Monday, December 11, 2017

Tag Archives: hacking

Wikileaks Unveils Project Protego: CIA’s Secret Missile Control System

Wikileaks Unveils Project Protego

Every week since March wikileaks has been leaking secrets from the United States Central Intelligence Agency (CIA), which mainly focus on surveillance techniques and hacking tools employed by its agents. However this time, the whistleblower organisation has released something different from its previous Vault 7 leaks, because it’s not about hacking and spying; instead, it’s a—Missile Control System. Dubbed Project Protego, the PIC-based missile …

Read More »

Policing facing a ‘perfect storm’ due to budget cuts and rising crime

cyber crime

Policing in England and Wales is facing a “perfect storm” due to staff shortages and rising crime, a senior police chief is expected to say. Policing services are routinely based on fewer people working more hours and days, Ch Supt Gavin Thomas will warn. The president of the Police Superintendents’ Association of England and Wales will say such a model …

Read More »

WireX DDoS Botnet: An Army of Thousands of Hacked Android SmartPhones

WireX-Android-DDoS-Botnet

WireX-Do you believe that just because you have downloaded an app from the official app store, you’re safe from malware? Think twice before believing it. A team of security researchers from several security firms have uncovered a new, widespread botnet that consists of tens of thousands of hacked Android smartphones. Dubbed WireX, detected as “Android Clicker,” the botnet network primarily …

Read More »

Beware! Viral Sarahah App Secretly Steals Your Entire Contact List

Beware! Viral Sarahah App Secretly Steals Your Entire Contact List

Are you also one of those 18 Million users using SARAHAH? You should beware of this app because the anonymous feedback application may not be as private as it really sounds. Sarahah is a newly launched app that has become one of the hottest iPhone and Android apps in the past couple of weeks, allowing its users to sign up …

Read More »

Telegram Hacked? Turn ON Important Security Settings to Secure your Private Chats

Telegram Hacked? Turn ON Important Security Settings to Secure your Private Chats

Telegram Hacked? Telegram – We have heard a lot about data breaches nowadays. And if you think that switching to an encrypted messaging service may secure you and your data, then you may be wrong. No good deed today can help you protect yourself completely. Reuters and several media outlets are reporting that the phone numbers of 15 Million users in Iran and more …

Read More »

NSA wants to Exploit Internet of Things and Biomedical Devices

NSA wants to Exploit Internet of Things and Biomedical Devices : NSA – The cyber attack vectors available to hackers will continue to grow as the Internet of Things (IoTs)become more commonplace, making valuable data accessible through an ever-widening selection of entry points. Although it’s not the hackers alone, the NSA is also behind the Internet of Things. We already know …

Read More »

Iran orders all Messaging Apps to store its citizens’ data within Country

Last year, Iran blocked Telegram and many other social networks after their founders refused to help Iranian authorities to spy on their citizens. Now it looks like Iranian government wants tighter controls on all foreign messaging and social media apps operating in the country that will give the authorities a wider ability to monitor and censor its people.   All …

Read More »

Alexa, Are You Spying On Me? Not Really, Maybe, It’s Complex!

Alexa, Are You Spying On Me? Not Really, Maybe, It's Complex!

Alexa, Are You Spying On Me? Not Really, Maybe, It’s Complex! Alexa – Do you own an Amazon Echo? So are you also worried about hackers turning out your device into a covert listening device? Just relax, if there’s no NSA, no CIA or none of your above-skilled friends after you. Since yesterday there have been several reports on Amazon Echo …

Read More »

Apple Users, Beware! A Nearly-Undetectable Malware Targeting Mac Computers

Apple Users, Beware! A Nearly-Undetectable Malware Targeting Mac Computers

Apple Users, Beware! A Nearly-Undetectable Malware Targeting Mac Computers : Malware – Yes, even Mac could also get viruses that could silently spy on its users. So, if you own a Mac and think you are immune to malware, you are wrong. An unusual piece of malware that can remotely take control of webcams, screen, mouse, keyboards, and install additional …

Read More »

THN Weekly Roundup — 10 Most Important Stories You Shouldn’t Miss

THN Weekly Roundup — 10 Most Important Stories You Shouldn't Miss

THN Weekly Roundup — 10 Most Important Stories You Shouldn’t Miss Stories – Here we are with our weekly roundup, briefing this week’s top cyber security threats, incidents and challenges. This week has been very short with big news from shutting down of two of the largest Dark Web marketplaces and theft of millions of dollars in the popular Ethereum …

Read More »

New Linux Malware Exploits SambaCry Flaw to Silently Backdoor NAS Devices

New Linux Malware Exploits SambaCry Flaw to Silently Backdoor NAS Devices

Remember SambaCry? Almost two months ago, we reported about a 7-year-old critical remote code execution vulnerability in Samba networking software, allowing a hacker to remotely take full control of a vulnerable Linux and Unix machines. We dubbed the vulnerability as SambaCry, because of its similarities to the Windows SMB vulnerabilityexploited by the WannaCry ransomware that wreaked havoc across the world over two months ago. …

Read More »

Private Decryption Key For Original Petya Ransomware

Private Decryption Key For Original Petya RansomwarePrivate Decryption Key For Original Rejoice Petya Ransomware

Rejoice Petya-infected victims! Rejoice Petya – The master key for the original version of the Rejoice Petya ransomware has been released by its creator, allowing Petya-infected victims to recover their encrypted files without paying any ransom money. But wait, Rejoice Petya is not NotPetya. Do not confuse Petya ransomware with the latest destructive NotPetya ransomware (also known as ExPetr and Eternal Petya) …

Read More »

CouchPotato: CIA Hacking Tool to Remotely Spy On Video Streams in Real-Time

CouchPotato: CIA Hacking Tool to Remotely Spy On Video Streams in Real-Time

CouchPotato: CIA Hacking Tool to Remotely Spy On Video Streams in Real-Time Hacking Tool – After disclosing CIA’s strategies to hijack and manipulate webcams and microphones to corrupt or delete recordings, WikiLeaks has now published another Vault 7 leak, revealing CIA’s ability to spy on video streams remotely in real-time. Dubbed ‘CouchPotato,’ document leaked from the CIA details how the CIA agents use a remote tool …

Read More »

Ukrainian Man Arrested For Distributing NotPetya Ransomware And Helping Tax Evaders

Ukrainian Man Arrested For Distributing NotPetya Ransomware And Helping Tax Evaders

Criminal – Ukrainian authorities have arrested a 51-year-old man accused of distributing the infamous Petya ransomware (Petya.A, also known as NotPetya) — the same computer virus that massively hit numerous businesses, organisations and banks in Ukraine as well as different parts of Europe around 45 days ago. However, the story is not as simple as it seems, which portrayed this man as …

Read More »

How Just Opening A Malicious PowerPoint File Could Compromise Your PC

How Just Opening A Malicious PowerPoint File Could Compromise Your PC

How Just Opening A Malicious PowerPoint File Could Compromise Your PC PowerPoint – A few months back we reported how opening a simple MS Word file could compromise your computer using a critical vulnerability in Microsoft Office. The Microsoft Office remote code execution vulnerability (CVE-2017-0199) resided in the Windows Object Linking and Embedding (OLE) interface for which a patch was issued in April …

Read More »