<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>
13
Dec 2019

Hackers Belt out Server Storage Resulting in Breaching Declaration by IT Firm

Hackers Belt out Server Storage Resulting in Breaching Declaration by IT Firm

The United States Federal Trade Commission is taking the Utah-based IT provider InfoTrax Systems to court.

The later failed to detect a massive violation of the former's systems that exposed the personal data of over a million consumers.

The breach allegedly is about 20 hacking attacks over 22-months beginning in May 2014 and continuing until March 7, 2016.

The FTC says that InfoTrax Systems discovered a discrepancy when it started getting alert notifications that one of its servers had run out of storage space. In a bid to wreck a disastrous attack hackers mishandled an eclectic collection of data including victims' full names, social security numbers, addresses, email addresses, and phone numbers along with usernames, some plaintext passwords for InfoTrax accounts, and some credit and debit card numbers including associated names, expiration dates, and CVVs.

ISOAH has been executing effective anti hacking audits for an array of business entities and established institutions to keep them safe from such unprecedented system attacks.

12
Dec 2019

Whatsapp Wakes to Yet Another Hacking Controversy

Whatsapp Wakes to Yet Another Hacking Controversy

No sooner did worldwide popular messaging mobile application whatsapp just recover from the hacking controversy called Pegasus, the Israeli spyware targeted at selected Android and iOS devices worldwide, has it once again entangled itself in yet another similar imbroglio.

This time it is a new whatsApp bug that could allow hackers secretly install spyware on your devices.

However, this time the Facebook owned messaging app has had a close shave saving the bug from wreaking havoc.

Last month whatsapp patched this crucial vulnerability that could have accessed hackers to silently compromise targeted devices and polish off secret chat messages and files.

This vulnerability - named as CVE-2019-11931 - is a 'stack-based buffer overflow issue which existed in the way earlier whatsapp versions 'parse the elementary stream metadata of an MP4 file', resulting in 'denial-of-service' or remote code execution attacks.

To take advantage of this vulnerability, a remote attacker needs the phone number of targeted users and send them a maliciously designed MP4 file to their whatsapp, which ultimately can be programmed to fit a malicious backdoor or spyware app on the compromised device.

This vulnerability affects both consumers as well as enterprise apps of Whatsapp for all prominent platforms, including Google Android, Apple iOS and Microsoft Windows.

In a vulnerable world of constant cyber threats ISOAH conducts authentic anti hacking audits to make your system bug free.

11
Dec 2019

Taiwan's Summit Leads the Way to International Cyber Security

Taiwan's Summit Leads the Way to International Cyber Security

Recently Taiwan co-hosted its fourth edition of Cyber Offensive and Defensive Exercise (Code) beginning with a seminar on hacking practices adopted by North Korea. The program marked the first multinational collaboration in order to combat cyber security threats undertaken by state sponsored threat actors to sabotage industries and damage national economies.

Though the code has been initiated by Taiwan since 2013, this is a landmark year when it is co-participated in by 4 other nations of the world namely USA, Japan, Malaysia and Czech Republic alongside Taiwanese government and military officials. The aforementioned nations along with Taiwan will form a team this time to combat destructive cyber attacks on Taiwan's financial sectors.

As per reports cyber security expert officials from six other nations will also be taking part in the anti hacking drill as undertaken in the summit.

The move stands as a watershed effort to counter cyber intrusion on Taiwanese economy which is the centre of many an important industrial activity and hence the target of international cyber conspiracy.

Though there have been other meets and cooperative endeavors to solve the problem of cyber security threats, this is the first time a nation opened its gates to its allies to join hands in fighting a global threat like cyber hacking.

India is also all geared up to meet its own cyber security challenge. The Indian School of Anti Hacking along with its skill development counterpart Indian School of Ethical Hacking are organizations playing their parts in effective anti hacking audits and imparting education to aspiring ethical hackers respectively to carry the country's anti hacking baton forward.

04
Dec 2019

Government Emphasizes the Need for Tracking Whatsapp Messages after Pegasus Imbroglio

Government Emphasizes the Need for Tracking Whatsapp Messages after Pegasus Imbroglio

India is reportedly the biggest market for the popular whatsapp at 400 million users.

That is reason enough for the Indian government to hold the case of whatsapp hacking with utmost importance.

It is leaving no stone unturned to ensure whatsapp assures transparency and trace ability of content shared on the messaging platform against the recent outrage of Israeli malware Pegasus intruding into the private whatsapp messages of a number of Indian personalities.

Pegasus is a hacking malware designed by an Israeli surveillance firm NSO to help governments of different countries hack into the phone of nearly 1400 users all over the globe which includes social activists, diplomats, senior government officials, journalists and dissidents.

Whats app has reportedly sued the US based surveillance firm accusing it of exploiting an error in the whatsapp server to enable mal-intended clients break into target mobiles.

However, NSO has denied all the accusations.

In India the number of affected by Pegasus is reportedly 121.

The Indian government has said that a particular whatsapp is required to be traceable enough to know where it originated from and by whom. Knowing the identity of the sender is very important to stop cyber crimes which often translate into real life happenings like child pornography and kidnapping.

In reply Facebook owned messaging application organization said that the end to end encryption technology doesnot allow even itself to read the messages or track its origin. Only the sender and the recipient are able to see it. Answering which a government official said only a few changes in operation technology of whatsapp like digital fingerprinting of every message being exchanged would be enough to meet the crisis and solve the situation.

Since the cyber world is plagued with hacking attacks of every kind it is important for cyber security experts to be abreast of the latest anti hacking technology. The Indian School of Ethical Hacking gives young aspirants the apt skills to be the most sought after security expert.

Click on to read more about cyber security prospects in India.
www.isoeh.com/exclusive-blog-details-gear-up-to-be-a-cyber-security-professional-as-the-world-wide-web-waits-for-you.html
https://www.isoeh.com/exclusive-blog-details-how-much-does-a-certified-ethical-hacker-earn-in-india.html

Click on to know more about Pegasus from ISOEH CEO Sandeep Sengupta.

27
Nov 2019

Researcher's Release Antidote for Paradise Ransomware

Researcher's Release Antidote for Paradise Ransomware

At the end of the tunnel there is always a ray of light.
Every dark cloud has a silver lining to it.
Paradise Ransomware is finally going to be counter attacked, much to the relief of its thousands of preys.

Security researchers have released a free decryptor tool for the Paradise Ransomware which will enable those affected by it to recover their files without paying its dreaded ransom to the attackers.

The Paradise Ransomware was detected in September 2017 and is still actively in distribution as per reports of the computer security firm Emsisoft.

It apparently seems to be sold to third-party attackers in form of a paid service, with attackers enabled to customize how the #malware operates. When files are encrypted, Paradise appends one of at least fifty extensions to the files, including ".paradise", "2ksys19", ".p3rf0rm4", and ".FC".

Emsisoft said the new tool can decrypt most of these extensions. But if in case the hacked files cannot be decrypted, users are advised to archive them so that they can be unlocked at a later date when the tool is updated.

Paradise exhibits one of several variant ransom notes depending on how it's been customized by the third-party attacker. The notes ask the ransom to be paid in Bitcoin directly to the attacker, rather than to Paradise's developers. "Regardless of what any of the Paradise ransom notes might say, our decryption tool can help you recover your files for free," Emsisoft said in an advisory.

In this age of rampant cyber attacks the industry needs expert cyber security professionals to ensure corporate safety against malicious hacking. ISOEH imparts the right training in that regard.

22
Nov 2019

Chinese hacking group jeopardizes international politics

Chinese hacking group jeopardizes international politics

A hacking group of Chinese origin has been wreaking havoc with the governments of numerous countries in the world, for the last three years.

The name of the group is Calypso APT or Advanced Persistent Threat which has been active in countries like India, Brazil, Kazakhstan, Russia, Thailand and Turkey.

The malicious activities of the group have been investigated out by the security enterprise called Positive Technologies.

The modus operandi of the group is hacking the perimeter of the organization's system thereafter using special utilities and malware to get access to the internal network. After gaining access the hackers would navigate the system in either of the two ways of exploiting remote code execution vulnerabilities or using stolen credentials.

The aforementioned group would damage and destroy the federal infrastructure of every country they targeted. As per Positive Technologies the success of this group can be attributed to the usage of popular public tools as employed by specialists uniformly for network administrations like SysInternals, Mimikatz, EternalBlue and EternalRomance.

The cyber world is seriously privacy challenged. In this scheme of things an organization experienced in security audits can ensure effective precaution against hacking.

Click here to know more: www.isoah.com

19
Nov 2019

Blackmailing Hackers Plead Guilty

Blackmailing Hackers Plead Guilty

Be careful with Uber and LinkedIn.

The user information which you just shared may get manipulated.

Brandon Charles Glover (26) of Florida and Vasile Mereacre (23) of Toronto have been doing that since 2016.

However, they did not stop just there.

After stealing the customer's database from the concerned company's network they would contact the corporate and blackmail it to cough up a ransom in exchange of deleting the hacked data base.

That paid and how!!!

The duo extorted 100,000 in bitcoin from Uber in exchange of a hacked database of 57 million Uber riders and drivers!!!!

They also blackmailed LinkedIn in a similar way in December 2016, after stealing the database of LinkedIn's subsidiary Lynda.com and stole over 90,000 user records, including their credit card information.

Uber had to undertake severe financial compensation for failing to protect its customer's private data base as ordered by a number of data protection regulators and federal bodies after revealing the act of hacking later.

Only recently Glover and Mereacre each pleaded guilty to a charge of extortion and are to face a maximum of five years in prison and a fine of $250,000 when they are sentenced. The duo has been released on bond and will be sentenced in March 2020.

In order to combat such malicious data hacking learn anti hacking technology from eastern India's best anti hacking school the Indian School of Ethical Hacking.

In order to protect your organization's data base avail Indian School of Anti Hacking's expert audits.

15
Nov 2019

Fancy Bear Targets Antidoping in Olympics Even After Three Years

Fancy Bear Targets Antidoping in Olympics Even After Three Years

Once bitten but more than twice shy!

No one dares messing with Russian athletes.

Just before the Worldwide Anti Doping agency reported that there were 'inconsistencies' in the anti-doping compliance standard of Russian athletes indicating a probable ban of the concerned country from Tokyo Olympics 2020 just like Pyeongchang Winter Games in 2018, Russian hackers, long working in Russian military intelligence agency called the GRU started retaliating.

Microsoft has recently revealed that state sponsored Russian hacker group Fancy Bear, APT28, or Strontium has targeted no less than 16 anti-doping agencies in the whole world, some very successfully so.

The Russian attacks on Olympics are special owing to their sheer consistency over the years. They have been avenging Russia's 2018 eviction by leaking battery of stolen files and athlete medical records of leading anti-doping organizations including WADA even sabotaging the whole of Olympic's IT background, ticketing system, WiFi, app etc.

As indicated by this destructive history, Russia, in all probability, will wreck revenge at the Japan Olympics in 2020 as said by threat intelligence firm Fire Eye's director of intelligence analysis John Hultquist.

In order to prevent such disruptive hacking activities learn ethical hacking at the Indian School of Ethical Hacking to combat a hacker using his very own malicious hacking tactics against him. Click here on to know more: www.isoeh.com

You can also avail the anti hacking auditing services of the Indian School of Anti Hacking to protect yourself from your cyber enemies. Click here to know more: www.isoah.com

14
Nov 2019

Microsoft Releases a Battery of Iot Updates

Microsoft Releases a Battery of Iot Updates

Microsoft has accelerated its IoT emphasis.

Recently it has released a long line of IoT updates thus adding tremendous value to its IoT portfolio while addressing the current cyber security challenges and usage of technology. Microsoft envisions IoT implements for allowing companies to modify cloud intelligence from data centre to edge computing thus engineering newer products.

In order to take this tech mission forward Microsoft is introducing 11 application templates to its IoT central platform, which will ease out the IoT applications in sectors like retail, health care, government, and energy. The other improvements to Microsoft's IoT central include custom user roles, the ability to save and load application states, and improved data export options.

Microsoft also announced its Azure Sphere partner security program to enhance its IoT security, which according to Microsoft requires a 'holistic approach'.

IoT security is fast being an important vulnerability as companies are increasingly employing that technology on their networks. A Nokia Threat report from late 2018 found that IoT botnets were fast growing and 5G-based IoT deployments were only going to increase the risk.

Read on to know more: www.isoeh.com/exclusive-blog-details-lets-get-ready-for-a-whole-new-world-with-IOT-the-internet-of-things.html

Only effective auditing can meet the need for solving issues of IoT securities on corporate networks. Click here to know more: www.isoah.com

13
Nov 2019

Foods Apps Resort to AI, ML to Meet Escalating Demand

Foods Apps Resort to AI, ML to Meet Escalating Demand

Are you a voracious eater?
Are you fond of ordering food online?
Do you hate waiting for more hours than necessary for the delivery boy to turn up?

Well, those days are soon to arrive when all your desires and delicacies are met in a single mobile application.

Machine Learning, a subset of Artificial Intelligence, is fast replacing manual labour at popular food apps like Swiggy and Zomato resulting in faster, better and more sophisticated sales services.

With the demand for online food orders on an all time high, in order to boost sales and meet better customer satisfaction, almost all the popular food apps are resorting to Machine Learning as the most important tool to improve their business standards.

In a fiercely competitive market, both Swiggy and Zomato are aiming at expanding their business horizons by meeting their client's appetite ambitions. Handling over a million orders a day and partnering with over a lakh restaurants closely, both the food apps now want to serve a customized palate based on their individual orders in the past. The entire process of service revamping is being planned based on data holding the hands of ML or Machine Learning.

Unlike e-commerce, where data sets are availed from just customer purchases in the hyper local segment, here the delivery fleet, restaurants, and customers together generate massive amounts of data points.

Hence, Machine Learning is the future for making the most of this global appetite for exotic cuisine and making the food-tech one of the most promising sectors of employment.

The Indian School of Ethical Hacking offers comprehensive skill development modules on Machine Learning.

In order to learn Machine Learning and Artificial Intelligence click here and read on www.isoeh.com/machine-learning-using-python.html

12
Nov 2019

Facebook Goes To the Court against Phishers

Facebook Goes To the Court against Phishers

Facebook is almost hacked!

If you receive an unexpected notification from Facebook asking you your net credentials know for sure that you have been phished.

Phishing websites like HackingFacebook.net and instagram.com are active to hoodwink users to divulge their secrets by using hacking tools against one of the most popular social networking sites in the world wide web.

These phishing websites are owned and hosted by two such companies who were sent numerous takedown requests by Facebook due their fraudulent activities infringing on the company's trademarks. Finally, owing to the non-reciprocating ways of the former, Facebook has moved to the court of law by filing its lawsuit on Monday in the US District Court of the Northern District of California against Online NIC and ID Shield of trademark infringement and cybersquatting.

As per reports this is the latest example of a corporate giant taking fake sites to task on charges of phishing. Earlier this year Microsoft took down 99 websites controlled and manipulated by Iranian hackers, intended at phishing users. Phishing attacks are common these days with URLs resembling the real website name and design trap websites to look just like the actual one.

In the aforementioned lawsuit Facebook mentioned at least 20 websites using the corporate's name and images on websites hosted by Online NIC and ID Shield intended at illegal activities in the name of Facebook and Instagram. So manipulatively are the phishing attacks designed that the target user may end up divulging his password.

In situations like these organizations specialized in anti hacking are take charge in discovering system vulnerabilities and combating outer intrusions.

Click on www.isoah.comto know more.

28
Oct 2019

'Double' trouble in Whatsapp world

'Double' trouble in Whatsapp world

The whatsapp happy netizens of the world are in for bad news. For those of you who think the popular messaging mobile application is the safest place to engage in quite private gossip are in for an unpleasant surprise. A particular bug called CVE-2019-11932 has been discovered in WhatsApp for Android in versions below 2.19.244, which makes it vulnerable to some serious hacking in form of memory leaks, crashes, and the execution of arbitrary code, just by a mischievous GIF.

Read more to know the details of the vulnerability: https://www.zdnet.com/article/whatsapp-vulnerability-exploited-through-malicious-gifs-to-hijack-chat-sessions/

23
Oct 2019

Microsoft Announces Hacking Award for De-Bugging Election Software

Microsoft Announces Hacking Award for De-Bugging Election Software

Unbiased election is the backbone of any democracy.

However that seems to be only a constitutional fact with no implication in reality.

In the present political scenario the possibility of fair elections is diluted in scams and scandals across the globe raising a big question on the transparency of international political standards.

Be it the American voting machines or the Indian EVMs no voting infrastructure is free of manipulative software altering results, endangering nations and tarnishing the system.

But there is always a light at the end of the tunnel.

Microsoft has, in MAY 2019, released 'a free, open-source software development kit (SDK) called ElectionGuard' for a comprehensive verification of votes. It serves a threefold purpose of
  • End to end election verification
  • Open results to third parties for secure validations
  • Confirm correct counting of votes

In order to ensure smooth and secure working of the Election Guard, Microsoft has launched the ElectionGuard Bounty program inviting security experts across the world to detect and delete bugs, viruses and other type of vulnerabilities in the SDK system.

As a part of the defending democracy program this initiative asks security professionals like cyber security practitioners, part-time hobbyists, or students to discover crucial vulnerabilities in the ElectionGuard and share them with Microsoft under the Coordinated Vulnerability Disclosure (CVD) against a reward of $15,000 for every important discovery.

Read more about the hacking outrage in US elections here https://thehackernews.com/2016/12/russian-hacker-us-election.html

For knowing more about the perks of being a cyber security professional click www.isoeh.com/exclusive-blog.html

17
Oct 2019

October 2019 patch Tuesday information updated by Microsoft

October 2019 patch Tuesday information updated by Microsoft

Microsoft has just recently released its October 2019 patch Tuesday security updates in order to correct a total of 59 vulnerabilities in windows operating systems and associated software. Out of all the enlisted vulnerabilities 9 are rated as critical, 49 important and 1 average in severity.

The silver lining about this month's security update is that none of the cyber vulnerabilities patched this time is listed publicly or under active hacking attack.

Two of the critical vulnerabilities patched this month are remote code execution flaws in the VBScript engine. Both exist in how VBScript handles objects in memory, thus helping attackers to corrupt memory and execute arbitrary code for the current user.

The two vulnerabilities, namely CVE-2019-1238 and CVE-2019-1239, can be exploited remotely by cajoling victims into visiting a specially crafted website through Internet Explorer.

A hacker can go about his hacking intention using these issues with the help of an application or Microsoft Office document by embedding an ActiveX control marked 'safe for initialization' that utilizes Internet Explorer rendering engine.

System administrators are advised to employ the latest security patches to keep their systems free of cyber crimes and unlawful intrusions.

https://msrc-blog.microsoft.com/2019/10/08/october-2019-security-updates-are-available/

Visit www.isoah.com to know more about different anti hacking services on offer to keep your digital infrastructure secure from unprecedented attacks.

16
Oct 2019

Yahoo Mail Hacked Off Its Modesty, By Its Former Employee

Yahoo Mail Hacked Off Its Modesty, By Its Former Employee

Reyes Daniel Ruiz, an ex-Yahoo employee has been accused of hacking into a multitude of email accounts owned primarily by young women belonging to the Yahoo domain, for taking a sneak peek into their private photographs and videos, to which he confessed.

The number of email accounts which this former yahoo engineer has violated the privacy of is a whopping 6000. The accused was already charged with issues of online hacking and intercepting a wire communication in April.

Most of the victim of his unauthorized intrusion were strangers in the web world while some were his friends and acquaintances. The photographs and videos that were gathered were not only sourced from Yahoo accounts but also from other sites like Facebook, icloud, Dropbox and Gmail among others.

Though he tried to hide his crime by destroying the drive in which he stored his hacked stuff, by then Yahoo had become suspicious of his activities.

This incident is in line with 2013 and 2014 scams of massive breach of privacy on part of Yahoo. Hence the need for cyber security cannot be over emphasized no matter how authentic the domain may be.

Read more to ensure your cyber security: www.isoah.com/5-smart-ways-to-maintain-your-digital-privacy1.php

Click on to avail better services against hacking: www.isoah.com

15
Oct 2019

Email servers exposed to remote attacks, patch released

Email servers exposed to remote attacks, patch released

A crucial security issue has been found out and addressed in the open source Exim email server software with the help of which a hacker can bombard any particular server with malicious codes or just conduct a crash.

Exim administrators released an emergency security update called Exim version 4.92.3 on the 30th September giving system administrators an early intimation on its upcoming security patches that extends on all versions of the email server software from 4.92 including then-latest version 4.92.2. Administrators are advised to install the latest Exim 4.92.3 version immediately, since there is no known mitigation to solve the threat.

Known as CVE-2019-16928 and discovered by Jeremy Harris of Exim Development Team, the problem is a heap-based buffer overflow (memory corruption) issue in string_vformat defined in string.c file of the EHLO Command Handler component.

It could allow remote attackers to engineer a denial of service (DoS) situation or release any arbitrary code on a targeted Exim mail server using a specially drafted line in the EHLO command with the rights of the targeted user.

<>The Indian School of Anti Hacking is well versed in locating such system vulnerabilities with its expert team of anti hacking audits. Click www.isoah.com to know about us.

25
Sep 2019

Google Takes a Giant Step with Digital India

Google Takes a Giant Step with Digital India

Google, the Mountain View based internet giant has just announced its big leap for digital India. During its famous flagship 'Google for India' event it has announced launching an 'Artificial Intelligence' or AI laboratory in Bengaluru for creating products not just for India but also for the rest of the world. The laboratory will be led by Manish Gupta, a student of SEM or Society for Experimental Mechanics.

If you wish to know more about AI, please reach our other tutorial article www.isoeh.com/tutorial-details-artificial-intelligence-machine-learning-what-s-the-difference-between-them.html or check out our ML Course at www.isoeh.com/machine-learning-using-python.html

23
Sep 2019

RBI Restricts Unauthorized Sharing of Credit Information

RBI Restricts Unauthorized Sharing of Credit Information

The Reserve Bank of India has taken a big step forward towards securing confidential financial data from being exposed to unidentified external entities. It has restricted commercial banks and non-banking lenders from allowing access to consumer data owned by credit bureaus to 'unregulated entities'. It has further issued a letter to banks and NBFCs in which the RBI said that it observed agents appointed and allowed access to the database of credit information companies. Such an act violates the provisions of the Credit Information Companies (Regulation) Act, 2005 (CICRA). The Reserve Bank further warned the defaulting organizations of serious consequences in case of further repetition of such an act.

We at ISOAH or the Indian School of Anti Hacking specialize in providing cyber security to corporate data bases with our expert network auditing team. Do visit www.isoah.com to know more about our services.

26
Feb 2019

Govt proposes body to identify pirated websites, cut their revenue sources

Govt proposes body to identify pirated websites, cut their revenue sources

A FICCI and E&Y study in March 2018 estimated that the film sector alone loses $ 2.8 billion of its total revenue to online piracy.

To contain online distribution of pirated content, the draft national e-commerce policy has proposed setting up a body of industry stakeholders to identify websites that host infringing content, in an effort to curtail their advertising and subscription revenue.

The draft e-commerce policy released on Saturday said that Internet service providers shall remove or disable access to the websites identified in the IWL within set time-lines, payment gateways shall not permit flow of payments to or from such rogue websites, search engines shall take necessary steps to remove websites in their search results and advertisers or advertising agencies shall not host any advertisements on them.

24
Feb 2019

70000 Pakistani banks' cards with PINs go on sale on the dark web

70000 Pakistani banks' cards with PINs go on sale on the dark web

Group-IB experts discovered new databases with a total of 69,189 Pakistani banks' cards that have shown up for sale on the dark web. The total market value of the databases is estimated at nearly 3.5 million USD.

According to Group-IB data, it is the second big sale of Pakistani banks' cards in the past 6 months, which may indicate the activity of advanced financially motivated threat actors in the region.

Group-IB Threat Intelligence team has discovered two new databases with tens of thousands of Pakistani banks' cards that were releases on Joker's Stash, one of the most popular underground hubs of stolen card data, at the end of January 2019. 96% of all card dumps, unauthorized digital copies of the information contained in magnetic stripe of a payment card, were related to a single bank – Meezan Bank Ltd. Pakistani banks' cards are rarely sold on underground cardshops. This, and the fact that all the cards came on sale with PIN codes explains the high price, which was kept at 50 USD per card, while usually the price per card on dark web forums ranges from 10 to 40 USD.

24
Feb 2019

ATM Hacking has got easy, WinPot malware comes into play

ATM Hacking has got easy, WinPot malware comes into play

As detailed by Kaspersky Lab, so-called WinPot malware afflicts what the security researchers describe only as a "popular" ATM brand.

To install WinPot, a hacker needs either physical or network access to a machine; if you cut a hole in the right spot, it's easy enough to plug into a serial port. Once activated, the malware replaces the ATM's standard display with four buttons labeled "SPIN"—one for each cassette, the cash-dispensing containers within an ATM.

Below each of those buttons, it shows the number of bank notes within each given cassette, as well as the total values. Tap SPIN, and out comes the money. Tap STOP, and well, you know.

21
Feb 2019

New Vulnerabilities Found in Top Password Managers

New Vulnerabilities Found in Top Password Managers

Top password manager products have fundamental flaws that expose the data they are designed to protect, rendering them no more secure than saving passwords in a text file, according to a new study by researchers at Independent Security Evaluators (ISE).

More than 60 million individuals 93,000 businesses worldwide rely on password managers. ISE researchers revealed serious weaknesses with top password managers: 1Password, Dashlane, KeePass and LastPass.

One major finding was that, in certain instances, the master password was residing in the computer's memory in a plaintext readable format -- no safer than storing it in a document or on the desktop as far as an adversary is concerned. Users are led to believe the information is secure when the password manager is locked. Though, once the master password is available to the attacker, they can decrypt the password manager database -- the stored secrets, usernames and passwords. ISE demonstrated it is possible to extract master passwords and other login credentials from memory while the password manager was locked.

18
Feb 2019

Latest RBI Alert: This app can steal all money from your bank account, never download

Latest RBI Alert: This app can steal all money from your bank account, never download

If you are suggested to download an app called "AnyDesk" through social media or any other channel then do not do this. After downloading this app, your bank account may become empty within minutes.

Reserve Bank of India (RBI) has issued a warning in this regard. "AnyDesk" is a software that can do transactions from your bank account through your mobile or laptop.

The alert was issued by the RBI's cybersecurity and IT examination cell. It said that once the app is downloaded on a mobile phone, it seeks permission to access control of the phone like other applications.

However, when the permission is granted by a user, AnyDesk app allegedly steals confidential data on the phone to carry out fraudulent transactions through other payments app available on the phone.

17
Feb 2019

Google, Amazon want smart home devices to mine even more of your data

Google, Amazon want smart home devices to mine even more of your data

For several years, Amazon and Google have collected data every time someone used a smart speaker to turn on a light or lock a door. Now they're asking smart-home gadget makers such as Logitech and Hunter Fan to send a continuous stream of information.

Even gadgets as simple as light bulbs could enable tech companies to fill in blanks about their customers and use the data for marketing purposes. Having already amassed a digital record of activity in public spaces, critics say, tech companies are now bent on establishing a beachhead in the home.

14
Feb 2019

Google Reveals How Much They Paid Out Under Their Bug Bounty Program in 2018

Google Reveals How Much They Paid Out Under Their Bug Bounty Program in 2018

Last year (2018), Google paid out $1.7 million to security researchers who discovered bugs in the Android and Chrome systems.

The program was designed to help Google find flaws in its systems and to encourage researchers to report issues before they could be exploited. Financial rewards for reporting these bugs range from $100 to $200,000 depending on the risk level of the flaw.

In total, Google said they had paid out $3.4 million in rewards in 2018, $1.7 of which was for vulnerabilities found in Android and Chrome. Google said the program has paid out a total of $15 million since it was launched in 2010.

12
Feb 2019

MetaMask – First Copy-and-Paste Hijacking Crypto Malware Found in Google Play

MetaMask – First Copy-and-Paste Hijacking Crypto Malware Found in Google Play

The main purpose of the app is to steal the victim's credentials and private keys to gain control over the victim's Ethereum funds.

The clipper hijacking malware use to intercept the contents of the clipboard and replaces it with the content the attackers want to have.

Generally, the cryptocurrency wallets contain a long string of characters for security reasons, users use to copy and paste the strings instead of typing it. The clipper malware in Google Play impersonates as the metamask service that allows you to run the Ethereum dApps right in your browser without running a full Ethereum node.

Currently, the metamask does not offer a mobile app, the attackers use it as an advantage to introduce a shady app. Metamask only offers add-ons for desktop browsers such as Chrome and Firefox.

10
Feb 2019

Google Launches Password Checkup Extension To Detect Breached Credentials

Google Launches Password Checkup Extension To Detect Breached Credentials

Google has recently announced the launch of a dedicated Chrome extension that will alert users for breached credentials. Named 'Password Checkup', the tool will facilitate users in creating unique login credentials.

Whenever you sign in to a site, Password Checkup will trigger a warning if the username and password you use is one of over 4 billion credentials that Google knows to be unsafe.

The tool not only alerts users for breached passwords, but also ensures keeping the current user credentials secure by employing cryptography. In this way, the usernames and passwords will remain invisible to Google. Moreover, this will also prevent any potential instances of data breaches or password guessing by brute force.

07
Feb 2019

Your Android Phone Could Get Hacked Just By Opening A PNG Image

Your Android Phone Could Get Hacked Just By Opening A PNG Image

A major flaw in Android's framework allows an attacker to execute computer code remotely by using a maliciously crafted PNG image file to smuggle the code.

Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of Google's mobile operating system, ranging from Android 7.0 Nougat to its current Android 9.0 Pie.

This isn't the first time when PNG files are flagged as dangerous because they can be rigged easily. And it is very easy to send a harmless-looking PNG file to victims over chat, email or social media which in turn triggers the device to download malware.

05
Feb 2019

Outlaw Shellbot infects Linux servers to mine for Monero

Outlaw Shellbot infects Linux servers to mine for Monero

The Outlaw group is conducting an active campaign which is targeting Linux systems in cryptocurrency mining attacks.

On Tuesday, the JASK Special Ops research team disclosed additional details (.PDF) of the attack wave which appears to focus on seizing infrastructure resources to support illicit Monero mining activities.

The campaign uses a refined version of Shellbot, a Trojan which carves a tunnel between an infected system and a command-and-control (C2) server operated by threat actors.

The backdoor is able to collect system and personal data, terminate or run tasks and processes, download additional payloads, open remote command line shells, send stolen information to a C2, and also receive additional malware payloads from controllers.

04
Feb 2019

Family suffered sleepless nights after a hacker gained access to their Nest account and remotely controlled their home cameras and thermostats

Family suffered sleepless nights after a hacker gained access to their Nest account and remotely controlled their home cameras and thermostats

The hacker managed to gain access to leaked passwords from another website.

Arjun Sud, from Lake Barrington, Illinois, put his 7month old baby to sleep. Shortly after, he heard some noises coming from the camera in the nursery, followed by a male voice. He further reported to CBS Chicago that the hacker turned up the thermostat, also a Nest smart device, to 90 degrees Fahrenheit. The hacker continued to torment the family as they moved around their house through the 16 installed cameras. The couple disconnected their Nest devices and called the police.

Upon further investigation, Sud did not get any answers from Nest as to how long the account was compromised for. Nest also told him he had a responsibility to put stronger passwords in place to stop unauthorised access.

31
Jan 2019

IoT botnet used for proxying traffic for an YouTube video ad fraud scheme

IoT botnet used for proxying traffic for an YouTube video ad fraud scheme

Researchers made this discovery while investigating an IoT botnet known as TheMoon, which they initially began tracking after observing several CenturyLink devices performing credential brute-force attacks against popular websites.

An investigation into these devices revealed infections with the TheMoon IoT malware, and later also exposed the existence of a never-before-seen module designed to transform infected routers and IoT devices into proxies for bad traffic.

According to CenturyLink, in the past year, TheMoon botnet has been used for brute-force attacks, credential stuffing attacks, for advertising fraud, general traffic obfuscation, and more.

30
Jan 2019

Major FaceTime Bug in Apple lets callers hear and see you even you don't pick up the phone

Major FaceTime Bug in Apple lets callers hear and see you even you don't pick up the phone

If you own an Apple device, you should immediately turn OFF FaceTime app for a few days.

The bug was confirmed by BuzzFeedNews reporter Nicole Nguyen who noticed that the remote iPhone's camera is enabled if the user presses the volume down but as they might to silence the call.

Here's how one can reproduce the bug:
  1. Start a FaceTime Video call with any iPhone contact.
  2. While your call is dialing, swipe up from the bottom of your iPhone screen and tap 'Add Person.'
  3. You can add your own phone number in the 'Add Person' screen.
  4. This will start a group FaceTime call including yourself and the person you first called, whose audio you will able to listen, even if he/she hasn't accepted the call yet.

The bug is going viral on Twitter and other social media platforms with multiple users complaining of this privacy issue that can turn any iPhone into an eavesdropping device without the user's knowledge.

25
Jan 2019

Cloud infrastructure exposed by multivector, multi-platform malware attacks prevalent, mass scale

Cloud infrastructure exposed by multivector, multi-platform malware attacks prevalent, mass scale

Persistent malicious attacks exposing cloud infrastructure are the result of a perfect storm combining cryptomining, ransomware and botnet/worms for both Linux and Windows, the Securonix Threat Research Team reported.

Xbash malware infects Linux and Windows systems with the aim of deleting critical databases instead of encrypting them without any functionality to backup/recover the files, while installing cryptojacking scripts and impersonating a ransomware attack.

In most cases, the focus of the attacks is on installing a second-stage payload for cryptomining and/or remote access," the report stated. "In other cases, the malware propagates and infects the exposed services,removes data, and installs second-stage cryptomining and ransomware payloads."

23
Jan 2019

Even if you are not on Facebook, your friends are leaking your data

Even if you are not on Facebook, your friends are leaking your data

The researchers from the University of Vermont in the US and University of Adelaide in Australia found that if a person leaves a social media platform -- or never joined -- the online posts and words of their friends still provide about 95 per cent of the "potential predictive accuracy", of a person's future activities -- even without any of that person's data.

The team of scientists gathered more than 30 million public posts on Twitter from 13,905 users. With this data, they showed that information within the Twitter messages from eight or nine of a person's contacts make it possible to predict that person's later tweets as accurately as if they were looking directly at that person's own Twitter feed.

The research raises profound questions about the fundamental nature of privacy -- and how, in a highly networked society, a person's choices and identity are embedded in that network.

"You alone don't control your privacy on social media platforms," says professor Jim Bagrow from University of Vermont. "Your friends have a say too."

21
Jan 2019

The many claims of EVM tampering in India. What has happened?

The many claims of EVM tampering in India. What has happened?

Less than three months before the parliamentary elections, the Europe chapter of the Indian Journalists' Association (IJA) was set to demonstrate how electronic voting machines (EVMs) can be hacked.

Syed Shuja, a US-based cyber expert who claims he was a part of the team which designed Electronic Voting Machines (EVMs) used in India, alleged that the 2014 general elections in India were rigged and that senior BJP leader Gopinath Munde was murdered because he knew about the tampering. However, there are some massive loopholes in his explosive claims.

He claims that the tampering can be done using a modulator to tap into a low frequency. He also claimed that the modulator was of "military grade" and was sold to Reliance between 2012-2014. He also could not be clear if he was accusing Reliance Communications or Reliance Jio in the process. But he later said that it was a Mukesh Ambani company. This is something that can be looked into but he did not provide any evidence to his claims.

The Election Commission rejects charges of EVM hacking in 2014 polls and said EVMs used in Indian elections were manufactured by Bharat Electronics and Electronics Corporation of India under "very strict supervisory and security conditions".

18
Jan 2019

Oyo faces flak over guest data sharing plan

Oyo faces flak over guest data sharing plan

Legal experts said this was a major privacy concern and implementation could be questionable, given there is no legislative framework on a privacy law in India.

Oyo Rooms was at the receiving end of brickbats online after reports emerged that its new digital arrival and departure register would provide the government real-time data about people checking in and out of hotels.

Government agencies usually ask for data from hotels after obtaining relevant orders. In Oyo's case, such data being in government servers is being questioned, especially in the absence of adequate laws. Oyo is the biggest hotel operator in India, with over 125,000 rooms. It is also the third most valued startup in the country, and has a big presence in China.

The election watchdog also said it was mulling legal action in response to the claims made by a person identified as Syed Suja at a press conference in London.

17
Jan 2019

After CBSE introduces artificial intelligence paper, schools include to curriculum, hire faculty

After CBSE introduces artificial intelligence paper, schools include to curriculum, hire faculty

While some schools in the city are already encouraging students to warm up to newer ways of technology, others will soon be joining the bandwagon by introducing AI as an elective subject.

This comes after the Central Board of Secondary Education (CBSE) recently decided to introduce artificial intelligence (AI) as a skill subject for students of classes 8, 9, and 10 — a move that is aimed at making students well-versed in newer technology.

While some schools already have ICT teachers who will be teaching AI to students, other schools said that they'd be opening vacancies for specialists once the syllabus is finalized. Schools are currently in the process of the finalizing the syllabus with the help of IT experts and teachers.

17
Jan 2019

You are actually putting your online security at risk while taking up 10yearChallenge!

You are actually putting your online security at risk while taking up 10yearChallenge!

The 'Ten Year Challenge' has been taking social media by storm of late, but some tech experts worry the meme could be putting users' cyber security at risk. It's worth considering the depth and breadth of the personal data we share without reservations.

Experts are reminding people the more data you share the more of a target you become. Some even warn the memes can be mined to train facial recognition algorithms. "The majority use is probably going to be for advertising," tech expert Kate O'Neill said. "It's probably going to be just displays that adapt based on if you're older, younger."

Facial recognition's potential is mostly mundane: Age recognition is probably most useful for targeted advertising.

In other words, thanks to this trend, there's now a very large dataset of carefully curated photos of people from roughly 10 years ago and now.

16
Jan 2019

Hackers infect e-commerce sites by compromising their advertising partner

Hackers infect e-commerce sites by compromising their advertising partner

A Paris-based online advertising company was hacked, and its infrastructure used to deliver malicious JavaScript code to online stores, code that was designed to steal payment card details entered in checkout pages.

The simplest Magecart attacks are when hackers breach an e-commerce site and plant malicious code on its servers. The most complex ones are when hacker groups breach third-party service providers and use the infrastructure of these companies to deliver malicious code on online shops, some of which would normally be very hard to breach in the first place.

However, the researchers from the two firms today revealed that instead of directly compromising targeted websites, the Magecart Group 12 hacked and inserted its skimming code into a third-party JavaScript library, enabling all websites using that script to load the malicious code.

The third-party library targeted by Magecart Group 12 is by a French online advertising company, called Adverline, whose service is being used by hundreds of European e-commerce websites to display ads.

10
Jan 2019

Smarter healthcare: AI, machine learning, and wearables will pave the path ahead

Smarter healthcare: AI, machine learning, and wearables will pave the path ahead

The fact that there is a high probability of up to 25 percent medicines in India being fake (as per an ASSOCHAM study), certainly does not help. Needless to say, these scenarios are starting to exert immeasurable pressure on the economy's productivity pool and healthcare budget.

Ongoing experience suggests that AI can boost the healthcare sector multifold. With AI working in the back end, an entire supply chain of medicine can be integrated. From manufacturers to consumers located in the country's distant belts, the entire procurement and supply can be centrally controlled and monitored with ease. This will be highly effective in ensuring supply and reach of genuine, unadulterated medicine.

AI-driven apps are potent enough to replace physical visits to chemist shops altogether. By keeping tab on an individual's health condition each time s/he orders medicine online, AI makes healthcare personalised, accessible and affordable!

08
Jan 2019

Why Cybersecurity Threat Analyst Is The Hottest Job In 2019?

Why Cybersecurity Threat Analyst Is The Hottest Job In 2019?

A threat hunter is essentially a security professional who uses manual or machine-assisted techniques to detect security threats in automated systems that would have been overlooked by a CISO or CIO. In other words, s/he provides an additional layer of defence against advanced persistent threats (APTs).

In order to deliver the responsibilities, the cybersecurity threat analyst will have to work with different kinds of software and tools to identify threats and possible adversaries. S/he also has to constantly monitor security tools such as firewall, antivirus among many other key features revolving around security.

Key Requirements:
  1. An understanding of coding languages: Perl, Python, Bash or Shell, PowerShell, or batch.
  2. Knowledge about working of operating systems such as Window, Linux and network protocols such as the TCP/IP stack, work.
  3. Strong knowledge about technical writing and documentation as a threat hunter is required ad to prepare security report on a regular basis.
04
Jan 2019

Recent Ransomware Affected Multiple US Based Newspaper Publications

Recent Ransomware Affected Multiple US Based Newspaper Publications

The ransomware subsequently targeted the printing and production systems that targeted multiple newspapers. The affected names included Los Angeles Times, New York Times, Wall Street Journal, Chicago Tribune, Post-Tribune, Capital Gazette, Baltimore Sun, Hartford Courant, Carroll County Times, and Lake County News-Sun.

As revealed by a Tribune spokesperson, the malware behind the attacks seems the Ryuk ransomware, as all the affected files had a ".ryk" extension.

Ryuk ransomware gained popularity in August 2018 after a devastating cryptojacking attack that allowed the attackers pilfer Bitcoins worth thousands of dollars. According to a tweet by MHT, the ransomware made the hackers receive more than 400 Bitcoins in about four months.

03
Jan 2019

6 Missed Calls Left Mumbai Businessman Robbed Of Rs. 1.86 Crore

6 Missed Calls Left Mumbai Businessman Robbed Of Rs. 1.86 Crore

A suspected case of SIM card swapping has led to a Mumbai-based textile businessman losing Rs. 1.86 crore from his bank account. There were 28 transactions from his account, the businessman said, but he was not notified as his SIM card had been blocked by those behind the fraud.

"SIM swap" is when criminals gain access to the data and use the OTP that is required to transfer funds. SIM swap is a relatively new and technologically advanced form of fraud that allows hackers to gain access to bank account details, credit card numbers, and other personal data.

The criminals had his bank credentials and phone number. So, if your phone is blocked without consent, please get it reactivated immediately and inform the police if you notice fraudulent transactions.

28
Dec 2018

More than 4,000 jobs in Artificial intelligence lying vacant: Study

More than 4,000 jobs in Artificial intelligence lying vacant: Study

A study on the Indian artificial intelligence (AI) industry by Great Learning, the online education company, indicates there are over 4,000 positions related to AI in India that remain vacant due to shortage of qualified talent at mid and senior levels.

While 57% organisations hiring for AI look for candidates with five-years-plus experience, the average AI experience of Indian professionals is a mere three years.

This supply-demand gap indicates a huge opportunity for mid and senior-level professionals across industries like IT, finance, healthcare, and e-commerce, who are looking to transition into AI, over the next few years.

26
Dec 2018

Hackers Exploit Malware Attacks Through Twitter Memes

Hackers Exploit Malware Attacks Through Twitter Memes

Who doesn't love to scroll through memes and share with friends? But there are some malicious memes floating around in Twitter with hidden malware. When a victim downloads such memes, the malware reaches the victim's device and executes code without alerting the user.

The researchers explained that the hackers exploit this trick using Steganography. In this method, the author hides a malicious payload in an image to evade cybersecurity measures. "The memes contain an embedded command that is parsed by the malware after it's downloaded from the malicious Twitter account onto the victim's machine, acting as a C&C service for the already-placed malware."

As stated, what makes the discovery significant is the reliability of the source bearing the malicious memes, that is, Twitter. Identified as TROJAN.MSIL.BERBOMTHUM.AA. Taking the malicious memes down seemed impossible without suspending the malicious Twitter account.

25
Dec 2018

Apple provided customers' data on Indian government requests

Apple provided customers' data on Indian government requests

For device requests, Apple provided data to the Indian government in 63% of cases and 85% in the cases related to financial identifiers.

The number of requests from India -- in various formats such as subpoenas, court orders, warrants or other valid legal requests -- also included 34 financial identifiers and three emergency requests, Apple said in its bi-annual transparency report released late Monday.

Keeping with the global trends where several tech giants, including Facebook and Twitter, release bi-annually transparency reports, Apple has now launched a new transparency report website which makes it easier to scan data requests from various governments.

23
Dec 2018

NASA confirmed Data Breach after an internal server was Hacked. Warns employees of personal information breach

NASA confirmed Data Breach after an internal server was Hacked. Warns employees of personal information breach

Continuing the trail of data breaches, now NASA joins the list. NASA confirmed a data breach relating to one of their internal servers. Allegedly, the server contained personal information of employees which may have leaked to the hackers, the data included social security numbers.

The agency said all the affected employees would be notified once identified, and offered identity theft protection services and related resources to all affected employees, past and present.

19
Dec 2018

Even a lightbulb could allow hackers to burgle your home

Even a lightbulb could allow hackers to burgle your home

Analysts anticipate that the popularity of these "Internet of Things" devices is poised to grow over the next couple years, with a projected 20.4 billion devices in use by 2020.

That's because many smart home devices are controlled using a central app, like Google's Nest app or Samsung Smart Things. Changing a setting from one smart device might tell that platform to change the behavior of other smart devices.

For instance, imagine you've programmed your smart lightbulbs to turn on once you arrive home. You may also have other smart devices that are programmed to do something while you're home versus away; perhaps your smart alarm system is set to be disabled if you're at home.

If a hacker can access your smart lightbulb and toggle its setting to "at home," they might also be able to control that alarm system, making it possible to disable an alarm to slip into your home undetected, just by messing with your smart bulb settings.

18
Dec 2018

Over 4,000 artificial intelligence job roles vacant on talent shortage: Report

Over 4,000 artificial intelligence job roles vacant on talent shortage: Report

Shortage of qualified talent in the country has left over 4,000 mid and senior-level job positions vacant in the artificial intelligence (AI) sector, a study said Monday.

"The AI industry has grown by close to 30 per cent in the last one year to USD 230 million. Yet, over 4,000 positions in India remain vacant due to shortage of qualified talent at the mid and senior level," the study said.

16
Dec 2018

Samsung bugs could have allowed hackers to hijack users' accounts

Samsung bugs could have allowed hackers to hijack users' accounts

Cross-site request forgery (CSRF) vulnerabilities can allow attackers to trick victims' browsers into executing hidden commands on the websites victims are logged into, but while on the attacker's site.

The three vulnerabilities:
  1. The first vulnerability would have allowed an attacker to change the user's profile details.
  2. The second would have allowed an attacker to disable two-factor authentication.
  3. The third bud would have allowed an attacker to modify a victim's user account security question. This bug could also have been used by the attacker to take over the user account.
Access to a Samsung account allows the attacker to do the following:
  1. Track a user's movements using the Find My Device feature.
  2. Control the user's inter-connected smart devices.
  3. Gain access to the user's health data.
  4. Gain access to private notes, and more.
14
Dec 2018

Even cyber criminals offer discounts, lifetime warranty: Kaspersky

Even cyber criminals offer discounts, lifetime warranty: Kaspersky

Criminals can sell someone's complete digital life for less than $50; including data from stolen social media accounts, banking details, remote access to servers or desktops, and even data from popular services like Uber, Netflix, and Spotify, as well as gaming websites, dating apps, and porn websites which might store credit card information.

Meanwhile, researchers found that the price paid for a single hacked account is lower, with most selling for about $1 per account, and with criminals offering up discounts for bulk-buying," the Kaspersky report said.

It added: "Interestingly, some criminals selling data even provide their buyers with a lifetime warranty, so if one account stops working, the buyer will receive a new account for free."

In the report, Kaspersky has warned that people should stop using the same password for different accounts.

14
Dec 2018

Encrypted Messaging Apps including WhatsApp, Telegram, and Signal are vulnerable to side-Channel Attacks

Encrypted Messaging Apps including WhatsApp, Telegram, and Signal are vulnerable to side-Channel Attacks

While things looked good with regards to encryption, a recent study by Cisco Talos has revealed most of these popular, supposedly secure IM apps like Whatsapp, telegram and Signal are vulnerable to side-channel attacks.

Telegram is found to be highly vulnerable to desktop session hijacking attacks. Though any additional sessions by an attacker may become evident from the settings, an average user might not find it easily.

Likewise, such desktop session hijacking attacks can also affect Signal and WhatsApp users. In the case of Signal, the app handles session hijack attacks as race condition, where the victim will receive error notifications on the desktop client. While an average user will think of it as a mere error, the attacker would succeed in accessing the chats and contacts.

Similarly, in the case of WhatsApp, the victim will clearly receive notification for additional sessions, which he may deny. Nonetheless, during all this time, the attacker has a clear access to the victim's previous conversations and contacts.

04
Dec 2018

Quora says hackers stole up to 100 million users' data

Quora says hackers stole up to 100 million users' data

Quora said it discovered last week that hackers broke into its systems and were able to make off with data on up to 100 million users. That data could have included a user's name, email address, and an encrypted version of their password.

If a user imported data from another social network, like their contacts or demographic information, that could have been taken too. "We have engaged leading digital forensic and security experts and launched an investigation, which is ongoing. We have notified law enforcement officials."

It said it was also in the process of notifying all affected customers and reassured them that it was "highly unlikely" that the incident would lead to identity theft "as we do not collect sensitive information like credit card or social security numbers".

28
Nov 2018

Google Faces GDPR Complaints Over Web, Location Tracking

Google Faces GDPR Complaints Over Web, Location Tracking

Consumer organizations in seven countries plan to file complaints alleging that Google is violating Europe's data protection regulation. The challenge takes square aim at the company's lucrative targeted advertising business, which depends on a rich stream of data.

An issue in the new complaints against Google is how it obtains permission to collect the location of users, as well as their browsing data and interactions with mobile apps. Such data-gathering is enabled - or disabled - via Google's Location History and Web & App Activity settings, which apply across desktop computers as well as all Android-based mobile devices.

The European consumer organization BEUC alleges that Google uses confusing and contradictory language in describing these features as well as misleading menus that nudge users into enabling these features or keeping them active.

27
Nov 2018

MacOS Penetration Test Reveals Three Zero-Day Vulnerabilities

MacOS Penetration Test Reveals Three Zero-Day Vulnerabilities

Syndis, a Cyber Security firm was engaged by DropBox to perform this pen test. Syndis uncovered three critical Zero-Day vulnerabilities in the Mac OS platform. These include CVE-2017-13890, CVE-2018-4176, CVE-2018-4175. The findings reportedly indicated towards the possibility of a cyber attack, if the hacker knew of these three vulnerabilities and exploited them together.

In other words, if a hacker designs malicious code and induces a DropBox employee to visit the same from a Safari Browser, the cyber attack could be successful.

16
Nov 2018

IRCTC wakes up after 2 years to fix its security bug

IRCTC wakes up after 2 years to fix its security bug

It took nearly two years for India's largest ecommerce website, Indian Railway Catering and Tourism Corporation (IRCTC), to fix a security vulnerability that could have given hackers unfettered access to the personal information of passengers.

The bug would have given attackers access to passenger details such as name, age, gender and insurance nominees without their knowledge or consent. Interestingly, the Indian Railways decided to stop free mandatory travel insurance from September 1, allowing users to instead opt-in or opt-out of travel insurance

14
Nov 2018

India has been the target of over 4.3 Lakh cyber attacks from five countries

India has been the target of over 4.3 Lakh cyber attacks from five countries

The countries include China, Russia and the US while more than 73,000 attacks were initiated from India between January and June this year, a Finnish cyber-security company said.

"The relatively higher number of inbound attacks on Indian honeypots reflects how the fast-digitising country is becoming more lucrative for global cyber criminals.," Leszek Tasiemski, Vice President of cyber security products R&D at F-Secure, said in a statement on Sunday.

13
Nov 2018

Critical WordPress zero-day vulnerability allows hackers to conduct privilege escalation attacks

Critical WordPress zero-day vulnerability allows hackers to conduct privilege escalation attacks

Cybercriminals are exploiting a privilege escalation zero-day vulnerability present in WP GDPR Compliance - a WordPress plugin - that aids website owners to become GDPR complaint. The vulnerable plugin is reportedly used by more than 100,000 users and all of them are now feared to be exposed to malicious backdoor attacks.

Two critical exploits are found.

The first exploit allows modification of users' registration settings. Meanwhile, the second exploit involves injecting malicious scheduled actions to be executed by WP-Cron. Both these attacks use different types of backdoor scripts, researchers said.

The vulnerability was patched in the newer updated version 1.4.3. Meanwhile, all sites running version 1.4.2 and older versions are still vulnerable to this exploit.

07
Nov 2018

Mining Bitcoin Takes 3 Times More Energy Than Extracting Gold or Copper, New Research Says

Mining Bitcoin Takes 3 Times More Energy Than Extracting Gold or Copper, New Research Says

Researchers at the Oakridge Institute for Science and Education in Ohio also compared the energy consumption required to mine other cryptocurrencies, which were all found to be generally higher than that of gold.

Cryptocurrency mining is a process in which a "miner" packages a block of cryptocurrency transactions into a blockchain, a ledger of transactions.

The work requires powerful computers, servers, and cooling devices, which all add to growing energy costs. In some countries, energy costs make purchasing a Bitcoin as expensive as mining one.

The power demand associated with Bitcoin mining is predicted to triple this year and if it does, the energy consumption required to mine cryptocurrency will surpass that of entire countries.

04
Nov 2018

5G (and even 6G) could put your business at risk for a cyberattack

5G (and even 6G) could put your business at risk for a cyberattack

The next generation of wireless networking standards could leave critical security gaps open, according to University of Dundee research.

"In its current state, 5G does not close all the security gaps, which could result in numerous cyber-attacks and users being charged for the mobile phone usage of a third party," University of Dundee's Saša Radomirovic said. And while the team has proposed fixes, they "remain concerned about are the less than perfect privacy protections it provides leaving users vulnerable to targeted attacks," Radomirovic said.

01
Nov 2018

83% Avoid a Business Following Breach and 21% Never Return

83% Avoid a Business Following Breach and 21% Never Return

Almost half (44%) of US consumers have suffered the negative consequences of a security breach or hack, according to new research conducted on behalf of secure payments provider to contact centers, PCI Pal.

The research found that 83% of consumers will stop spending with a business for several months in the immediate aftermath of a security breach or a hack. Even more significantly, over a fifth (21%) of consumers will never return to a brand or a business post-breach, representing a significant loss of revenue. For any consumer facing business, this figure offers a stark warning.

Exclusive Blog

Read All Exclusive Blog »
Cyber Criminals are turning into Cryptominers, Dominating Cyber Threat Landscape
Cyber Criminals are turning into Cryptominers, Dominating Cyber Threat Landscape

According to Check Point, during the period July to December 2017, one in five Organizations are affected by crypto mining malware, tools that enable cybercriminals to hijack the victim's CPU or GPU power and existing resources to mine cryptocurrency, using as much as 65% of the end-users CPU power.

Read Details

Hacking Tools

Explore All Hacking Tools »
UFTP - UDP based FTP with encryption
UDP based FTP with encryption

UFTP is an encrypted multicast file transfer program for secure, reliable & efficient transfer of files. It also helps in data distribution over a satellite link.

Read Details