Breaking News

Friday 13 May 2016

The Pirate Bay loses its Main Domain Name in Court Battle




The Pirate Bay has fought many legal battles since its launch in 2003 to keep the website operational for the last 13 years.

However, this time The Pirate Bay is suffering a major blow after the Swedish Court ruled Thursday that it will take away the domain names 'ThePirateBay.se' and 'PirateBay.se' of the world's most popular torrent website and will hand over them to the state.

As its name
Read more ...

Second Bank hit by Malware attack similar to $81 Million Bangladesh Heist




SWIFT, the global Society for Worldwide Interbank Financial Telecommunications, warned on Thursday of a second malware attack similar to the Bangladesh central bank hack one that led to $81 million cyber heist.

In February, $81 Million cyberheist at the Bangladesh central bank was carried out by hacking into SWIFT, the global financial messaging system that thousands of banks and companies
Read more ...

Mozilla asks Court to disclose Firefox Exploit used by FBI to hack Tor users




Mozilla has filed a brief with a U.S. District Court asking the FBI to disclose the potential vulnerabilities in its Firefox browser that the agency exploited to unmask TOR users in a criminal investigation.

Last year, the FBI used a zero-day flaw to hack TOR browser and de-anonymize users visiting child sex websites.

Now, Mozilla is requesting the government to ask the FBI about the details
Read more ...

Thursday 12 May 2016

Kernel Backdoor found in Gadgets Powered by Popular Chinese ARM Maker




How to Hack an Android device?

It is possibly one of the most frequently asked questions on the Internet.

Although it's not pretty simple to hack Android devices and gadgets, sometimes you just get lucky to find a backdoor access.

Thanks to Allwinner, a Chinese ARM system-on-a-chip maker, which has recently been caught shipping a version of Linux Kernel with an incredibly simple and
Read more ...

Hacker reports Vulnerability in Mr. Robot Season 2 Website




Mr. Robot was the biggest 'Hacking Drama' television show of 2015 and its second season will return to American TV screens on Wednesday 13th of July 2016.

However, the new promotional website for season two of Mr. Robot has recently patched a security flaw that could have easily allowed a hacker to target millions of fans of the show.

A White Hat hacker going by the alias Zemnmez discovered
Read more ...

Wednesday 11 May 2016

Pornhub Launches Bug Bounty Program; Offering Reward up to $25,000




With the growing number of cyber attacks and data breaches, a significant number of companies and organizations have started Bug Bounty Programs to encourage hackers and security researchers to find and responsibly report bugs in their services and get a reward.

Now, even pornography sites are starting to embrace bug bounty practices in order to safeguard its user's security.
Read more ...

Facebook Open Sources its Capture the Flag (CTF) Platform




Hacking into computer, networks and websites could easily land you in jail. But what if you could freely test and practice your hacking skills in a legally safe environment?

Facebook just open-sourced its Capture The Flag (CTF) platform to encourage students as well as developers to learn about cyber security and secure coding practices.

Capture the Flag hacking competitions
Read more ...

WhatsApp launches Desktop Software for Windows and Mac Users




The most popular messaging app WhatsApp now has a fully functional desktop app – both for Mac as well as Windows platform.

Facebook-owned WhatsApp messaging software has been a mobile-only messaging platform forever, but from Tuesday, the company is offering you its desktop application for both Windows and OS X.

Few months back, WhatsApp launched a Web client that can be run
Read more ...

British Hacker Wins Legal Battle Over Encryption Keys






In Brief
Britain's top crime fighting force has failed in a legal attempt to force alleged hacker Lauri Love to hand over his hard disk's encryption keys. In a landmark case, District Judge Nina Tempia said the investigative agency should have used the normal police powers rather than a civil action to obtain the evidence. Lauri Love, a 31-year-old hacker, has been accused of aiding
Read more ...

Tuesday 10 May 2016

Top 4 Data Breaches reported in last 24 Hours




There is no doubt that data breaches are on the rise. Hardly a day goes without headlines about any significant data breach.

According to the latest ‘Cyber Security Breaches Survey 2016’ report published by UK government, two-thirds of the biggest firm in the UK have experienced at least a cyber attacks or data breaches within the past 12 months.

Here’s today, I am writing about top 4 data
Read more ...

Hacker Arrested after Exposing Flaws in Elections Site




A security researcher responsibly disclosed vulnerabilities in the poorly secured web domains of a Florida county elections, but he ended up in handcuffs on criminal hacking charges and jailed for six hours Wednesday.

Security researcher David Michael Levin, 31, of Estero, Florida was charged with three counts of gaining unauthorized access to a computer, network, or electronic instrument.

Read more ...

FCC takes initiative to Speed Up Mobile Security Updates






In Brief
The Smartphone users are fed up with slow security updates, so two United States federal agencies have launched an official inquiry to know how manufacturers and carriers deal with mobile phone security updates and what they are doing to roll out patches as quickly as possible.

The Smartphone patch update mechanism is broken, and someone has to fix it.

Most smartphone models are
Read more ...

Monday 9 May 2016

How to Use Apple's iMessage on Android Phone




If you wish to send iMessages from your Android smartphone to a friend who owns an iPhone, it's possible now, at least for those who own MacBooks and iMacs.

A developer has come up with a smart solution to bring Apple's iPhone messaging platform to Android phones. Though the solution is not practical for most people, technical people and nerds can use it to send end-to-end encrypted iMessages
Read more ...

Saturday 7 May 2016

Critical Qualcomm flaw puts millions of Android devices at risk




Google has patched a high-severity vulnerability that has been around for the last five years, potentially leaving users' text messages, call histories, and other sensitive data open to snooping.

The vulnerability, CVE-2016-2060, affects Android versions 4.3 and earlier that use the software package maintained by mobile chipmaker Qualcomm, according to a blog post published by security firm
Read more ...

This 10-year-old Boy becomes the youngest Bug Bounty Hacker




"Talent has no Age Limit"

That’s what I said for a 10-year-old Finnish boy on our official Facebook page while sharing his recent achievement with our readers i.e. Winning $10,000 bug bounty from Instagram.

Last Tuesday when we at The Hacker News first acknowledged this talented boy and the flaw he discovered in image-sharing social network Instagram, I did not have an idea that the Facebook
Read more ...

Founder of 'Liberty Reserve' Sentenced to 20 years in Prison






In Brief
Arthur Budovsky, co-founder of popular digital currency business 'Liberty Reserve', was sentenced Friday to 20 years in prison for running a money laundering scheme for hackers, identity thieves, child pornographers and drug dealers around the globe.

Since its inception, 2005, to the year 2013, when Liberty Reserve was shut down by authorities, the company processed more than $8
Read more ...

Thursday 5 May 2016

U.S. developing Technology to Identify and Track Hackers Worldwide




Without adequate analysis and algorithms, mass surveillance is not the answer to fighting terrorism and tracking suspects.

That's what President Obama had learned last year when he signed the USA Freedom Act, which ends the bulk collection of domestic phone data by US Intelligence Agencies.

There is no doubt that US Government is collecting a vast quantity of data from your smartphone to
Read more ...

Want to Use Quantum Computer? IBM launches One for Free






In Brief
What would you do if you get access to a Quantum Computer? IBM Scientists launches the world’s first cloud-based quantum computing technology, calling the IBM Quantum Experience, for anyone to use. It is an online simulator that lets anyone run algorithms and experiments on the company's five-qubit quantum computer.

Quantum computers are expected to take the computing technology to
Read more ...

High-Severity OpenSSL Vulnerability allows Hackers to Decrypt HTTPS Traffic




OpenSSL has released a series of patches against six vulnerabilities, including a pair of high-severity flaws that could allow attackers to execute malicious code on a web server as well as decrypt HTTPS traffic.

OpenSSL is an open-source cryptographic library that is the most widely being used by a significant portion of the Internet services; to cryptographically protect their sensitive Web
Read more ...

Hacker is Selling 272 Million Email Passwords for Just $1




A massive database of 272 million emails and passwords for popular email services, including Gmail, Microsoft, and Yahoo, are being offered for sale on the Dark Web for less than $1, media reports.

An anonymous Russian hacker, who goes by the moniker "the Collector," was first spotted by cybersecurity firm Hold Security advertising 1.17 Billion user records for email accounts on a dark web
Read more ...

Wednesday 4 May 2016

Warning — Widely Popular ImageMagick Tool Vulnerable to Remote Code Execution




A serious zero-day vulnerability has been discovered in ImageMagick, a widely popular software tool used by a large number of websites to process user's photos, which could allow hackers to execute malicious code remotely on servers.

ImageMagick is an open-source image processing library that lets users resize, scale, crop, watermarking and tweak images.

The ImageMagick tool is supported by
Read more ...

Tuesday 3 May 2016

Craig Wright Will Move Satoshi Nakamoto's Bitcoin to Prove His Claim




Yesterday, BBC broke a story allegedly revealing Craig Wright as the original creator of Bitcoin digital currency Satoshi Nakamoto.

However, the highly skeptical cryptographic community is definitely not yet convinced with the technical proofs Wright has yet provided to the media outlets and on his blog.

Now, Wright has promised to provide further evidence for his claim that he is behind the
Read more ...

Russian Hacker Who Stole From Banks Ordered to Pay $7 Million




A Russian man who spent about 3 years behind bars in the United States has been spared further prison time but ordered to pay $7 Million to cover damages he caused to banks using a vicious computer virus.

Nikita Vladimirovich Kuzmin was arrested in 2010 and imprisoned in August 2011 for developing a sophisticated computer malware called Gozi and infecting more than 1 million computers
Read more ...

Brazil blocks WhatsApp for 72-Hours — Here's Why






In Brief
For the second time in past five months, a Brazil court ordered local telecommunications companies to block the popular messaging app WhatsApp for 72 hours, afterFacebook-owned WhatsApp company refused to hand over information requested in a drug trafficking investigation. The WhatsApp's shutdown is affecting more than 100 million users throughout the country. Moreover, if Brazilian
Read more ...

Monday 2 May 2016

Car Hackers Could Face Life In Prison. That's Insane!




Yes, you heard it right.

You can now end up your whole life behind bars if you intentionally hack into a vehicle's electronic system or exploit its internal flaws.

Car Hacking is a hot topic. Today, many automobiles companies are offering cars that run mostly on the drive-by-wire system, which means the majority of functions are electronically controlled, from instrument cluster to steering,
Read more ...

Bitcoin Creator Has Finally Unmasked Himself. Maybe, Real?




The mysterious creator of the BITCOIN digital cryptocurrency seems to have been identified as an Australian entrepreneur, and his name is:

Craig Steven Wright.

Five months after Wright, an Australian computer scientist and businessman was outed as Satoshi Nakamoto, revealed himself as the original inventor of Bitcoin digital currency.

Wright has published a blog post offering Cryptographic
Read more ...

Friday 29 April 2016

Ransomware Virus Shuts Down Electric and Water Utility




Ransomware has become an albatross around the neck, targeting businesses, hospitals, and personal computers worldwide and extorting Millions of Dollars.

Typical Ransomware targets victim's computer encrypts files on it, and then demands a ransom -- typically about $500 in Bitcoin -- in exchange for a key that will decrypt the files.

Guess what could be the next target of ransomware malware?
Read more ...

Microsoft to Store Data on DNA — 1,000,000,000 TB in Just a Gram






In Brief
Do you know — 1 Gram of DNA Can Store 1,000,000,000 Terabyte of Data for 1000+ Years.

Microsoft has purchased 10 Million strands of synthetic DNA, called Oligonucleotides a.k.a. DNA molecules, from biology startup Twist and collaborated with researchers from University of Washington to explore the idea of using synthetic DNA to store huge amount of data.

Microsoft is planning to
Read more ...

U.S. Supreme Court allows the FBI to Hack any Computer in the World






In Brief
The US Supreme Court has approved amendments to Rule 41, which now gives judges the authority to issue search warrants, not only for computers located in their jurisdiction but also outside their jurisdiction.

Under the original Rule 41, let’s say, a New York judge can only authorize the FBI to hack into a suspect's computer in New York.

But the amended rule would now make it
Read more ...

Thursday 28 April 2016

In-Brief: Telegram Vulnerability, Malware in Nuclear Plant, Anti-Tor Malware and Hotpatching Exploit





Clickjacking Vulnerability in Telegram Web Client
The official Telegram web-client that allows its users to access messenger account over desktop’s web browser is vulnerable to clickjacking web application vulnerability.

Egyptian security researcher Mohamed A. Baset told The Hacker News about a flaw in Telegram that could allow an attacker to change sensitive information of a Telegram user,
Read more ...

Child Porn Suspect Held in Jail for 7 Months for refusing to Decrypt Hard Drives






In Brief
A suspect of child pornography possession, Francis Rawls, who is a former Philadelphia Police Department sergeant, has been in solitary confinement without charges for last seven months and will remain until he complies with a court order forcing him to decrypt his password-protected hard drives seized in connection with a child pornography investigation.

Remember Ramona Fricosu?
Read more ...

Former Tor Developer Created Malware for FBI to Unmask Tor Users






In Brief
According to an investigation, Matthew Edman, a cyber security expert and former employee of the Tor Project, helped the FBI with Cornhusker a.k.a Torsploit malware that allowed Feds to hack and unmask Tor users in several high-profile cases, including Operation Torpedo and Silk Road.

Do you know who created malware for the FBI that allowed Feds to unmask Tor users?

It's an
Read more ...

PLATINUM Hackers Hijack Windows Hotpatching to Stay Hidden






In Brief
The Microsoft’s Windows Defender Advanced Threat Hunting team detected that a cyber espionage group of hackers, known as PLATINUM, has found a way to turn the Windows's Hotpatching technique (a way of updating the operating system without requiring a restart) to hide its malware from Antivirus products.

PLATINUM group has been active since 2009 and launching large-scale attacks
Read more ...

Wednesday 27 April 2016

This Tiny Computer has no Battery, Powered Wirelessly from Radio Waves




No matter how smart and fast your devices would be, the biggest issue is always with the battery technology.

Whenever you go to buy any electronic gadget — smartphone, laptop, or any wearable — the most important specification isn’t its processor speed or its camera quality but its Battery Backup, which is not getting better any time soon.

What if you could eliminate the very thing entirely
Read more ...

For the First time, FBI discloses a Flaw to Apple, but it's already Patched!






In Brief
The Federal Bureau of Investigation (FBI) made its first disclosure about a software security flaw to Apple under the Vulnerability Equities Process (VEP), a White House initiative created in April 2014 for reviewing flaws and deciding which ones should be made public.

Unfortunately, the vulnerability reported by the federal agency only affected older versions of Apple’s iOS and OS
Read more ...

Tuesday 26 April 2016

Pro-ISIS Hackers release 'Kill List' Of 43 United States Officials






In Brief
A group of pro-ISIS hackers calling themselves the United Cyber Caliphate (UCC) has issued a "Kill List" containing the names of dozens of U.S. government personnel at the Pentagon, Department of Homeland Security, State Department, and several other federal agencies.

Meanwhile, the US military’s Cyber Command has announced to launch its first attack against ISIS' digital
Read more ...

In-Brief: Spotify Hack, Secret of Chrome OS, MIT Bug Bounty, Nanowire Batteries





1. Spotify Hacked! Change your Password ASAP

If you are one of the millions of people around the world who love to listen to music on Spotify, you may need to change your password immediately.

Has Spotify been hacked? The company says no, but some Spotify users have claimed their profiles were hijacked, and details were changed without knowledge, including passwords and email addresses, TC 
Read more ...

Laser Gun to Detect Bombs and Chemical Weapons from 100 Feet Away






In Brief
US-based Intelligence Advanced Research Projects Activity (IARPA) agency is sponsoring a program to build portable laser sensors that could detect explosives, narcotics and other dangerous chemical weapons from 100 feet away.

Dubbed SILMARILS (Standoff Illuminator for Measuring Absorbance and Reflectance Infrared Light Signatures), the program aims to identify biological agents as
Read more ...

DDoS Extortionists made $100,000 without Launching a Single Attack






In Brief
Cyber crooks find a new and ingenious way to make hundreds of thousands of dollars with no effort.

An unknown cyber gang, pretending to be Armada Collective, has made more than $100,000 in less than two months simply by threatening to launch DDoS attack on websites, but never actually launched a single attack.

A group of Cyber Extortionists is sending threatening emails to
Read more ...

Monday 25 April 2016

How Did Hackers Who Stole $81 Million from Bangladesh Bank Go Undetected?






In Brief
Investigators from British defense contractor BAE Systems discovered that hackers who stole $81 million from the Bangladesh Central Bank actually hacked into software from SWIFT financial platform, a key part of the global financial system.

The hackers used a custom-made malware to hide evidence and go undetected by erasing records of illicit transfers with the help of compromised
Read more ...

Saturday 23 April 2016

​DARPA Wants To Build Ultra Secure Messaging App for US Military




Just last month, DARPA launched a project dubbed "Improv," inviting hackers to transform simple household appliances into deadly weapons.

Now, the Defense Advanced Research Projects Agency is finding someone in the private sector to develop a hacker-proof "secure messaging and transaction platform" for the U.S. military.

Darpa wants researchers to create a secure messaging and transaction
Read more ...

Bank with No Firewall. That's How Hackers Managed to Steal $80 Million






In Brief
Investigators from the Forensic Training Institute of the Bangladesh investigated the $80 Million bank heist and discovered that the hackers managed to gain access to the network because the Bank was using second-hand $10 network switches without a Firewall to run its network.

When it was reported last month that an unknown hacking group attempted to steal $1 Billion from
Read more ...

Friday 22 April 2016

Hacker Installed a Secret Backdoor On Facebook Server to Steal Passwords




How to Hack Facebook?

That’s the most commonly asked question during this decade.

It’s a hacker dream to hack Facebook website for earning bug bounty or for any malicious purpose.

Facebook security team recently found that someone, probably a blackhat hacker with malicious intent, has breached into its server and installed a backdoor that was configured to steal Facebook employees' login
Read more ...

More than 1 million People now access Facebook Over Tor Network






In Brief
Facebook has hit another Milestone: More than 1 MILLION people, or you can say privacy conscious, are accessing Facebook over TOR.

Facebook proudly announced today that, this month, for the first time, the people connected to the anonymous version of Facebook that's accessible only through the TOR anonymity network exceeded 1 Million – an increase of almost 100% in the past ten
Read more ...

Sony PlayStation Network to Get Two-Factor Authentication






In Brief:
Sony is finally bolstering the security of the PlayStation Network by adding Two-Factor Authentication to the servers — almost five years after a massive hack that exposed data of over 77 Million users.

Sony confirmed to Polygon today that it is planning to introduce two-factor verification to its PlayStation Network widely soon after a Twitter user saw a reference to it in the
Read more ...

FBI paid Hacker $1.3 Million to Unlock San Bernardino Shooter's iPhone






In Brief
Guess how much the FBI has paid an unknown grey-hat hacker to break into San Bernardino Shooter's iPhone?

FBI Director James Comey hinted during an interview that the FBI spent more than $1.3 Million for breaking into the iPhone of a suspected terrorist and found nothing useful on it.

Apple's legal battle with the Federal Bureau of Investigation (FBI) ended following the bureau's
Read more ...

Thursday 21 April 2016

Encrypted Smartphone Network Seized by Dutch Police for Criminal Investigation




On Tuesday, the Dutch Police arrested a 36-year-old man, Danny Manupassa, on suspicion of money laundering and involvement in selling encrypted smartphones to criminals.

Manupassa owns a company called Ennetcom, which provides customized Blackberry Phones with the secure PGP-encrypted network.

Reportedly, Ennetcom sold nearly 19,000 encrypted cell phones at 1500 euros each in last few years.
Read more ...

Opera Browser Now Offers Free and Unlimited Built-in VPN Service






In Brief
Opera becomes the first web browser to offer a built-in Free, unlimited and 256-bit encrypted VPN service for everyone.

Opera's Free VPN protects unencrypted browser session from leaking on public WiFi networks and will also let unblock firewalls to improve privacy and security.

Virtual Private Networks (VPNs) have become an important tool not just for large companies, but also
Read more ...

Creators of SpyEye Virus Sentenced to 24 Years in Prison






In Brief
Two International hackers, Aleksandr Andreevich Panin and Hamza Bendelladj, have been sentenced to a combined 24 years and 6 months in prison for their roles in developing and distributing SpyEye banking trojan, a powerful botnet similar to the infamous ZeuS malware.

Both hackers were charged with stealing hundreds of millions of dollars from banking institutions worldwide.

Read more ...

Wednesday 20 April 2016

Researcher releases Free Ransomware Detection Tool for Mac OS X Users






In Brief:
Introducing RansomWhere, a free generic ransomware detection tool for Mac OS X users that can identify ransomware-like behavior by continually monitoring the file-system for the creation of encrypted files by suspicious processes.

This ransomware detection tool helps to block the suspicious processes and waits for the user to decide whether to allow or stop the process.

Read more ...

China wants Apple's Source Code, but the Company Refused






In Brief
Apple's head of legal has denied all rumors about providing its complete source code or any backdoor to the Chinese government.

Apple officially confirmed that the Chinese government has asked Apple twice in the past two years to hand over the source code for its operating system, but the company refused in both the cases.

In a Tuesday hearing entitled "Deciphering the Debate Over
Read more ...

Tuesday 19 April 2016

Viber adds End-to-End Encryption and PIN protected Hidden Chats features






In Brief
Viber, the popular mobile messaging app announced Tuesday that it has added full end-to-end encryption for video, voice and text message services for its millions of users.

Here, the end-to-end encryption means only you and the person you are communicating with can read the content, and nobody in between, not even the company and if court orders company to provide user data, they
Read more ...

MIT builds Artificial Intelligence system that can detect 85% of Cyber Attacks






In Brief
What if we could Predict when a cyber attack is going to occur before it actually happens and prevent it? Isn't it revolutionary idea for Internet Security?

Security researchers at MIT have developed a new Artificial Intelligence-based cyber security platform, called 'AI2,' which has the ability to predict, detect, and stop 85% of Cyber Attacks with high accuracy.

Cyber security
Read more ...

Google makes it mandatory for Chrome Apps to tell Users what Data they collect






In Brief
Chrome apps and extensions make things easier, but they can also do terrible things like spy on web users and collect their personal data.

But, now Google has updated its browser’s User Data Policy requiring all Chrome extension and app developers to disclose what data they collect.

Furthermore, developers are prohibited from collecting unnecessary browsing data and must also use
Read more ...

Hackers can spy on your calls and track location, using just your phone number






In Brief

The famous ‘60 Minutes’ television show shocked some viewers Sunday evening when a team of German hackers demonstrated how they spied on an iPhone used by U.S. Congressman, then recorded his phone calls and tracked his movement through Los Angeles.

Hackers leverage a security flaw in SS7 (Signalling System Seven) protocol that allows hackers to track phone locations, listen in on
Read more ...

Friday 15 April 2016

Canadian Police obtained Master Key to Crack BlackBerry Messenger Encryption





BlackBerry has long been known for its stance on mobile security, as it was the first mobile phone maker to provide end-to-end encryption. But a new report revealed that the company has provided a master backdoor to law enforcement in its secure devices since 2010.



The Royal Canadian Mounted Police (RCMP) have been in possession of a global decryption key for BlackBerry phones since 2010,
Read more ...

Report: Nothing useful found on San Bernardino Shooter's iPhone





The San Bernardino terrorist's iPhone that the Department of Justice (DoJ) and the Federal Bureau of Investigation (FBI) said was critical in their investigation has absolutely nothing useful on it, at least so far.



Yes, the same iPhone that was subject of so much attention from the past few months.



Here's a brief look at what happened in recent months over the iPhone:



The DoJ and
Read more ...

Thursday 14 April 2016

Microsoft Sues US Govt Over Unconstitutional Secret Data Requests




Microsoft is suing the Department of Justice (DoJ) to protest the gag order that prevents technology companies from telling their customers when their cloud data is handed over to authorities.

In layman's terms, the Electronic Communications Privacy Act (ECPA) allows the government to issue gag orders saying that the people or companies involved in a legal case cannot talk about the case or
Read more ...

Anti-Encryption Bill Released, would Kill your Privacy and Security





The United States anti-encryption bill will kill your Privacy.



In the wake of the Apple vs. FBI case, two leading Intelligence Committee Senators have introduced an anti-encryption bill that would effectively ban strong encryption.



Senators Richard Burr (R-NC) and Dianne Feinstein (D-CA) released the official version of their bill today in response to concerns that criminals and
Read more ...

Journalist Matthew Keys gets 2-Year Prison term for helping Anonymous Hackers





Former Reuters journalist Matthew Keys, who was convicted last year of helping the Anonymous group of hackers, has been sentenced to 24 months in prison for computer hacking charges.



Keys was found guilty last year in October of giving Anonymous login credentials that allowed the group to deface the Los Angeles Times, a Tribune Media-owned newspaper, back in 2013.



After leaving the job
Read more ...

Wednesday 13 April 2016

British Authorities Order Hacker Lauri Love to hand Over Encryption Keys





The National Crime Agency (NCA) of United Kingdom is forcing the British citizen, and political hacktivist Lauri Love accused of hacking to hand over encryption keys to equipment seized from his home.



Love, 31, is currently fighting extradition to the United States where he faces up to 99 years in prison for allegedly hacking into the Federal Bureau Investigation (FBI), the US Missile
Read more ...

So, FBI Director also Puts Tape Over His Webcam





What do you do to protect your 'Privacy' while using your computer?



FBI Director James Comey uses tape to cover up his laptop webcam to ensure Privacy.



Yes, you heard it right. During the Q&A session at Kenyon College last week, Comey said that he uses tape to cover his laptop webcam in order to mitigate the danger of secret surveillance.



While giving a speech about encryption and
Read more ...

Windows 10 Blue Screen of Death Gets QR Code





If you are a Microsoft’s Windows user, you may have encountered the infamous Blue Screen of Death (BSOD).



The Blue Screen of Death generally appears when Windows encounters any critical error due to software or hardware issues, displaying a sad face and no information other than "Your PC ran into a problem."



However, now the company is apparently giving its infamous Blue Screen of Death
Read more ...

Tuesday 12 April 2016

WebUSB API — Connect Your USB Devices Securely to the Internet




Two Google engineers have developed a draft version of an API called WebUSB that would allow you to connect your USB devices to the Web safely and securely, bypassing the need for native drivers.

WebUSB – developed by Reilly Grant and Ken Rockot – has been introduced to the World Wide Web Consortium's Web Incubator Community Group (W3C WICG), is build to offer a universal platform that could
Read more ...

How to decrypt Petya Ransomware for Free





Ransomware has risen dramatically since last few years and is currently one of the most popular threats on the Internet.



The Ransomware infections have become so sophisticated with the time that victims end up paying ransom in order to get their critical and sensitive data back.



But if you are infected with Petya Ransomware, there is good news for you.



You can unlock
Read more ...

Warning! CCTV Cameras Sold on Amazon Come with Pre-Installed Malware





Be careful while buying any off-brand electronics from Amazon, as they could end up infecting you.



Recently, independent security researcher Mike Olsen discovered that the CCTV surveillance devices sold on Amazon came with pre-installed malware.



Olsen discovered this nasty secret after he bought a set of outdoor CCTV surveillance cameras from Amazon for one of his friends.



He picked
Read more ...

Monday 11 April 2016

Forensic Firm that Unlocked Terrorist's iPhone 5C is Close to Crack iPhone 6





The FBI didn't disclose the identity of the third-party company that helped them access the San Bernardino iPhone, but it has been widely believed that the Israeli mobile forensic firm Cellebrite was hired by the FBI to put an end to the Apple vs. FBI case.



For those unfamiliar in the Apple vs. FBI case: Apple was engaged in a legal battle with the Department of Justice over a court order
Read more ...

How Certificate Transparency Monitoring Tool Helped Facebook Early Detect Duplicate SSL Certs





Earlier this year, Facebook came across a bunch of duplicate SSL certificates for some of its own domains and revoked them immediately with the help of its own Certificate Transparency Monitoring Tool service.



Digital certificates are the backbone of our secure Internet, which protects sensitive information and communication, as well as authenticate systems and Internet users.



The
Read more ...

What is Certificate Transparency? How It helps Detect Fake SSL Certificates





Do you know there is a huge encryption backdoor still exists on the Internet that most people don't know about?



I am talking about the traditional Digital Certificate Management System… the weakest link, which is completely based on trust, and it has already been broken several times.



To ensure the confidentiality and integrity of their personal data, billions of Internet users blindly
Read more ...

Saturday 9 April 2016

No Password Required! 135 Million Modems Open to Remote Factory Reset





More than 135 Million modems around the world are vulnerable to a flaw that can be exploited remotely to knock them offline by cutting off the Internet access.



The simple and easily exploitable vulnerability has been uncovered in one of the most popular and widely-used cable modem, the Arris SURFboard SB6141, used in Millions of US households.



Security researcher David Longenecker
Read more ...

WordPress enables Free HTTPS Encryption for all Blogs with Custom Domain

Do you own a custom domain or a blog under the wordpress.com domain name?
If yes, then there is good news for you.
WordPress is bringing free HTTPS to every blog and website that belongs to them in an effort to make the Web more secure.
WordPress – free, open source and the most popular a content management system (CMS) system on the Web – is being used by over a quarter of all websites across
Read more ...

Friday 8 April 2016

Google may adopt Apple's Swift Programming Language for Android




Almost two years back, Apple introduced Swift programming language at its World Wide Developers Conference (WWDC) to the developers who build software applications for Apple devices.

Swift was designed to make it easier for developers to create apps for Apple's mobile platform. Usually developers write complete app code and then compile it to see output, but Swift helps them see results in
Read more ...

Thursday 7 April 2016

FBI claims its iPhone Hacking Tool can't Unlock iPhone 5S, 6S and 6S Plus




Although everyone, including Apple, was worried about the iPhone hacking tool used by the Federal Bureau of Investigation (FBI) to access data on iPhone belonged to the San Bernardino shooter, the FBI director said the hack does not work on an iPhone 5S or later.

FBI Director James Comey said Wednesday that the agency was able to avoid a prolonged legal battle with Apple by buying a tool from
Read more ...

How to Run Ubuntu on latest Windows 10 Insider Preview Build 14316





As reported last week, Microsoft will launch an 'Anniversary Update' for Windows 10 that will bring Ubuntu file system, allowing you to use Bash to run command-line Linux applications without a virtual machine.



However, you do not have to wait until this summer to run Bash (Bourne Again Shell) on your Windows 10 OS, as Microsoft has released the first preview build of the Windows 10
Read more ...

'Hacking Team' Loses License to Sell Surveillance Malware Outside Europe





Hacking Team – the infamous Italy-based spyware company that had more than 400 GB of its confidential data stolen last year – is facing another trouble. 



This time not from other hackers, but from its own government.



Hacking Team is infamous for selling surveillance spyware to governments and intelligence agencies worldwide, but now it may not be allowed to do so, as the Italian export
Read more ...

Wednesday 6 April 2016

Adobe to issue Emergency Patch for Critical Flash Player Vulnerability





Adobe has been one of the favorite picks of the Hackers to mess with any systems devoid of any operating systems, as Flash Player is a front runner in all the browsers.



Hackers have already been targeting Flash Player for long by exploiting known vulnerabilities roaming in the wild.



Despite Adobe's efforts, Flash is not safe anymore for Internet security, as one more critical
Read more ...

Facebook uses Artificial Intelligence to Describe Photos to Blind Users





Today the Internet has become dominated by images, and it’s the major feature that got Facebook to a Billion daily users.



We can not imagine Facebook without photos, but for Millions of blind and visually impaired people, Facebook without photos has been the reality since its launch.



But not now! Facebook has launched a system, dubbed Automatic Alternative Text, which describes the
Read more ...

Hacker reveals How to Bypass iPhone 6s Lock Screen Passcode [Video]





Apple gave you a reason to turn your Siri OFF.



A critical security flaw in Apple's newest iPhones running the latest version of the iOS operating system allows anyone to bypass the phone's lockscreen and gain access to personal information.



The iPhone lockscreen bypass bug only works on the iPhone 6S and iPhone 6S Plus, as these devices take advantage of the 3D Touch functionality that
Read more ...

Tuesday 5 April 2016

WhatsApp turns on End-to-End Encryption by default for its 1 Billion Users




WhatsApp is updating its messaging app so that every text message and voice call will be encrypted for the company’s one billion users.

Yes, Whatsapp has finally implemented full end-to-end encryption, as promised a year ago.

This means, from now every message, image or voice call you made will be secured by end-to-end encryption so that only you and the person you're communicating with can
Read more ...

Silk Road 2.0 Dark-Web Admin Pleads Guilty





An admin of Silk Road 2, named Brian Farrell, who helped maintain the notorious dark web site by providing customer and technical support, approving and suspending vendors, and promoting staff members, has pleaded guilty and could face 8 years in prison.



The 28-year-old man, who used the moniker "DoctorClu," had been accused last year of being the right-hand to the creator of Silk Road 2.0
Read more ...

Personal Data of 50 Million Turkish Citizens Leaked Online





Personal details of nearly 50 Million Turkish citizens, including the country's President Recep Tayyip Erdogan, have been compromised and posted online in a massive security breach.



A database, which contains 49,611,709 records, appeared on the website of an Icelandic group on Monday, offering download links to anyone interested.



If confirmed, the data breach would be one of the
Read more ...

Monday 4 April 2016

Microsoft Pays $13,000 to Hacker for Finding Authentication Flaw





A security researcher has won $13,000 bounty from Microsoft for finding a critical flaw in its main authentication system that could allow hackers to gain access to a user's Outlook, Azure and Office accounts.



The vulnerability has been uncovered by UK-based security consultant Jack Whitton and is similar to Microsoft's OAuth CSRF (Cross-Site Request Forgery) in Live.com discovered by
Read more ...

Infamous Hacker 'Guccifer' appears in US Court after Extradition





Marcel Lazar Lehel aka "Guccifer" – an infamous Romanian hacker who hacked into the emails and social networking accounts of numerous high profile the US and Romanian Politicians – appeared in the United States court for the first time after extradition.



Following Romania's top court approval last month, Guccifer was extradited to the United States recently from Romania, his home country,
Read more ...

Ransomware attacks on Hospitals put Patients at Risk





Just last week, the Federal Bureau of Investigation (FBI) issued an urgent "Flash" message to the businesses and organisations about the threat of Samsam Ransomware, but the ransomware has already wreaked havoc on some critical infrastructure.



MedStar, a non-profit group that runs 10 hospitals in the Baltimore and Washington area, was attacked with Samsam, also known as Samas and MSIL,
Read more ...

The Panama Papers — Biggest leak in History Exposes Global Corruption





A huge trove of confidential documents from the Panamanian law firm Mossack Fonseca was made public on Sunday in what's known as One of the World’s Largest Data Leaks ever, called The Panama Papers.



Over 11.5 Million Leaked Files including 2.6 Terabytes of Data



Even larger than the NSA wires leak in 2013, the Panama Papers includes 2.6 Terabytes of private data, exposing an enormous web
Read more ...

Friday 1 April 2016

Hacker Hijacks a Police Drone from 2 Km Away with $40 Kit





A researcher has demonstrated how easy it is to steal high-end drones, commonly deployed by government agencies and police forces, from 2 kilometres away with the help of less than $40 worth of hardware.



The attack was developed by IBM security researcher Nils Rodday, who recently presented his findings at Black Hat Asia 2016.



Hacking the $28,463 Drone with Less than $40 of Hardware



Read more ...

Just One? No, FBI to Unlock More iPhones with its Secret Technique





The Federal Bureau of Investigation (FBI) worked with Israeli mobile forensic firm Cellebrite to unlock iPhone used in the San Bernardino shooting last year, confirmed by multiple sources familiar with the matter.



The United States Department of Justice (DoJ) said on Tuesday that the FBI successfully unlocked iPhone and accessed data with the help of an undisclosed alternative method
Read more ...

Thursday 31 March 2016

Here's the Exploit to Bypass Apple Security Feature that Fits in a Tweet





Did you install the latest update OS X 10.11.4?



If yes, then you might be wondering with a fact that the Apple had delivered an ineffective patch update this time.



Yes! This news would definitely disappoint many Apple users, as the latest update of OS X El Capitan 10.11.4 and iOS 9.3 still contain a privilege escalation vulnerability that could affect 130 Million Apple customers.



Read more ...

Advanced Malware targeting Internet of the Things and Routers





Anything connected to the Internet could be hacked and so is the Internet of Things (IoTs).



The market fragmentation of IoTs or Internet-connected devices is a security nightmare, due to poor security measures implemented by their vendors.



Now, the researchers at security firm ESET have discovered a piece of Malware that is targeting embedded devices such as routers, and other
Read more ...

Microsoft adds Linux Bash Shell and Ubuntu Binaries to Windows 10





'Microsoft loves Linux' so much that now the company is bringing the popular Bash shell, alongside the entire Linux command environment, to its newest Windows 10 OS in the upcoming 'Anniversary Update,' Redstone.



The rumours before the Microsoft’s Build 2016 developer conference were true. Microsoft has just confirmed that it is going to enable its users to run Bash (Bourne Again Shell)
Read more ...

Enable this New Setting to Secure your Computer from Macro-based Malware




Do you deal with MS Word files on the daily basis?

If yes, then are you aware that even opening a simple doc file could compromise your system?

It is a matter to think that the virus does not directly affect you, but it is you who let the virus carry out the attack by enabling deadly "Macros" to view the doc contents that are generally on eye-catching subjects like bank invoice.


How
Read more ...

Wednesday 30 March 2016

Google has also been Ordered to Unlock 9 Android Phones




The legal battle between Apple and the FBI (Federal Bureau of Investigation) over a locked iPhone that belonged to one of the San Bernardino shooters may be over, but the Department of Justice (DoJ) are back in front of a judge with a similar request.

The American Civil Liberties Union (ACLU) has discovered publicly available court documents that revealed the government has asked Google’s
Read more ...

How to Disable Windows 10 Upgrade (Forever) With Just One Click





If you are a Windows 7 or Windows 8.1 user, who don't want to upgrade to Windows 10 now or anytime soon, you might be sick of Microsoft constantly pestering you to upgrade your OS.

Aren't you?



With its goal to deploy Windows 10 on over 1 Billion devices worldwide, Microsoft is becoming more aggressive to convince Windows 7 and 8.1 users to upgrade to its newest operating system, and it is
Read more ...

Tuesday 29 March 2016

FBI is fighting back against Judge's Order to reveal TOR Exploit Code




Last month, the Federal Bureau of Investigation (FBI) was ordered to reveal the complete source code for the TOR exploit it used to hack visitors of the world’s largest dark web child pornography site, PlayPen.

Robert J. Bryan, the federal judge, ordered the FBI to hand over the TOR browser exploit code so that defence could better understand how the agency hacked over 1,000 computers and if
Read more ...

Microsoft built a special version of Windows 10 just for Chinese Government




China is very strict about censorship, which makes it difficult for companies to launch their products in the country. But companies like Microsoft are playing smartly to target the largest market in the world.

Microsoft has found a way to enter into the banned Chinese Market, but this time with official support for Chinese Government through a new custom and exclusive Windows 10 version for
Read more ...

Remotely Exploitable Bug in Truecaller Puts Over 100 Million Users at Risk





Security researchers have discovered a remotely exploitable vulnerability in Called ID app "Truecaller" that could expose personal details of Millions of its users.



Truecaller is a popular service that claims to "search and identify any phone number," as well as helps users block incoming calls or SMSes from phone numbers categorized as spammers and telemarketers.



The service has mobile
Read more ...

5 Things Google has Done for Gmail Privacy and Security





Over the past few years, Google has increasingly improved the online security and protections of its Gmail users.



Besides two-factor authentication and HTTPS, Google has added new tools and features to Gmail that ensures users security and privacy, preventing cyber criminals and intelligence agencies to hack email accounts.



1. Enhanced State-Sponsored Attack Warnings



Apple vs. FBI
Read more ...

FBI Has Successfully Unlocked Terrorist's iPhone Without Apple's Help





End of Apple vs. FBI. At least for now, when the FBI has unlocked iPhone successfully.



Yes, you heard it right. The Federal Bureau of Investigation (FBI) has unlocked dead terrorist's iPhone 5C involved in the San Bernardino shooting without the help of Apple.



After weeks of arguments, the United States government is withdrawing its motion compelling Apple to build a backdoored version
Read more ...

Monday 28 March 2016

6 Charged for Hacking Lottery Terminals to Produce More Winning Tickets





Police have arrested and charged six people with crimes linked to hacking Connecticut state lottery terminals in order to produce more winning tickets than usual.



Prosecutors say all the six suspects are either owners or employees of retail stores that produced a much higher number of winning tickets than the state average, according to the Hartford Courant.



Suspects Hacked Lottery
Read more ...

Saturday 26 March 2016

Facebook's latest feature Alerts You if Someone Impersonates Your Profile





Online harassment has been elevated a step with the advent of popular social networks like Facebook.



Cyber stalkers create fake profiles impersonating other Facebook users and start doing activities on their behalf until and unless the owners notice the fake profiles and manually report it to Facebook.



Even in some cases, cyber stalkers block the Facebook account holders whom they
Read more ...

Microsoft says It's Deeply Sorry for Racist and Offensive Tweets by Tay AI Chatbot





After Microsoft's Twitter-based Artificial Intelligence (AI) chatbot 'Tay' badly defeated earlier this week, Microsoft has expressed apology and explained what went wrong.



For those unaware, Tay is Millennial-inspired artificial intelligence chatbot unveiled by Microsoft on Wednesday that's supposed to talk with people on social media networks like Twitter, Kik and GroupMe and learn from
Read more ...

New Bill targets Anonymous Prepaid 'Burner' phones by requiring Registration





Terrorist organisations are increasingly using high-grade encryption technologies to prevent being caught by the law enforcement. But, that was not in the case of last year's Paris attacks that killed 129 people, as Encryption seems to have played little to no role.



So, Who was the Real Culprit Behind the Attacks?



The 'Burner' Phones.



Burner Phones, or Prepaid mobile phones, are
Read more ...

Friday 25 March 2016

The 7 Most Wanted Iranian Hackers By the FBI





The Federal Bureau of Investigation (FBI) has lengthened its Most Wanted List by adding seven Iranian hackers who are accused of attacking a range of US banks and a New York dam.



On Thursday, the United States Department of Justice (DoJ) charged seven Iranian hackers with a slew of computer hacking offences for breaking into computer systems of dozens of US banks, causing Millions of
Read more ...

Mac OS X Zero-Day Exploit Can Bypass Apple's Latest Protection Feature





A critical zero-day vulnerability has been discovered in all versions of Apple's OS X operating system that allows hackers to exploit the company’s newest protection feature and steal sensitive data from affected devices.



With the release of OS X El Capitan, Apple introduced a security protection feature to the OS X kernel called System Integrity Protection (SIP). The feature is designed
Read more ...

Thursday 24 March 2016

Microsoft's Artificial Intelligence Tay Became a 'Racist Nazi' in less than 24 Hours




Tay, Microsoft’s new Artificial Intelligence (AI) chatbot on Twitter had to be pulled down a day after it launched, following incredibly racist comments and tweets praising Hitler and bashing feminists.

Microsoft had launched the Millennial-inspired artificial intelligence chatbot on Wednesday, claiming that it will become smarter the more people talk to it.

The real-world
Read more ...

What is SMTP STS? How It improves Email Security for StartTLS?




Despite so many messaging apps, Email is still one of the widely used and popular ways to communicate in this digital age.

But are your Emails secure?

We are using email services for decades, but the underlying 1980s transport protocol used to send emails, Simple Mail Transfer Protocol (SMTP), is ancient and lacks the ability to secure your email communication entirely.

However, to
Read more ...

Wednesday 23 March 2016

Israeli Forensic Firm 'Cellebrite' is Helping FBI to Unlock Terrorist's iPhone





Meet the security company that is helping Federal Bureau of Investigation (FBI) in unlocking San Bernardino shooters’ iPhone:



The Israeli mobile forensics firm Cellebrite.



Yes, Cellebrite – the provider of mobile forensic software from Israel – is helping the FBI in its attempt to unlock iPhone 5C that belonged to San Bernardino shooter, Syed Rizwan Farook, the Israeli YNetNews reported
Read more ...

Warning! Think Twice Before Using USB Drives




Security researchers have discovered a new data-stealing Trojan that makes special use of USB devices in order to spread itself and does not leave any trace of activity on the compromised systems.

Dubbed USB Thief ( or Win32/PSW.Stealer.NAI), the malware has the capability of stealthy attacking against air-gapped or isolated computers, warns ESET security firm.

The malware author has
Read more ...

Badlock — Unpatched Windows-Samba Vulnerability Affects All Versions of Windows





Security researchers have discovered a nasty security vulnerability that is said to affect almost every version of Windows and Samba and will be patched on April 12, 2016, the Samba development team announced Tuesday.



So, Save the Date if you are a Windows or Samba file server administrator.



Samba is a free, open source implementation of the SMB/CIFS network file sharing protocol that
Read more ...

FBI Most Wanted — Three 'Syrian Electronic Army' Hackers Charged for Cyber Crime





Syrian Electronic Army (SEA) Hackers have made their place on the FBI's Most Wanted List.



The US Department of Justice and the Federal Bureau of Investigation (FBI) are willing to pay $100,000 reward for any information that leads to the arrest of the heads of the infamous hacking group Syrian Electronic Army.



On Tuesday, the DoJ unsealed charges against three suspected members of the
Read more ...

Tuesday 22 March 2016

FBI may have found a New Way to Unlock Shooter's iPhone without Apple





There's more coming to the high-profile Apple vs. FBI case.



The Federal Bureau of Investigation (FBI) might not need Apple's assistance to unlock iPhone 5C that belonged to San Bernardino shooter, Syed Rizwan Farook.



If you have followed the San Bernardino case closely, you probably know everything about the ongoing encryption battle between the FBI and Apple.



In short, the US
Read more ...

Who Viewed Your Profile on Instagram? Obviously, Hackers!





Are you curious about who viewed your profile on Instagram?



This is probably the most frequently asked question nowadays, and there are several applications available on Google Play Store and Apple App Store, which claims to offer you the opportunity to see who is looking at your Instagram profile.



But, should we believe them?



Is there really some kind of way out to
Read more ...

Saturday 19 March 2016

Security Researcher Goes Missing, Who Investigated Bangladesh Bank Hack





Tanvir Hassan Zoha, a 34-year-old security researcher, who spoke to media on the $81 Million Bangladesh Bank cyber theft, has gone missing since Wednesday night, just days after accusing Bangladesh's central bank officials of negligence.



Zoha was investigating a recent cyber attack on Bangladesh's central bank that let hackers stole $81 Million from the banks' Federal Reserve bank account.
Read more ...

Bored With Chess? Here's How To Play Basketball in Facebook Messenger





Hope all of you have enjoyed the Game of Chess in the Facebook Messenger.



But if you're quite bored playing Chess or not really good at the game, then you probably felt a bit excited about Facebook's recent inclusion of a little Basketball mini-game into Messenger.



Now you can play Basketball through Facebook Messenger, just by typing in the Basketball emoji and sending to one of your
Read more ...

Apple Engineers say they may Quit if ordered to Unlock iPhone by FBI





Apple Vs. FBI battle over mobile encryption case is taking more twists and turns with every day pass by.



On one hand, the US Department of Justice (DOJ) is boldly warning Apple that it might compel the company to hand over the source code of its full iOS operating system along with the private electronic signature needed to run a modified iOS version on an iPhone, if…



…Apple does not
Read more ...

How to Make $100,000? Just Hack Google Chromebook





Yes, you could earn $100,000 if you have the hacking skills and love to play with electronics and gadgets.



Google has doubled its top bug bounty for hackers who can crack its Chromebook or Chromebox machine over the Web.



So if you want to get a big fat check from Google, you must have the ability to hack a Chromebook remotely, that means your exploit must be delivered via a Web page.

Read more ...

Friday 18 March 2016

The Best Way to Send and Receive End-to-End Encrypted Emails





How many of you know the fact that your daily e-mails are passaged through a deep espionage filter?



This was unknown until the whistleblower Edward Snowden broke all the surveillance secrets, which made privacy and security important for all Internet users than ever before.



I often get asked "How to send encrypted email?", "How can I protect my emails from prying eyes?" and "Which is
Read more ...

Malvertising Campaign Hits Top Websites to Spread Ransomware





Hackers are always in search for an elite method to create loopholes in the cyberspace to implement the dark rules in the form of vulnerability exploitation.



Top Trustworthy sites such as The New York Times, BBC, MSN, AOL and many more are on the verge of losing their face value as a malwertized advertisement campaign are looming around the websites, according to SpiderLabs.



Here's
Read more ...

Anonymous claims they Hacked Donald Trump ...Really?





The 'Hacktivist' collective group Anonymous claimed to have leaked personal details of the controversial US presidential candidate Donald Trump, including his Mobile Phone Number and Social Security Number (SSN).



Donald Trump



SSN: 086-38-5955
DOB: 06/14/1946
Phone Number: 212-832-2000
Cell/Mobile Phone Number: (917) 756-8000


The hacktivist group has declared war against Trump under a
Read more ...

Ever Wondered How Facebook Decides — How much Bounty Should be Paid?




Facebook pays Millions of dollars every year to researchers and white hat hackers from all around the world to stamp out security holes in its products and infrastructure under its Bug Bounty Program.

Facebook recognizes and rewards bug hunters to encourage more people to help the company keep Facebook users safe and secure from outside entities, malicious hackers or others.

Recently, the
Read more ...

Thursday 17 March 2016

DARPA Invites Geeks to Convert Everyday Objects into Deadly Weapons





Do you know that your daily household items can be turned into deadly weapons?



Yes, it's possible to convert some of your everyday household appliances into explosives, weapons or surveillance devices.



DARPA – the agency which does research in various fields for improving the US Military and US Department of Defense capabilities – had announced a new project dubbed "Improv" to transform
Read more ...

Warning — Hackers can Silently Install Malware to Non-Jailbroken iOS Devices





Hard time for mobile phone users!

Just recently, two severe vulnerabilities in Qualcomm Snapdragon chip and Stagefright were spotted on the Android platform, affecting more than a Billion and Millions of devices respectively.

And now:

Hackers have discovered a new way to install malicious apps onto your iPhone without your interaction.



Researchers at Palo Alto Networks have uncovered a
Read more ...

New Exploit to 'Hack Android Phones Remotely' threatens Millions of Devices





Attention Android users!



Millions of Android devices are vulnerable to hackers and intelligence agencies once again – Thanks to a newly disclosed Android Stagefright Exploit.



Yes, Android Stagefright vulnerability is Back…



…and this time, the Stagefright exploit allows an attacker to hack Android smartphones in 10 seconds just by tricking users into visiting a hacker's web page
Read more ...

Wednesday 16 March 2016

'The Fappening' Hacker Reveals How He Stole Nude Pics of Over 100 Celebrities





Almost one and a half years ago after the massive leakage of celebrities' nude photographs — famous as "The Fappening" or "Celebgate" scandal — a man had been charged with the Computer Fraud and Abuse Act, facing up to 5 years in prison as a result.



The US Department of Justice (DOJ) announced on Tuesday that it charged Ryan Collins, 36, of Pennsylvania for illegally accessing the Gmail
Read more ...

More than a Billion Snapdragon-based Android Phones Vulnerable to Hacking





More than a Billion of Android devices are at risk of a severe vulnerability in Qualcomm Snapdragon chip that could be exploited by any malicious application to gain root access on the device.



Security experts at Trend Micro are warning Android users of some severe programming blunders in Qualcomm's kernel-level Snapdragon code that if exploited, can be used by attackers for gaining root
Read more ...

Russia Rejects Google's Appeal and Orders to Stop Pre-Installing its own Android Apps





The Giant search engine Google has lost an anti-monopoly appeal in Russia against ruling related to its Android mobile OS



The Moscow Arbitration Court on Monday ruled that Google had violated its dominant position with the help of its free open source mobile platform "Android" by forcing its own apps and services like Youtube, Google Map, and others, on users — reducing competition.



The
Read more ...

Tuesday 15 March 2016

After Apple, WhatsApp Under Fire from US Govt Over Encryption





Before winding up the dispute of Apple and FBI over encryption, another buzz on the Whatsapp Snooping is now the hot debate on the court bench.



In the wake of WhatsApp's move to offer end-to-end encryption to text messages as well as VoIP calls made through its app, federal authorities have not been able to execute wiretapping warrants on WhatsApp users.



Though the US Department of
Read more ...

Watch Video: How Hacker Installs a Credit Card Skimmer in 3 Seconds





Card Skimmers have been around for years, but the video posted below is a perfect example of the evolution of the technology used by thieves.



The video released by Miami Beach Police involved two men who work as a team to install a credit card Skimmer on top of a card terminal at a local gas station in LESS THAN 3 SECONDS.



Yes, in just less than 3 seconds hackers can turn a regular
Read more ...

Monday 14 March 2016

Here's How Hackers Stole $80 Million from Bangladesh Bank





The recent cyber attack on Bangladesh's central bank that let hackers stole over $80 Million from the institutes' Federal Reserve bank account was reportedly caused due to the Malware installed on the Bank's computer systems.



Few days ago, reports emerged of a group of unknown hackers that broke into Bangladesh's central bank, obtained credentials needed for payment transfers from Federal
Read more ...

Florida Sheriff threatens to Arrest 'Rascal' Tim Cook if He Doesn't Unlock the iPhone





The legal battle between Apple and the Federal Bureau of Investigation (FBI) is turning ugly with each passing day.



Apple is fighting with the federal authorities over iPhone encryption case. The Federal Bureau of Investigation (FBI) requires Apple’s assistance to unlock an iPhone 5C belonging to San Bernardino shooter Syed Rizwan Farook.



Apple CEO Tim Cook has said explicitly that
Read more ...

Anti-DDoS Firm Staminus HACKED! Customers Data Leaked





Staminus Communications – a California-based hosting and DDoS (Distributed Denial of Service) protection company – is recovering a massive data breach after hackers broke down into its servers and leaked personal and sensitive details of its customers.



Though the company acknowledged that there was a problem in a message posted to Twitter on Thursday morning, it did not specify a data
Read more ...

FBI threatens to Force Apple to Hand Over iOS Source Code





The Department of Justice (DoJ) has warned Apple that it may force the tech giant for handing over the source code to the complete operating system if it does not help the Federal Bureau of Investigation (FBI) unlock the San Bernardino shooter's iPhone.



Apple is battling with the FBI over iPhone encryption case. The federal investigators needs Apple's assistance to unlock an iPhone 5C
Read more ...

Microsoft Quietly Stops Accepting Bitcoin in Windows Store





Microsoft reckoned Bitcoin was the future of payment system and added it as a payment option for Windows store at the end of 2014, but the company has silently pulled support for Bitcoin in the Windows 10 Store.



In November 2014, Microsoft struck a deal with third-party bitcoin payment processor 'Bitpay' that allowed people to use Bitcoin to purchase Microsoft’s products and services from
Read more ...

Friday 11 March 2016

ISPs Sell Your Data to Advertisers, But FCC has a Plan to Protect Privacy




The Federal Communication Commission (FCC) has put forward a proposal that aims to protect Internet user's privacy.

The proposal [pdf] will regulate the amount of customers’ online data the Internet Service Providers (ISPs) are able to collect and sell to the advertising companies.

Currently, there is no particular rule by law covering broadband providers and customer privacy, and if adopted
Read more ...

How a Typo Stopped Hackers from Stealing $1 Billion from Bank




Typos are really embarrassing, but this time it saved the Bangladesh Central Bank and the New York Federal Reserve by preventing a nearly $1 Billion (£700 Million) heist.

Last month, some unknown hackers broke into Bangladesh's central bank, obtained credentials needed for payment transfers and then transfer large sums to fraudulent accounts based in the Philippines and Sri Lanka. But…
Designed By