Twitter Spammers abuse Google search
We reported few days ago about a new spam campaign that abuses open-redirect vulnerability in popular websites including CNN, Yahoo and Ask.com.Today, Security researcher Janne Ahlberg discovered...
View ArticleHandheld Malware Scanner made with Raspberry Pi
We learned earlier this year that U.S based power plant systems were infected with a malware after an employee used his infected USB drive to update software. Last year, the notorious Stuxnet worm was...
View ArticleNew 'KeyBoy' malware targets users from India, Vietnam
Security researchers have discovered a new piece of malware that targets users from India, Vietnam. The backdoor is designed to steal information from the victim.The malware campaign uses well-crafted...
View ArticleNew Variant of Zeus malware can automatically spread via USB flash drive
Here comes the new version of notorious ZBot which is capable of spreading via USB flash drive. Zeus/Zbot is the notorious banking trojan, has been around many years since 2007, that steals banking...
View ArticleZPanel security vulnerability allows hacker to reset the root password
A critical remote code execution vulnerability has been identified in ZPanel that allows hackers to reset the root password and gain access to the server.According to the forum post, the latest stable...
View ArticleSecurity Alert: Linux Kernel Privilege escalation exploit affects Android...
Android Operating System is based on the Linux, means the vulnerabilities affecting Linux kernel have the possibility of being exploited in the Android platform. It appears the recently discovered...
View ArticleLatest WordPress version 3.5.1 vulnerable to Denial of Service
A security researcher Krzysztof Katowicz-Kowalewski has discovered a critical DOS vulnerability in the latest version of Wordpress (v3.5.1) that allows cybercriminals to cause Denial of service.The...
View ArticleiOS 7 Beta Hack allows anyone to Bypass iPhone Lockscreen
Every time Apple attempts to improve the security in the new version of iOS, it ends up with a new security bug.Here comes another iPhone hack to bypass the iOS Lock Screen. A Spanish iPhone users...
View ArticleGamarue malware abuses SourceForge to host malicious files
One of the leading source code repository SourceForge is found to be abused cybercriminals to host their malicious files which is later being used by the Gamarue malware.In their malware analysis...
View ArticleResearcher found a way to Hack Facebook accounts with the help of Quora
An Indian Security researcher Prakhar Prasad has found a way to hack the facebook accounts by exploiting an open redirection flaw in Quora - one of the famous Question&Answer website.Quora allows...
View ArticleMumbai Police salary accounts hacked, Money withdrawn in Greece
Cybercriminals have reportedly targeted the Salary accounts of Mumbai Police and managed to withdraw money from their account.According to NDTV report, cybercriminals have managed to withdraw money...
View ArticleCNN's Political Ticker website hacked, Fake News article posted
Hackers breached CNN's Political Ticker blog(politicalticker.blogs.cnn.com) and manged to post false news story titled "Anonymous Bitcoin operator Btc-e.com goes out of business". The fake news was...
View ArticleHacking the Hackers :Carberp Panel vulnerable to Remote Code Execution
Recent Carberp source code leak gave an opportunity for researchers to investigate the bootkit and other components of the Trojan. While everyone are looking at the source code of malicious parts, a...
View ArticleIncapsula Login Protect - Boost Your Website Security with Two Factor...
Exclusive: You want to Protect your Admin Panel and Feeling just a password is not good enough to secure your website? Here, Incapsula is introducing a newest security feature "Login Protect" to boost...
View ArticleCrypted Files in Cyber Espionage
Cryptors are programs which are used for making files FUD(file undetect by antivirus)The cryptor can make a EXE file not detectable by antivirus. Most cryptors are common and once u buy license can be...
View ArticleUbiSoft website hacked, urges users to change passwords
Ubisoft, a French global video game publisher and developer,has confirmed the security breach on their website and sent out email to their customers urging them to change the passwords. "We instantly...
View ArticleSecurity Engineer claims Motorola Collecting Sensitive data from Droid X2
Ben Lincoln, a Security Engineer claims that his Motorola Droid X2 Device is sending sensitive data such as username, email id, password & GPS Coordinates to the website owned by Motorola.What is...
View ArticleFingerprints may now needed to get new SIM cards in India
Fraudulent SIM cards being circulated through small retailers poses a potential risk to the National Security. To bring end to misuse of the SIM Cards and reduce security issues, the Home Ministry has...
View ArticleSouth Korean Defense Ministry Bans Smartphones usage to prevent Military data...
South Korean Defense Ministry is banning their staffs from using the Interent connectivity and Camera functions inside the Ministry's building in a move to prevent the Military information leaks,...
View ArticleAndroid Vulnerability allows hackers to Turn Legitimate Application into Virus
All Android applications contain a signature which helps the Android to determine if the app is legitimate and to make sure the apk hasn't been tampered with or modified.Security Researchers from...
View Article