<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>
23
Oct 2019

Microsoft Announces Hacking Award for De-Bugging Election Software

Microsoft Announces Hacking Award for De-Bugging Election Software

Unbiased election is the backbone of any democracy.

However that seems to be only a constitutional fact with no implication in reality.

In the present political scenario the possibility of fair elections is diluted in scams and scandals across the globe raising a big question on the transparency of international political standards.

Be it the American voting machines or the Indian EVMs no voting infrastructure is free of manipulative software altering results, endangering nations and tarnishing the system.

But there is always a light at the end of the tunnel.

Microsoft has, in MAY 2019, released 'a free, open-source software development kit (SDK) called ElectionGuard' for a comprehensive verification of votes. It serves a threefold purpose of
  • End to end election verification
  • Open results to third parties for secure validations
  • Confirm correct counting of votes

In order to ensure smooth and secure working of the Election Guard, Microsoft has launched the ElectionGuard Bounty program inviting security experts across the world to detect and delete bugs, viruses and other type of vulnerabilities in the SDK system.

As a part of the defending democracy program this initiative asks security professionals like cyber security practitioners, part-time hobbyists, or students to discover crucial vulnerabilities in the ElectionGuard and share them with Microsoft under the Coordinated Vulnerability Disclosure (CVD) against a reward of $15,000 for every important discovery.

Read more about the hacking outrage in US elections here https://thehackernews.com/2016/12/russian-hacker-us-election.html

For knowing more about the perks of being a cyber security professional click www.isoeh.com/exclusive-blog.html

17
Oct 2019

October 2019 patch Tuesday information updated by Microsoft

October 2019 patch Tuesday information updated by Microsoft

Microsoft has just recently released its October 2019 patch Tuesday security updates in order to correct a total of 59 vulnerabilities in windows operating systems and associated software. Out of all the enlisted vulnerabilities 9 are rated as critical, 49 important and 1 average in severity.

The silver lining about this month's security update is that none of the cyber vulnerabilities patched this time is listed publicly or under active hacking attack.

Two of the critical vulnerabilities patched this month are remote code execution flaws in the VBScript engine. Both exist in how VBScript handles objects in memory, thus helping attackers to corrupt memory and execute arbitrary code for the current user.

The two vulnerabilities, namely CVE-2019-1238 and CVE-2019-1239, can be exploited remotely by cajoling victims into visiting a specially crafted website through Internet Explorer.

A hacker can go about his hacking intention using these issues with the help of an application or Microsoft Office document by embedding an ActiveX control marked 'safe for initialization' that utilizes Internet Explorer rendering engine.

System administrators are advised to employ the latest security patches to keep their systems free of cyber crimes and unlawful intrusions.

https://msrc-blog.microsoft.com/2019/10/08/october-2019-security-updates-are-available/

Visit www.isoah.com to know more about different anti hacking services on offer to keep your digital infrastructure secure from unprecedented attacks.

16
Oct 2019

Yahoo Mail Hacked Off Its Modesty, By Its Former Employee

Yahoo Mail Hacked Off Its Modesty, By Its Former Employee

Reyes Daniel Ruiz, an ex-Yahoo employee has been accused of hacking into a multitude of email accounts owned primarily by young women belonging to the Yahoo domain, for taking a sneak peek into their private photographs and videos, to which he confessed.

The number of email accounts which this former yahoo engineer has violated the privacy of is a whopping 6000. The accused was already charged with issues of online hacking and intercepting a wire communication in April.

Most of the victim of his unauthorized intrusion were strangers in the web world while some were his friends and acquaintances. The photographs and videos that were gathered were not only sourced from Yahoo accounts but also from other sites like Facebook, icloud, Dropbox and Gmail among others.

Though he tried to hide his crime by destroying the drive in which he stored his hacked stuff, by then Yahoo had become suspicious of his activities.

This incident is in line with 2013 and 2014 scams of massive breach of privacy on part of Yahoo. Hence the need for cyber security cannot be over emphasized no matter how authentic the domain may be.

Read more to ensure your cyber security: www.isoah.com/5-smart-ways-to-maintain-your-digital-privacy1.php

Click on to avail better services against hacking: www.isoah.com

15
Oct 2019

Email servers exposed to remote attacks, patch released

Email servers exposed to remote attacks, patch released

A crucial security issue has been found out and addressed in the open source Exim email server software with the help of which a hacker can bombard any particular server with malicious codes or just conduct a crash.

Exim administrators released an emergency security update called Exim version 4.92.3 on the 30th September giving system administrators an early intimation on its upcoming security patches that extends on all versions of the email server software from 4.92 including then-latest version 4.92.2. Administrators are advised to install the latest Exim 4.92.3 version immediately, since there is no known mitigation to solve the threat.

Known as CVE-2019-16928 and discovered by Jeremy Harris of Exim Development Team, the problem is a heap-based buffer overflow (memory corruption) issue in string_vformat defined in string.c file of the EHLO Command Handler component.

It could allow remote attackers to engineer a denial of service (DoS) situation or release any arbitrary code on a targeted Exim mail server using a specially drafted line in the EHLO command with the rights of the targeted user.

<>The Indian School of Anti Hacking is well versed in locating such system vulnerabilities with its expert team of anti hacking audits. Click www.isoah.com to know about us.

25
Sep 2019

Google Takes a Giant Step with Digital India

Google Takes a Giant Step with Digital India

Google, the Mountain View based internet giant has just announced its big leap for digital India. During its famous flagship 'Google for India' event it has announced launching an 'Artificial Intelligence' or AI laboratory in Bengaluru for creating products not just for India but also for the rest of the world. The laboratory will be led by Manish Gupta, a student of SEM or Society for Experimental Mechanics.

If you wish to know more about AI, please reach our other tutorial article www.isoeh.com/tutorial-details-artificial-intelligence-machine-learning-what-s-the-difference-between-them.html or check out our ML Course at www.isoeh.com/machine-learning-using-python.html

23
Sep 2019

RBI Restricts Unauthorized Sharing of Credit Information

RBI Restricts Unauthorized Sharing of Credit Information

The Reserve Bank of India has taken a big step forward towards securing confidential financial data from being exposed to unidentified external entities. It has restricted commercial banks and non-banking lenders from allowing access to consumer data owned by credit bureaus to 'unregulated entities'. It has further issued a letter to banks and NBFCs in which the RBI said that it observed agents appointed and allowed access to the database of credit information companies. Such an act violates the provisions of the Credit Information Companies (Regulation) Act, 2005 (CICRA). The Reserve Bank further warned the defaulting organizations of serious consequences in case of further repetition of such an act.

We at ISOAH or the Indian School of Anti Hacking specialize in providing cyber security to corporate data bases with our expert network auditing team. Do visit www.isoah.com to know more about our services.

26
Feb 2019

Govt proposes body to identify pirated websites, cut their revenue sources

Govt proposes body to identify pirated websites, cut their revenue sources

A FICCI and E&Y study in March 2018 estimated that the film sector alone loses $ 2.8 billion of its total revenue to online piracy.

To contain online distribution of pirated content, the draft national e-commerce policy has proposed setting up a body of industry stakeholders to identify websites that host infringing content, in an effort to curtail their advertising and subscription revenue.

The draft e-commerce policy released on Saturday said that Internet service providers shall remove or disable access to the websites identified in the IWL within set time-lines, payment gateways shall not permit flow of payments to or from such rogue websites, search engines shall take necessary steps to remove websites in their search results and advertisers or advertising agencies shall not host any advertisements on them.

24
Feb 2019

70000 Pakistani banks' cards with PINs go on sale on the dark web

70000 Pakistani banks' cards with PINs go on sale on the dark web

Group-IB experts discovered new databases with a total of 69,189 Pakistani banks' cards that have shown up for sale on the dark web. The total market value of the databases is estimated at nearly 3.5 million USD.

According to Group-IB data, it is the second big sale of Pakistani banks' cards in the past 6 months, which may indicate the activity of advanced financially motivated threat actors in the region.

Group-IB Threat Intelligence team has discovered two new databases with tens of thousands of Pakistani banks' cards that were releases on Joker's Stash, one of the most popular underground hubs of stolen card data, at the end of January 2019. 96% of all card dumps, unauthorized digital copies of the information contained in magnetic stripe of a payment card, were related to a single bank – Meezan Bank Ltd. Pakistani banks' cards are rarely sold on underground cardshops. This, and the fact that all the cards came on sale with PIN codes explains the high price, which was kept at 50 USD per card, while usually the price per card on dark web forums ranges from 10 to 40 USD.

24
Feb 2019

ATM Hacking has got easy, WinPot malware comes into play

ATM Hacking has got easy, WinPot malware comes into play

As detailed by Kaspersky Lab, so-called WinPot malware afflicts what the security researchers describe only as a "popular" ATM brand.

To install WinPot, a hacker needs either physical or network access to a machine; if you cut a hole in the right spot, it's easy enough to plug into a serial port. Once activated, the malware replaces the ATM's standard display with four buttons labeled "SPIN"—one for each cassette, the cash-dispensing containers within an ATM.

Below each of those buttons, it shows the number of bank notes within each given cassette, as well as the total values. Tap SPIN, and out comes the money. Tap STOP, and well, you know.

21
Feb 2019

New Vulnerabilities Found in Top Password Managers

New Vulnerabilities Found in Top Password Managers

Top password manager products have fundamental flaws that expose the data they are designed to protect, rendering them no more secure than saving passwords in a text file, according to a new study by researchers at Independent Security Evaluators (ISE).

More than 60 million individuals 93,000 businesses worldwide rely on password managers. ISE researchers revealed serious weaknesses with top password managers: 1Password, Dashlane, KeePass and LastPass.

One major finding was that, in certain instances, the master password was residing in the computer's memory in a plaintext readable format -- no safer than storing it in a document or on the desktop as far as an adversary is concerned. Users are led to believe the information is secure when the password manager is locked. Though, once the master password is available to the attacker, they can decrypt the password manager database -- the stored secrets, usernames and passwords. ISE demonstrated it is possible to extract master passwords and other login credentials from memory while the password manager was locked.

18
Feb 2019

Latest RBI Alert: This app can steal all money from your bank account, never download

Latest RBI Alert: This app can steal all money from your bank account, never download

If you are suggested to download an app called "AnyDesk" through social media or any other channel then do not do this. After downloading this app, your bank account may become empty within minutes.

Reserve Bank of India (RBI) has issued a warning in this regard. "AnyDesk" is a software that can do transactions from your bank account through your mobile or laptop.

The alert was issued by the RBI's cybersecurity and IT examination cell. It said that once the app is downloaded on a mobile phone, it seeks permission to access control of the phone like other applications.

However, when the permission is granted by a user, AnyDesk app allegedly steals confidential data on the phone to carry out fraudulent transactions through other payments app available on the phone.

17
Feb 2019

Google, Amazon want smart home devices to mine even more of your data

Google, Amazon want smart home devices to mine even more of your data

For several years, Amazon and Google have collected data every time someone used a smart speaker to turn on a light or lock a door. Now they're asking smart-home gadget makers such as Logitech and Hunter Fan to send a continuous stream of information.

Even gadgets as simple as light bulbs could enable tech companies to fill in blanks about their customers and use the data for marketing purposes. Having already amassed a digital record of activity in public spaces, critics say, tech companies are now bent on establishing a beachhead in the home.

14
Feb 2019

Google Reveals How Much They Paid Out Under Their Bug Bounty Program in 2018

Google Reveals How Much They Paid Out Under Their Bug Bounty Program in 2018

Last year (2018), Google paid out $1.7 million to security researchers who discovered bugs in the Android and Chrome systems.

The program was designed to help Google find flaws in its systems and to encourage researchers to report issues before they could be exploited. Financial rewards for reporting these bugs range from $100 to $200,000 depending on the risk level of the flaw.

In total, Google said they had paid out $3.4 million in rewards in 2018, $1.7 of which was for vulnerabilities found in Android and Chrome. Google said the program has paid out a total of $15 million since it was launched in 2010.

12
Feb 2019

MetaMask – First Copy-and-Paste Hijacking Crypto Malware Found in Google Play

MetaMask – First Copy-and-Paste Hijacking Crypto Malware Found in Google Play

The main purpose of the app is to steal the victim's credentials and private keys to gain control over the victim's Ethereum funds.

The clipper hijacking malware use to intercept the contents of the clipboard and replaces it with the content the attackers want to have.

Generally, the cryptocurrency wallets contain a long string of characters for security reasons, users use to copy and paste the strings instead of typing it. The clipper malware in Google Play impersonates as the metamask service that allows you to run the Ethereum dApps right in your browser without running a full Ethereum node.

Currently, the metamask does not offer a mobile app, the attackers use it as an advantage to introduce a shady app. Metamask only offers add-ons for desktop browsers such as Chrome and Firefox.

10
Feb 2019

Google Launches Password Checkup Extension To Detect Breached Credentials

Google Launches Password Checkup Extension To Detect Breached Credentials

Google has recently announced the launch of a dedicated Chrome extension that will alert users for breached credentials. Named 'Password Checkup', the tool will facilitate users in creating unique login credentials.

Whenever you sign in to a site, Password Checkup will trigger a warning if the username and password you use is one of over 4 billion credentials that Google knows to be unsafe.

The tool not only alerts users for breached passwords, but also ensures keeping the current user credentials secure by employing cryptography. In this way, the usernames and passwords will remain invisible to Google. Moreover, this will also prevent any potential instances of data breaches or password guessing by brute force.

07
Feb 2019

Your Android Phone Could Get Hacked Just By Opening A PNG Image

Your Android Phone Could Get Hacked Just By Opening A PNG Image

A major flaw in Android's framework allows an attacker to execute computer code remotely by using a maliciously crafted PNG image file to smuggle the code.

Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of Google's mobile operating system, ranging from Android 7.0 Nougat to its current Android 9.0 Pie.

This isn't the first time when PNG files are flagged as dangerous because they can be rigged easily. And it is very easy to send a harmless-looking PNG file to victims over chat, email or social media which in turn triggers the device to download malware.

05
Feb 2019

Outlaw Shellbot infects Linux servers to mine for Monero

Outlaw Shellbot infects Linux servers to mine for Monero

The Outlaw group is conducting an active campaign which is targeting Linux systems in cryptocurrency mining attacks.

On Tuesday, the JASK Special Ops research team disclosed additional details (.PDF) of the attack wave which appears to focus on seizing infrastructure resources to support illicit Monero mining activities.

The campaign uses a refined version of Shellbot, a Trojan which carves a tunnel between an infected system and a command-and-control (C2) server operated by threat actors.

The backdoor is able to collect system and personal data, terminate or run tasks and processes, download additional payloads, open remote command line shells, send stolen information to a C2, and also receive additional malware payloads from controllers.

04
Feb 2019

Family suffered sleepless nights after a hacker gained access to their Nest account and remotely controlled their home cameras and thermostats

Family suffered sleepless nights after a hacker gained access to their Nest account and remotely controlled their home cameras and thermostats

The hacker managed to gain access to leaked passwords from another website.

Arjun Sud, from Lake Barrington, Illinois, put his 7month old baby to sleep. Shortly after, he heard some noises coming from the camera in the nursery, followed by a male voice. He further reported to CBS Chicago that the hacker turned up the thermostat, also a Nest smart device, to 90 degrees Fahrenheit. The hacker continued to torment the family as they moved around their house through the 16 installed cameras. The couple disconnected their Nest devices and called the police.

Upon further investigation, Sud did not get any answers from Nest as to how long the account was compromised for. Nest also told him he had a responsibility to put stronger passwords in place to stop unauthorised access.

31
Jan 2019

IoT botnet used for proxying traffic for an YouTube video ad fraud scheme

IoT botnet used for proxying traffic for an YouTube video ad fraud scheme

Researchers made this discovery while investigating an IoT botnet known as TheMoon, which they initially began tracking after observing several CenturyLink devices performing credential brute-force attacks against popular websites.

An investigation into these devices revealed infections with the TheMoon IoT malware, and later also exposed the existence of a never-before-seen module designed to transform infected routers and IoT devices into proxies for bad traffic.

According to CenturyLink, in the past year, TheMoon botnet has been used for brute-force attacks, credential stuffing attacks, for advertising fraud, general traffic obfuscation, and more.

30
Jan 2019

Major FaceTime Bug in Apple lets callers hear and see you even you don't pick up the phone

Major FaceTime Bug in Apple lets callers hear and see you even you don't pick up the phone

If you own an Apple device, you should immediately turn OFF FaceTime app for a few days.

The bug was confirmed by BuzzFeedNews reporter Nicole Nguyen who noticed that the remote iPhone's camera is enabled if the user presses the volume down but as they might to silence the call.

Here's how one can reproduce the bug:
  1. Start a FaceTime Video call with any iPhone contact.
  2. While your call is dialing, swipe up from the bottom of your iPhone screen and tap 'Add Person.'
  3. You can add your own phone number in the 'Add Person' screen.
  4. This will start a group FaceTime call including yourself and the person you first called, whose audio you will able to listen, even if he/she hasn't accepted the call yet.

The bug is going viral on Twitter and other social media platforms with multiple users complaining of this privacy issue that can turn any iPhone into an eavesdropping device without the user's knowledge.

25
Jan 2019

Cloud infrastructure exposed by multivector, multi-platform malware attacks prevalent, mass scale

Cloud infrastructure exposed by multivector, multi-platform malware attacks prevalent, mass scale

Persistent malicious attacks exposing cloud infrastructure are the result of a perfect storm combining cryptomining, ransomware and botnet/worms for both Linux and Windows, the Securonix Threat Research Team reported.

Xbash malware infects Linux and Windows systems with the aim of deleting critical databases instead of encrypting them without any functionality to backup/recover the files, while installing cryptojacking scripts and impersonating a ransomware attack.

In most cases, the focus of the attacks is on installing a second-stage payload for cryptomining and/or remote access," the report stated. "In other cases, the malware propagates and infects the exposed services,removes data, and installs second-stage cryptomining and ransomware payloads."

23
Jan 2019

Even if you are not on Facebook, your friends are leaking your data

Even if you are not on Facebook, your friends are leaking your data

The researchers from the University of Vermont in the US and University of Adelaide in Australia found that if a person leaves a social media platform -- or never joined -- the online posts and words of their friends still provide about 95 per cent of the "potential predictive accuracy", of a person's future activities -- even without any of that person's data.

The team of scientists gathered more than 30 million public posts on Twitter from 13,905 users. With this data, they showed that information within the Twitter messages from eight or nine of a person's contacts make it possible to predict that person's later tweets as accurately as if they were looking directly at that person's own Twitter feed.

The research raises profound questions about the fundamental nature of privacy -- and how, in a highly networked society, a person's choices and identity are embedded in that network.

"You alone don't control your privacy on social media platforms," says professor Jim Bagrow from University of Vermont. "Your friends have a say too."

21
Jan 2019

The many claims of EVM tampering in India. What has happened?

The many claims of EVM tampering in India. What has happened?

Less than three months before the parliamentary elections, the Europe chapter of the Indian Journalists' Association (IJA) was set to demonstrate how electronic voting machines (EVMs) can be hacked.

Syed Shuja, a US-based cyber expert who claims he was a part of the team which designed Electronic Voting Machines (EVMs) used in India, alleged that the 2014 general elections in India were rigged and that senior BJP leader Gopinath Munde was murdered because he knew about the tampering. However, there are some massive loopholes in his explosive claims.

He claims that the tampering can be done using a modulator to tap into a low frequency. He also claimed that the modulator was of "military grade" and was sold to Reliance between 2012-2014. He also could not be clear if he was accusing Reliance Communications or Reliance Jio in the process. But he later said that it was a Mukesh Ambani company. This is something that can be looked into but he did not provide any evidence to his claims.

The Election Commission rejects charges of EVM hacking in 2014 polls and said EVMs used in Indian elections were manufactured by Bharat Electronics and Electronics Corporation of India under "very strict supervisory and security conditions".

18
Jan 2019

Oyo faces flak over guest data sharing plan

Oyo faces flak over guest data sharing plan

Legal experts said this was a major privacy concern and implementation could be questionable, given there is no legislative framework on a privacy law in India.

Oyo Rooms was at the receiving end of brickbats online after reports emerged that its new digital arrival and departure register would provide the government real-time data about people checking in and out of hotels.

Government agencies usually ask for data from hotels after obtaining relevant orders. In Oyo's case, such data being in government servers is being questioned, especially in the absence of adequate laws. Oyo is the biggest hotel operator in India, with over 125,000 rooms. It is also the third most valued startup in the country, and has a big presence in China.

The election watchdog also said it was mulling legal action in response to the claims made by a person identified as Syed Suja at a press conference in London.

17
Jan 2019

After CBSE introduces artificial intelligence paper, schools include to curriculum, hire faculty

After CBSE introduces artificial intelligence paper, schools include to curriculum, hire faculty

While some schools in the city are already encouraging students to warm up to newer ways of technology, others will soon be joining the bandwagon by introducing AI as an elective subject.

This comes after the Central Board of Secondary Education (CBSE) recently decided to introduce artificial intelligence (AI) as a skill subject for students of classes 8, 9, and 10 — a move that is aimed at making students well-versed in newer technology.

While some schools already have ICT teachers who will be teaching AI to students, other schools said that they'd be opening vacancies for specialists once the syllabus is finalized. Schools are currently in the process of the finalizing the syllabus with the help of IT experts and teachers.

17
Jan 2019

You are actually putting your online security at risk while taking up 10yearChallenge!

You are actually putting your online security at risk while taking up 10yearChallenge!

The 'Ten Year Challenge' has been taking social media by storm of late, but some tech experts worry the meme could be putting users' cyber security at risk. It's worth considering the depth and breadth of the personal data we share without reservations.

Experts are reminding people the more data you share the more of a target you become. Some even warn the memes can be mined to train facial recognition algorithms. "The majority use is probably going to be for advertising," tech expert Kate O'Neill said. "It's probably going to be just displays that adapt based on if you're older, younger."

Facial recognition's potential is mostly mundane: Age recognition is probably most useful for targeted advertising.

In other words, thanks to this trend, there's now a very large dataset of carefully curated photos of people from roughly 10 years ago and now.

16
Jan 2019

Hackers infect e-commerce sites by compromising their advertising partner

Hackers infect e-commerce sites by compromising their advertising partner

A Paris-based online advertising company was hacked, and its infrastructure used to deliver malicious JavaScript code to online stores, code that was designed to steal payment card details entered in checkout pages.

The simplest Magecart attacks are when hackers breach an e-commerce site and plant malicious code on its servers. The most complex ones are when hacker groups breach third-party service providers and use the infrastructure of these companies to deliver malicious code on online shops, some of which would normally be very hard to breach in the first place.

However, the researchers from the two firms today revealed that instead of directly compromising targeted websites, the Magecart Group 12 hacked and inserted its skimming code into a third-party JavaScript library, enabling all websites using that script to load the malicious code.

The third-party library targeted by Magecart Group 12 is by a French online advertising company, called Adverline, whose service is being used by hundreds of European e-commerce websites to display ads.

10
Jan 2019

Smarter healthcare: AI, machine learning, and wearables will pave the path ahead

Smarter healthcare: AI, machine learning, and wearables will pave the path ahead

The fact that there is a high probability of up to 25 percent medicines in India being fake (as per an ASSOCHAM study), certainly does not help. Needless to say, these scenarios are starting to exert immeasurable pressure on the economy's productivity pool and healthcare budget.

Ongoing experience suggests that AI can boost the healthcare sector multifold. With AI working in the back end, an entire supply chain of medicine can be integrated. From manufacturers to consumers located in the country's distant belts, the entire procurement and supply can be centrally controlled and monitored with ease. This will be highly effective in ensuring supply and reach of genuine, unadulterated medicine.

AI-driven apps are potent enough to replace physical visits to chemist shops altogether. By keeping tab on an individual's health condition each time s/he orders medicine online, AI makes healthcare personalised, accessible and affordable!

08
Jan 2019

Why Cybersecurity Threat Analyst Is The Hottest Job In 2019?

Why Cybersecurity Threat Analyst Is The Hottest Job In 2019?

A threat hunter is essentially a security professional who uses manual or machine-assisted techniques to detect security threats in automated systems that would have been overlooked by a CISO or CIO. In other words, s/he provides an additional layer of defence against advanced persistent threats (APTs).

In order to deliver the responsibilities, the cybersecurity threat analyst will have to work with different kinds of software and tools to identify threats and possible adversaries. S/he also has to constantly monitor security tools such as firewall, antivirus among many other key features revolving around security.

Key Requirements:
  1. An understanding of coding languages: Perl, Python, Bash or Shell, PowerShell, or batch.
  2. Knowledge about working of operating systems such as Window, Linux and network protocols such as the TCP/IP stack, work.
  3. Strong knowledge about technical writing and documentation as a threat hunter is required ad to prepare security report on a regular basis.
04
Jan 2019

Recent Ransomware Affected Multiple US Based Newspaper Publications

Recent Ransomware Affected Multiple US Based Newspaper Publications

The ransomware subsequently targeted the printing and production systems that targeted multiple newspapers. The affected names included Los Angeles Times, New York Times, Wall Street Journal, Chicago Tribune, Post-Tribune, Capital Gazette, Baltimore Sun, Hartford Courant, Carroll County Times, and Lake County News-Sun.

As revealed by a Tribune spokesperson, the malware behind the attacks seems the Ryuk ransomware, as all the affected files had a ".ryk" extension.

Ryuk ransomware gained popularity in August 2018 after a devastating cryptojacking attack that allowed the attackers pilfer Bitcoins worth thousands of dollars. According to a tweet by MHT, the ransomware made the hackers receive more than 400 Bitcoins in about four months.

03
Jan 2019

6 Missed Calls Left Mumbai Businessman Robbed Of Rs. 1.86 Crore

6 Missed Calls Left Mumbai Businessman Robbed Of Rs. 1.86 Crore

A suspected case of SIM card swapping has led to a Mumbai-based textile businessman losing Rs. 1.86 crore from his bank account. There were 28 transactions from his account, the businessman said, but he was not notified as his SIM card had been blocked by those behind the fraud.

"SIM swap" is when criminals gain access to the data and use the OTP that is required to transfer funds. SIM swap is a relatively new and technologically advanced form of fraud that allows hackers to gain access to bank account details, credit card numbers, and other personal data.

The criminals had his bank credentials and phone number. So, if your phone is blocked without consent, please get it reactivated immediately and inform the police if you notice fraudulent transactions.

28
Dec 2018

More than 4,000 jobs in Artificial intelligence lying vacant: Study

More than 4,000 jobs in Artificial intelligence lying vacant: Study

A study on the Indian artificial intelligence (AI) industry by Great Learning, the online education company, indicates there are over 4,000 positions related to AI in India that remain vacant due to shortage of qualified talent at mid and senior levels.

While 57% organisations hiring for AI look for candidates with five-years-plus experience, the average AI experience of Indian professionals is a mere three years.

This supply-demand gap indicates a huge opportunity for mid and senior-level professionals across industries like IT, finance, healthcare, and e-commerce, who are looking to transition into AI, over the next few years.

26
Dec 2018

Hackers Exploit Malware Attacks Through Twitter Memes

Hackers Exploit Malware Attacks Through Twitter Memes

Who doesn't love to scroll through memes and share with friends? But there are some malicious memes floating around in Twitter with hidden malware. When a victim downloads such memes, the malware reaches the victim's device and executes code without alerting the user.

The researchers explained that the hackers exploit this trick using Steganography. In this method, the author hides a malicious payload in an image to evade cybersecurity measures. "The memes contain an embedded command that is parsed by the malware after it's downloaded from the malicious Twitter account onto the victim's machine, acting as a C&C service for the already-placed malware."

As stated, what makes the discovery significant is the reliability of the source bearing the malicious memes, that is, Twitter. Identified as TROJAN.MSIL.BERBOMTHUM.AA. Taking the malicious memes down seemed impossible without suspending the malicious Twitter account.

25
Dec 2018

Apple provided customers' data on Indian government requests

Apple provided customers' data on Indian government requests

For device requests, Apple provided data to the Indian government in 63% of cases and 85% in the cases related to financial identifiers.

The number of requests from India -- in various formats such as subpoenas, court orders, warrants or other valid legal requests -- also included 34 financial identifiers and three emergency requests, Apple said in its bi-annual transparency report released late Monday.

Keeping with the global trends where several tech giants, including Facebook and Twitter, release bi-annually transparency reports, Apple has now launched a new transparency report website which makes it easier to scan data requests from various governments.

23
Dec 2018

NASA confirmed Data Breach after an internal server was Hacked. Warns employees of personal information breach

NASA confirmed Data Breach after an internal server was Hacked. Warns employees of personal information breach

Continuing the trail of data breaches, now NASA joins the list. NASA confirmed a data breach relating to one of their internal servers. Allegedly, the server contained personal information of employees which may have leaked to the hackers, the data included social security numbers.

The agency said all the affected employees would be notified once identified, and offered identity theft protection services and related resources to all affected employees, past and present.

19
Dec 2018

Even a lightbulb could allow hackers to burgle your home

Even a lightbulb could allow hackers to burgle your home

Analysts anticipate that the popularity of these "Internet of Things" devices is poised to grow over the next couple years, with a projected 20.4 billion devices in use by 2020.

That's because many smart home devices are controlled using a central app, like Google's Nest app or Samsung Smart Things. Changing a setting from one smart device might tell that platform to change the behavior of other smart devices.

For instance, imagine you've programmed your smart lightbulbs to turn on once you arrive home. You may also have other smart devices that are programmed to do something while you're home versus away; perhaps your smart alarm system is set to be disabled if you're at home.

If a hacker can access your smart lightbulb and toggle its setting to "at home," they might also be able to control that alarm system, making it possible to disable an alarm to slip into your home undetected, just by messing with your smart bulb settings.

18
Dec 2018

Over 4,000 artificial intelligence job roles vacant on talent shortage: Report

Over 4,000 artificial intelligence job roles vacant on talent shortage: Report

Shortage of qualified talent in the country has left over 4,000 mid and senior-level job positions vacant in the artificial intelligence (AI) sector, a study said Monday.

"The AI industry has grown by close to 30 per cent in the last one year to USD 230 million. Yet, over 4,000 positions in India remain vacant due to shortage of qualified talent at the mid and senior level," the study said.

16
Dec 2018

Samsung bugs could have allowed hackers to hijack users' accounts

Samsung bugs could have allowed hackers to hijack users' accounts

Cross-site request forgery (CSRF) vulnerabilities can allow attackers to trick victims' browsers into executing hidden commands on the websites victims are logged into, but while on the attacker's site.

The three vulnerabilities:
  1. The first vulnerability would have allowed an attacker to change the user's profile details.
  2. The second would have allowed an attacker to disable two-factor authentication.
  3. The third bud would have allowed an attacker to modify a victim's user account security question. This bug could also have been used by the attacker to take over the user account.
Access to a Samsung account allows the attacker to do the following:
  1. Track a user's movements using the Find My Device feature.
  2. Control the user's inter-connected smart devices.
  3. Gain access to the user's health data.
  4. Gain access to private notes, and more.
14
Dec 2018

Even cyber criminals offer discounts, lifetime warranty: Kaspersky

Even cyber criminals offer discounts, lifetime warranty: Kaspersky

Criminals can sell someone's complete digital life for less than $50; including data from stolen social media accounts, banking details, remote access to servers or desktops, and even data from popular services like Uber, Netflix, and Spotify, as well as gaming websites, dating apps, and porn websites which might store credit card information.

Meanwhile, researchers found that the price paid for a single hacked account is lower, with most selling for about $1 per account, and with criminals offering up discounts for bulk-buying," the Kaspersky report said.

It added: "Interestingly, some criminals selling data even provide their buyers with a lifetime warranty, so if one account stops working, the buyer will receive a new account for free."

In the report, Kaspersky has warned that people should stop using the same password for different accounts.

14
Dec 2018

Encrypted Messaging Apps including WhatsApp, Telegram, and Signal are vulnerable to side-Channel Attacks

Encrypted Messaging Apps including WhatsApp, Telegram, and Signal are vulnerable to side-Channel Attacks

While things looked good with regards to encryption, a recent study by Cisco Talos has revealed most of these popular, supposedly secure IM apps like Whatsapp, telegram and Signal are vulnerable to side-channel attacks.

Telegram is found to be highly vulnerable to desktop session hijacking attacks. Though any additional sessions by an attacker may become evident from the settings, an average user might not find it easily.

Likewise, such desktop session hijacking attacks can also affect Signal and WhatsApp users. In the case of Signal, the app handles session hijack attacks as race condition, where the victim will receive error notifications on the desktop client. While an average user will think of it as a mere error, the attacker would succeed in accessing the chats and contacts.

Similarly, in the case of WhatsApp, the victim will clearly receive notification for additional sessions, which he may deny. Nonetheless, during all this time, the attacker has a clear access to the victim's previous conversations and contacts.

04
Dec 2018

Quora says hackers stole up to 100 million users' data

Quora says hackers stole up to 100 million users' data

Quora said it discovered last week that hackers broke into its systems and were able to make off with data on up to 100 million users. That data could have included a user's name, email address, and an encrypted version of their password.

If a user imported data from another social network, like their contacts or demographic information, that could have been taken too. "We have engaged leading digital forensic and security experts and launched an investigation, which is ongoing. We have notified law enforcement officials."

It said it was also in the process of notifying all affected customers and reassured them that it was "highly unlikely" that the incident would lead to identity theft "as we do not collect sensitive information like credit card or social security numbers".

28
Nov 2018

Google Faces GDPR Complaints Over Web, Location Tracking

Google Faces GDPR Complaints Over Web, Location Tracking

Consumer organizations in seven countries plan to file complaints alleging that Google is violating Europe's data protection regulation. The challenge takes square aim at the company's lucrative targeted advertising business, which depends on a rich stream of data.

An issue in the new complaints against Google is how it obtains permission to collect the location of users, as well as their browsing data and interactions with mobile apps. Such data-gathering is enabled - or disabled - via Google's Location History and Web & App Activity settings, which apply across desktop computers as well as all Android-based mobile devices.

The European consumer organization BEUC alleges that Google uses confusing and contradictory language in describing these features as well as misleading menus that nudge users into enabling these features or keeping them active.

27
Nov 2018

MacOS Penetration Test Reveals Three Zero-Day Vulnerabilities

MacOS Penetration Test Reveals Three Zero-Day Vulnerabilities

Syndis, a Cyber Security firm was engaged by DropBox to perform this pen test. Syndis uncovered three critical Zero-Day vulnerabilities in the Mac OS platform. These include CVE-2017-13890, CVE-2018-4176, CVE-2018-4175. The findings reportedly indicated towards the possibility of a cyber attack, if the hacker knew of these three vulnerabilities and exploited them together.

In other words, if a hacker designs malicious code and induces a DropBox employee to visit the same from a Safari Browser, the cyber attack could be successful.

16
Nov 2018

IRCTC wakes up after 2 years to fix its security bug

IRCTC wakes up after 2 years to fix its security bug

It took nearly two years for India's largest ecommerce website, Indian Railway Catering and Tourism Corporation (IRCTC), to fix a security vulnerability that could have given hackers unfettered access to the personal information of passengers.

The bug would have given attackers access to passenger details such as name, age, gender and insurance nominees without their knowledge or consent. Interestingly, the Indian Railways decided to stop free mandatory travel insurance from September 1, allowing users to instead opt-in or opt-out of travel insurance

14
Nov 2018

India has been the target of over 4.3 Lakh cyber attacks from five countries

India has been the target of over 4.3 Lakh cyber attacks from five countries

The countries include China, Russia and the US while more than 73,000 attacks were initiated from India between January and June this year, a Finnish cyber-security company said.

"The relatively higher number of inbound attacks on Indian honeypots reflects how the fast-digitising country is becoming more lucrative for global cyber criminals.," Leszek Tasiemski, Vice President of cyber security products R&D at F-Secure, said in a statement on Sunday.

13
Nov 2018

Critical WordPress zero-day vulnerability allows hackers to conduct privilege escalation attacks

Critical WordPress zero-day vulnerability allows hackers to conduct privilege escalation attacks

Cybercriminals are exploiting a privilege escalation zero-day vulnerability present in WP GDPR Compliance - a WordPress plugin - that aids website owners to become GDPR complaint. The vulnerable plugin is reportedly used by more than 100,000 users and all of them are now feared to be exposed to malicious backdoor attacks.

Two critical exploits are found.

The first exploit allows modification of users' registration settings. Meanwhile, the second exploit involves injecting malicious scheduled actions to be executed by WP-Cron. Both these attacks use different types of backdoor scripts, researchers said.

The vulnerability was patched in the newer updated version 1.4.3. Meanwhile, all sites running version 1.4.2 and older versions are still vulnerable to this exploit.

07
Nov 2018

Mining Bitcoin Takes 3 Times More Energy Than Extracting Gold or Copper, New Research Says

Mining Bitcoin Takes 3 Times More Energy Than Extracting Gold or Copper, New Research Says

Researchers at the Oakridge Institute for Science and Education in Ohio also compared the energy consumption required to mine other cryptocurrencies, which were all found to be generally higher than that of gold.

Cryptocurrency mining is a process in which a "miner" packages a block of cryptocurrency transactions into a blockchain, a ledger of transactions.

The work requires powerful computers, servers, and cooling devices, which all add to growing energy costs. In some countries, energy costs make purchasing a Bitcoin as expensive as mining one.

The power demand associated with Bitcoin mining is predicted to triple this year and if it does, the energy consumption required to mine cryptocurrency will surpass that of entire countries.

04
Nov 2018

5G (and even 6G) could put your business at risk for a cyberattack

5G (and even 6G) could put your business at risk for a cyberattack

The next generation of wireless networking standards could leave critical security gaps open, according to University of Dundee research.

"In its current state, 5G does not close all the security gaps, which could result in numerous cyber-attacks and users being charged for the mobile phone usage of a third party," University of Dundee's Saša Radomirovic said. And while the team has proposed fixes, they "remain concerned about are the less than perfect privacy protections it provides leaving users vulnerable to targeted attacks," Radomirovic said.

01
Nov 2018

83% Avoid a Business Following Breach and 21% Never Return

83% Avoid a Business Following Breach and 21% Never Return

Almost half (44%) of US consumers have suffered the negative consequences of a security breach or hack, according to new research conducted on behalf of secure payments provider to contact centers, PCI Pal.

The research found that 83% of consumers will stop spending with a business for several months in the immediate aftermath of a security breach or a hack. Even more significantly, over a fifth (21%) of consumers will never return to a brand or a business post-breach, representing a significant loss of revenue. For any consumer facing business, this figure offers a stark warning.

31
Oct 2018

New attack technique uses YouTube and Office documents to spread malware

New attack technique uses YouTube and Office documents to spread malware

A new attack technique that allows attackers to embed malicious code into videos in Microsoft Word documents has been discovered by security experts. The technique allows malicious JavaScript code execution when a user clicks on a YouTube video thumbnail attached within a Word document.

A hacker could also conduct this attack without alerting the user or requesting user consent about executing malicious code. A successful attack could allow an attacker to execute any malicious code on a targeted computer.

Cymulate researchers were able to perform this attack by exploiting the video-embedding feature that creates an HTML script behind the video image. This, in turn, gets executed by Internet Explorer when the thumbnail inside the document is clicked by the user. This HTML code could also be modified by attackers to point to the malware instead of the YouTube video.

30
Oct 2018

The Problems With Using Artificial Intelligence And Facial Recognition In Policing

The Problems With Using Artificial Intelligence And Facial Recognition In Policing

Predictive policing uses data to forecast areas where crime will happen, by mapping 'hot spots'. More interestingly, it can also score and flag people most likely to be involved in violence.

As well as mapping out possible criminal hotspots, software could also assign a numerical threat score and a color coded threat level (red, yellow, or green) to any person that a police department searched for.

In the context of white collar crime, companies are already creating software to predict the 'typical' face of a white collar financial criminal. Researchers can therefore apply machine learning techniques to quantify the 'criminality' of an individual. Doing so in the terrorism space for aiding arrests, however, would be problematic. Concerns have been voiced by many that that stop and search powers are already used unfairly against those who look visibly Muslim.

26
Oct 2018

New Android malware TimpDoor can convert devices into mobile backdoors

New Android malware TimpDoor can convert devices into mobile backdoors

A new Android malware dubbed TimpDoor has been discovered by security experts. The malware is being distributed as part of a phishing campaign and is being sent to victims SMS messages. The attackers behind the campaign trick victims into downloading and installing a fake voice-message app, that contains TimpDoor.

Once the malware-laced app is installed a background service begins a Socks proxy server that redirects all network traffic via an encrypted connection from a third-party server. This allows attackers the ability to bypass security protections and access internal networks.

13
Oct 2018

Artificial Intelligence is key cybersecurity weapon in the IoT era: Research

Artificial Intelligence is key cybersecurity weapon in the IoT era: Research

The research revealed that in the quest to protect data and other high-value assets, security systems incorporating machine learning and other AI-based technologies are essential for detecting and stopping attacks that target users and IoT devices.

The majority of respondents from India agree that security products with AI functionality will help to:

  • Reduce false alerts (69 percent)
  • Increase their team's effectiveness (65 percent)
  • Provide greater investigation efficiencies (56 percent)
  • Advance their ability to more quickly discover and respond to stealthy attacks that have evaded perimeter defense systems (66 percent)
12
Oct 2018

Data Leak Due To API Vulnerability Causes Google+ Shut Down

Data Leak Due To API Vulnerability Causes Google+ Shut Down

As stated in their blog post, Google plans on sunsetting its social networking platform Google Plus (also Google+). Part of the reason behind this decision is due to a vulnerability that leaked private profile data of hundreds of thousands of customers.

The exposed information did not include any profile posts, messages, phone numbers, or other account data. However, it did leak all public information from the profile fields. This includes usernames, email addresses, gender, age, and occupation.

11
Oct 2018

Hackers can compromise your WhatsApp account by tricking you into answering a video call

Hackers can compromise your WhatsApp account by tricking you into answering a video call

Recently, an iOS 12 texting bug has been infuriated numerous users where it reportedly sends users' messages to the wrong recipients.

As noticed by several users, the new iOS has a bug in its iMessage feature that breaches users' privacy. Those who have upgraded to iOS 12 may have observed merging of threads from a single contact.

Apple has allegedly launched this feature for user convenience as it merges all conversation threads from a single user into one thread. Despite sounding convenient, the problem became a pain the neck for the average iOS user. Due to the vulnerability, iMessage incorrectly merged chats, making users send messages to the wrong recipients.

06
Oct 2018

Apple iOS 12 Texting Bug Sends Messages To Wrong Contacts

Apple iOS 12 Texting Bug Sends Messages To Wrong Contacts

Recently, an iOS 12 texting bug has been infuriated numerous users where it reportedly sends users' messages to the wrong recipients.

As noticed by several users, the new iOS has a bug in its iMessage feature that breaches users' privacy. Those who have upgraded to iOS 12 may have observed merging of threads from a single contact.

Apple has allegedly launched this feature for user convenience as it merges all conversation threads from a single user into one thread. Despite sounding convenient, the problem became a pain the neck for the average iOS user. Due to the vulnerability, iMessage incorrectly merged chats, making users send messages to the wrong recipients.

Exclusive Blog

Read All Exclusive Blog »
Cyber Criminals are turning into Cryptominers, Dominating Cyber Threat Landscape
Cyber Criminals are turning into Cryptominers, Dominating Cyber Threat Landscape

According to Check Point, during the period July to December 2017, one in five Organizations are affected by crypto mining malware, tools that enable cybercriminals to hijack the victim's CPU or GPU power and existing resources to mine cryptocurrency, using as much as 65% of the end-users CPU power.

Read Details

Hacking Tools

Explore All Hacking Tools »
UFTP - UDP based FTP with encryption
UDP based FTP with encryption

UFTP is an encrypted multicast file transfer program for secure, reliable & efficient transfer of files. It also helps in data distribution over a satellite link.

Read Details