Spies hack airwoman’s Tinder account to steal secrets of F-35 fighter jet
Since news about the Fighter Jet F-35 surfaced online, several hacking attempts have been utilised to discover some of the secrets of this pricey £9billion aircraft. The most recent one involves...
View ArticleMicrochip Security Flaw inside Samsung Galaxy S7 smartphones
A security flaw inside a microchip of the Samsung’s Galaxy S7 smartphones has put millions of devices at risk of being spied by the hackers, say security researchers.Initially, Samsung phones were...
View ArticleHackers attacked the famous Russian media for the second time
In the spring of 2018, hackers infected Russian-language News sites with the banking Trojan Buhtrap. The virus was spreading through watering-hole attacks.Criminals hid the virus on the main pages of...
View ArticleA New Malicious Campaign Whip Around $60,000 of Bitcoin
July 2018, saw the reports of a recently discovered malicious campaign by the Fortiguard Labs. The campaign "Bitcoin Stealer" is as of now held responsible of stealing roughly $60,000 worth in Bitcoin....
View ArticleAll BBC websites blocked in China
The British Broadcasting Corporation’s (BBC) websites and mobile application are all currently blocked in China, following a decision by the corporation to change the website's format from HTTP to the...
View ArticlePulkovo Airport's air-traffic control system malfunctioned after receiving...
On August 8th, the Air-Traffic control system "Galaxy" in the international airport "Pulkovo" (Saint Petersburg, Russia) is malfunctioned. The system controls the movement of aircraft in the area of...
View ArticleWhatsapp Flaw Lets Attackers Alter Messages in Chats
An Israel based cybersecurity firm Check Point, claims that they have unearthed a flaw in WhatsApp that could be used to intercept and alter messages sent in group conversations as well as private...
View ArticleNew mechanism for computer hacking
Top cyber threat experts will rub shoulders on Wednesday in Last Vegas to dwelt at length the artificial intelligence technique that could help the hackers bypass the multi layered security measures....
View ArticleFacebook Messenger: A Weapon of Cyber Scoundrels?
Facebook Messenger: A Weapon of Cyber Scoundrels?According to what FBI has warned about, Facebook Messenger is being used by cyber crooks to entrap the users into opening malicious links.These links...
View ArticleAmazon Web Service Error exposes GoDaddy's 31000 servers
An unsecured Amazon AWS bucket configuration has exposed exclusive information about the world's leading host provider company GoDaddy.In June, cybersecurity firm UpGuard’s risk analyst Chris Vickery...
View ArticleAttackers Targeting Dlink DSL Modem Routers ; Exploiting Them To Change The...
A recent research has found attackers to be resorting to targeting DLink DSL modem routers in Brazil, with a specific end goal to exploit their DNS settings, which at that point enables them to...
View ArticleInfamous Belarusian Hacker "Ar3s" behind Massive Andromeda Botnet Released
Sergei Yaretz, 35-year-old, one of the most wanted hackers from Belarus who was arrested in last December has been released. It is reported that this is the first time in Belarus there was a process...
View ArticleKorean trojan spreading tentacles
A newly discovered ‘Key Marble’ strikes the cyber world causing huge concern for millions of internet users these days. The north korean Trojan, according to what the cyber security experts claim,...
View ArticleHacking a brand new Mac during setup process
Planning to get a brand new Mac that is free from all kind of bugs and has a robust security system, but there is no such device.According to security researchers, a brand new Mac could be easily...
View ArticleHacker bribes Czech Police in effort to get the seized hard drive containing...
Hacker Peter Krzhystka, who is accused of cyber-fraud, offered a bribe to police officer at 384 million kroons (17 million USD) for the return of the hard drive that was seized during the search....
View ArticlePolice body cameras can be easily hacked
Body cameras used by the law enforcement nowadays have already remained controversial but no one has, so far, attempted to assess the credibility of the device itself. But, a demonstration at Defcon...
View Article‘Man-In-The-Disk’: The New Cyber Monster!
‘Man-In-The-Disk’: The New Cyber Monster!The most common android applications have been noticed to be susceptible to a recent cyber-attack of the name “Man-in-the-disk”. This extraordinarily named...
View ArticleFlaw In the Amazon Echo; Allows Hackers to Listen In To Users’ Conversations
Security researchers from the Chinese tech giant Tencent as of late discovered a rather serious vulnerability in Amazon Echo. The vulnerability is termed serious on the grounds that it enables...
View ArticleAn unknown Malware led to loss of Rs 94 crores in Two days from a Pune-based...
Hackers transferred over Rs 94 crores from a 112-year-old Pune-based Cosmos Co-operative Bank through a malware attack that was directed on the server of the bank and on its thousand's of debit...
View ArticlePersonal Data Leakage of Russian Railways Passengers
Pavel Medvedev, a specialist in search engines of Rush Agency, came to the conclusion that users of sites of such large companies as Russian Railway, VTB Bank, Sberbank, as well as the Moscow city...
View Article