Researchers discover Malware Samples Designed to Exploit CPU Vulnerabilities
As of late scientists have found more than 130 malware samples intended to misuse the recently disclosed Spectre and Meltdown CPU vulnerabilities that enable pernicious applications to sidestep memory...
View ArticleGPS jammers - an emerging cause of worry
The annual Red Flag war exercise by the US Air Force will cause disruptions in the GPS and navigation systems of many commercial flights in the region according to Foxtrot Alpha. In some cases...
View ArticleSecurity Flaw in Oracle POS systems discovered
Researchers at ERPScan have discovered a new security flaw in the Oracle Micros Point-of-Sale (POS) systems that has left over 300,000 systems vulnerable to attack from hackers.It was discovered in...
View ArticleSmell of doubt in Bitcoins online
The cybersecurity experts claimed to have unearthed a huge scam where the ransomware authors and their victims are left cheated even in Bitcoin. Thus, a hefty amount sent to someone in the most...
View ArticleWill the next cold war be fueled by AI?
It is easy to confuse the current geopolitical situation with that of the 1980s. The United States and Russia each accuse the other of interfering in domestic affairs. Russia has annexed territory over...
View ArticleTinder Vulnerability Lets Anyone Snoop Over Users Swipe, Match and Photos
An Israeli security firm Checkmarx has found two critical vulnerabilities in the popular dating app Tinder that enable hackers to keep a hawk eye on all your moves.The firm has released a report...
View ArticleLeaked US Army Cyber Protection Brigade Memorandum appears to show Privacy...
The picture being referred to is a leaked picture of a memorandum on image board 4chan, complete with Department of Defence letterhead, seeming, by all accounts, to be from the United States Army’s...
View ArticleSecurity hole in Microsoft Windows PC
More and more startling facts seem to havesurfaced leaving more space for the experts to step up research to counter the threat.Till the other day the security hole was not known to the hackers have...
View ArticleCyber-criminals using Porn to lure users
Porn images and videos are being used as a tool by cybercriminals to trap the users in shady scams designed to steal money and private information.Cybersecurity researchers have found out that...
View Article2 Gujarat Ration Shop Owners Held for Aadhaar Fraud
The Gujarat Police on Friday arrested two owners of government-funded ration shops, or “fair price shops”, in Surat for allegedly committing fraud using stolen biometric data to pilfer subsidised...
View ArticleEmail account of Landmark CEO hacked
The executive director of a retail fashion brand, Lifestyle International filed a complaint with the cyber crime police and alleged that the email account of the chief executive officer (CEO) of the...
View ArticleA New Botnet Targeting to Infect Android Devices with Malware that Mines the...
Another botnet showed up over the weekend on Saturday, February 3 focused entirely on Android gadgets precisely being port 5555, which on gadgets running the Android OS is the port utilized by the...
View ArticleLuminosity Link RAT taken out by cops
A hacking tool allowing cybercriminals to remotely and surreptitiously gain complete control over a victim’s computer is no longer available as a result of an UK-led operation targeting hackers linked...
View ArticleScarabey Ransomware threatens users to delete 24 files every day till you pay...
A different kind of the malicious Scarab ransomware has been spotted by the security researchers. The new version of the ransomware is being spread by a weak secured Remote Desktop Protocol (RDP)...
View ArticleHow Petya worked
Rapid cyberattacks like Petya (aka NotPetya) and WannaCrypt have reset our expectations on the speed and scope of damage that a cyberattack can inflict. The Microsoft Enterprise Cybersecurity Group...
View ArticleGovernment admits flaws of Aadhaar
The central Government has admitted that there had been number of fraudulent cases in which money has been withdrawn from Public Sector bank accounts using the customers' Aadhaar number.On Tuesday,...
View ArticleAutoSploit: The New Hacking Tool
Hackers have no dearth of tips to strike. Hacking tools also behave differently having both positive and negative impacts. They keep changing the hacking programmes giving the cyber experts sleepless...
View ArticleA New Trick discovered to block Visitors and Scare Non-Technical Users into...
The administrators of some technical support scam websites have discovered a new trick to block visitors on their shady sites and scare non-technical users into paying for unneeded programming or...
View ArticleHacker Group threatens students and schools
According to a warning issued by the Cyber Division of the FBI and the Department of Education's Office of the Inspector General on 31 January, a hacker group called “TheDarkOverlord” (TDO) has tried...
View ArticleConsumers Report: Smart TV's Vulnerable to Hacking
Millions of smart TVs and other streaming devices could be easily exploited by cybercriminals as they have several security vulnerabilities.In an extensive investigation survey done by the Consumer...
View Article