvtpF

Australia: TikTok Undergoing Scrutiny Over Data Security Concerns

Image
Chinese video-sharing social networking platform, TikTok is undergoing scrutinization in Australia over data security and privacy concerns, according to the government sources.  TikTok is a free app where users can post a minute long videos of short dances, lip-sync, and comedy using a multitude of creative tools at their disposal. The platform differs from other social media platforms in ways where it allows navigation through videos by scrolling up and down instead of usual tapping or swiping.  Recently, the Bytedance owned, TikTok became a hot topic of discussion in both the offices of Home Affairs as well as Attorney-General; reportedly, the issue of privacy concerns drew more attention in the wake of the video-sharing giant opening an office in Australia.  Lately, the platform had been making headlines for 'national security concerns'  which was one of the major reasons for Prime Minister Scott Morrison to examine TikTok, he stated that if ther...

Multiple Verified Twitter Accounts Hacked For Promoting Crypto Scams

The past couple of days have been terrible for Twitter users as a coordinated cyberattack occurred. The attackers hacked various Multiple Verified Twitter Accounts Hacked For Promoting Crypto Scams on Latest Hacking News . from Latest Hacking News https://ift.tt/3hmHEFB

Russian Foreign Ministry urged whole world to abandon cyber attacks on healthcare facilities during a pandemic

Image
Against the background of the coronavirus pandemic, Moscow calls for an end to cyberattacks on healthcare facilities and critical infrastructure. This was announced on Monday, July 20, by the Russian President's Special Representative for International Cooperation in the Field of Information Security, Director of the Department of International Information Security of the Russian Foreign Ministry, Andrei Krutskikh. He stressed that Russia shares the opinion of many countries that the information and communication infrastructure in the health sector is needed. "We propose to secure the obligation for states to refrain from attacks not only on medical facilities, but also in general on the critical information infrastructure of institutions that provide vital public services," said Krutskikh. In particular, the diplomat noted the spheres of education, energy, transport, as well as banking and finance. In addition, he added that work on this will continue at the  Un...

Importance of Cybersecurity in the Healthcare Sector

Image
Hackers and cybercriminals have targeted the healthcare sector for a long time. Among the healthcare industry, hospitals are generally the primary target for hackers, as they generate a lot of money. The hospitals hold very sensitive information of the patients, including credentials and personal data, and the hackers can take advantage of that. Due to the coronavirus pandemic, hospitals have received a large number of funds from the government and other agencies to deal with the issue, and the hackers are after the money. The critical issue is that healthcare IT systems store patient credentials, including banking details, ID, and credit card details. Besides this, information such as patient's HIV details can be exposed, and cybercriminals can exploit for extortion. On the dark web, ID credentials can be sold for very profitable money, so the government and healthcare industry should take extra precautions to stay safe from cyber attacks. In the present pandemic crisis, blac...

5 Best Lightweight Free Antivirus for Windows 10

Are you worried about how you lost your essential documents from your system? Then maybe it was due to the 5 Best Lightweight Free Antivirus for Windows 10 on Latest Hacking News . from Latest Hacking News https://ift.tt/3jt526f

Can your trading account be hacked?

Cyber attacks and breaches are becoming common occurrences these days due to the exponential growth of Internet interconnections. The foreign Can your trading account be hacked? on Latest Hacking News . from Latest Hacking News https://ift.tt/2OJqlCb

Managing Cyber Threats is More Important than Ever

The internet now rules the world. Whether it’s smart phones, smart appliances, smart homes, self-driving cars, online shopping, posting pictures Managing Cyber Threats is More Important than Ever on Latest Hacking News . from Latest Hacking News https://ift.tt/3jt9lhB

Litigation Firm Discovers a New Phishing Scam Falsely Purporting To Be From Leading UK Supermarket

Image
A litigation firm discovered a new phishing scam falsely indicating to be from a leading UK supermarket Tesco.  The scam had utilized SMS and email communication planned to fool customers into handling over their subtleties, and steal classified and payment data.  The fraud started through an official-looking but fake Facebook page entitled 'Tesco UK' which shared images implying to be from a Tesco warehouse, showing stuffed boxes of HD television sets.  As per Griffin Law, the litigation firm, the message stated: “We have around 500 TVs in our warehouse that are about to be binned as they have slight damage and can’t be sold. However, all of them are in fully working condition, we thought instead of binning them we’d give them away free to 500 people who have shared and commented on this post by July 18.”  The firm stated that at least some 100 customers had responded to the Facebook page or received an email. The original fake Tesco Facebook page is cu...