Google Maps vulnerability abused by hackers to fedirect users to malicious...
A major problem is in the store for the Google map users much to the mileage of the cyber criminals on the wait. Top cyber security experts, of late, have started talking of a major vulnerability in...
View ArticleNew Facebook-Spread Malware mines for cryptocurrency and steals social media...
A new malware campaign has been discovered on social media which spreads through via Facebook is stealing users social media credentials...
View ArticleThe Exploitation of Rowhammer Attack Just Got Easier
With an increase in the number of hacks and exploits focused solely on fundamental properties of underlying hardware, Rowhammer, is one such attack known since 2012 which is a serious issue with recent...
View ArticleEE left a critical code system exposed
EE, a British mobile network giant owned by BT Group has been accused of leaving a critical code repository on an open-source tool protected by a default username and password. The company has over 30...
View ArticleResearchers Demonstrate How To Bypass Two-factor Authentication
We are switching to Two-factor authentication (2FA) for securing our data and system, but does it provide fool-proof security?No, according to Kevin Mitnick, a security researcher at KnowBe4 it is very...
View ArticleIBM eschews removable memory devices
The International Business Machines has restricted its employees from using SD cards, flash drives and USB sticks fearing security breach even as the cyber security experts have called it an...
View ArticleTexas police department server again attacked by ransomware
Ransomware attack again took place on the Riverside Fire and Texas Police department computer server on May 4. The police department had already lost around 10 months of sensitive data related to...
View ArticleNew Malware Variant Designed To Swindle Financial Data from Google Chrome and...
Researchers have as of late discovered Vega Stealer a malware that is said to have been created in order to harvest financial information from the saved credentials of Google Chrome and Mozilla Firefox...
View ArticleMalicious apps return to Google play Store
Security researchers from a software company, Symantec, recently discovered two new sets of malicious apps on the Google Play store. The first set of seven apps seems to have been re-uploaded under...
View ArticleBT and Europol sign agreement to share cybersecurity intelligence data
The European Union Agency for Law Enforcement Cooperation (Europol) and communications company BT have joined forces in an agreement to exchange threat intelligence data.A Memorandum of Understanding...
View ArticleUPnP buys more bad name
Universal Plug and Play Networking Protocols takes the centre-stage of yet another controversy forcing the Infosec fraternity to keep themselves away from the set of networking protocols. After a...
View ArticleA Command Injection Critical Vulnerability Discovered In DHCP
The Dynamic Host Configuration Protocol (DHCP) client incorporated in the Red Hat Enterprise Linux has been recently diagnosed with an order infusion vulnerability (command injection ), which is...
View ArticleRIG EK delivers Grobios trojan
Exploit kit activity has been declining since the latter half of 2016, but we do still periodically observe significant developments in this space and the RIG EK seems to buck the trend. It’s been...
View ArticleCisco warns of critical bugs in DNA center
Cisco released a list of 16 security advisories on May 16, including three critical flaws in Digital Network Architecture (DNA) Center that rated a 10/10 on the CVSS (Common Vulnerability Scoring...
View ArticleStalinLocker: ransomeware deletes data if correct code is not put in time
A new ransomware has been discovered called StalinLocker, or StalinScreamer, that gives victims of the attack 10 minutes to put in the correct unlock code and if they’re not able to do that, erases all...
View ArticleIntimate data of 3 Million Facebook Users Exposed
Personal data of more than three million people were exposed online for four years by a personality app, called as myPersonality.The app collected the intimate details of the Facebook users and can be...
View Article200 Million Data sets sold on 'dark web'
A data security firm has allegedly found a group of a hacker who is operating out of China has been seen selling the data of around 200 million Japanese users on the so-called dark web.According to a...
View ArticleStudents Hack Student Information System; Change Attendance, Grades, and...
Two students at Bloomfield Hills High School are the main suspects of a hack into the school’s Student Information System called MISTAR. The students are believed to have made changes to the grades,...
View ArticleBeware of ZipperDown
Yet another stunning revelation fetches no less fear of vulnerability in the cyber world forcing the security experts to step in. A recent programming error has suggested a zipper down, a new...
View ArticleMultilingual Malware Targets Android Devices for Phishing Attacks
A blog post titled 'Roaming Mantis uses DNS hijacking to infect Android smartphones' was published in April 2018, by the Kaspersky Lab, which spoke particularly about this Malware. The malware i.e....
View Article