BLOCKCHAINS BEING REPLACED BY SAFEBOX IN CRYPTOCURRENCY
(pc-Google Images)Thanks to the presence of tech-enthusiasts, one needs to possess many cryptocurrencies that are rather inaccessible for average users. PascalCoin – a new cryptocurrency – is already...
View ArticleUIDAI REPORTS BREACH IN BIOMETRIC DATA FROM AADHAAR ACCESS
(pc-Google Images)A case of Aadhaar data breach has resulted in serious privacy concerns and raised questions over the security of the much spoken biometric data in possession of the Unique...
View ArticleBACKEND PROVIDER LEAD TO BREACH IN CARD DETAILS OF 40 COMPANIES
(pc-Google Images)Shoppers of 40 online stores have gotten their bank card numbers and addresses captured by a malware infection at backend provider Aptos.The security breach occurred during the end of...
View ArticleRANSOMWARE ATTACKS AT LARGE WITH 752% HIKE IN 2016
(pc-Google Images)2016 was indeed the year of online extortion. Cyber threats reached an all-time high with more than thousand attacks every month, ransomware and Business Email Compromise (BEC) scams...
View ArticleFBI ADVISES CIVILIANS TO FIGHT AGAINST RANSOMWARE ATTACKERS
(pc-Google Images)Being attacked by a ransomware virus can be as terrifying of an experience as anything for both citizens and business owners as well. The threat of losing years’ worth of data and...
View ArticleWINDOWS MALWARE INFECTING ANDROID APPS THROUGH PLAY STORE
(pc-Google Images)Researchers are scratching their heads over the mystery where 132 Android apps in the official Google Play store attempted to infect smartphones with Windows malware.The apps, which...
View ArticleWikileaks released data trove of CIA hacking secretes
On Tuesday, WikiLeaks released an extensive data trove that contained documents which prove that Central Intelligence Agency (CIA) had spying operations and hacking tools.The operation was codenamed,...
View ArticleCIA created and lost malware for iOS, claims Wikileaks
WikiLeaks has targeted CIA yet again in a new data dump about its technical capabilities when it started its new series of leaks on the U.S. Central Intelligence Agency on Tuesday (March 07). The code...
View ArticleInterview with Security Researcher Arthur Garipov
At the recent nullcon conference, E-Hacking News had the chance to interview Arthur Garipov, Senior Research Specialist at Positive Technologies, who presented his research on "Drone and IoT Hacking"...
View ArticleThe tech giants react to CIA dump
The series of documents leaked by WikiLeaks against CIA is reported to have made use of previously unknown flaws in Apple's iOS operating system.Over this issue, several of the tech firms whose...
View Article20% of the dark websites shut down by an anonymous hacker
Recently 20% of the dark web websites have been taken off by a hacker claiming to be from the very famous Vigilant group know as 'Anonymous'. The dark web is associated with the illicit content,...
View ArticleVulnerability found in Service module of Drupal
When a team of researchers from Ambionics audited the Service module of Drupal, they found an insecure use of unserialize(). Using this vulnerability the exploiters could easily exploit SQL injection...
View ArticleNo app can stop CIA from reading your messages, says Pavel Durov
In an article titled "What does the "Year Zero" and "Vault 7" stuff from Wikileaks mean?", Pavel Durov, the Founder of social network Vkontakte and messenger Telegram, explained how CIA can read your...
View ArticleSmart Machines during escalating Cyber Warfare
Cyber warfare is rapidly increasing not just on companies, but nowadays there is no personal privacy or security either which is soon to turn worse. There is a gaping hole of trained workers in the...
View ArticleInterview with BugsBounty.com founder Himanshu Sharma
We had a chance to interview Himanshu Sharma, Founder of BugsBounty.com he has found security bugs in top organizations including Google, Facebook, Apple etc.How did you get interested in the field of...
View ArticleEuropol blames technology behind ‘all serious crime’
In a new report, Europe’s police agency has warned that new and emerging technologies are being used by criminal gangs operating in nearly every aspect of the crime.“Technology is a key component of...
View ArticleUK Political Parties next target for Russian Hackers
Spies at the Government Communications Headquarters (GCHQ) has issued a warning and called an emergency meeting of all the leaders of Britain’s political parties against the hacking threats from...
View ArticleRansomware, Banking Malware, DDoS attacks are UK’s top frauds
UK’s national law enforcement and police agency, National Crime Agency (NCA) officially announced that bitcoin ransomware, banking malware, distributed denial of service (DDoS) and business email...
View ArticleMore than 33 million US employee records leaked
A database containing more than 33 million records of corporate and government employees has been leaked online from a huge commercial corporate database which includes information like names, job...
View ArticleHackers from Russia and Canada accused of hacking Yahoo: US Justice Department
The US Department of Justice accused hackers from Russia and Canada for hacking Yahoo back in 2013, reported March 15 Bloomberg.An unnamed source provided the data which shows that there are four...
View Article