Breaking News

Thursday 31 March 2016

Here's the Exploit to Bypass Apple Security Feature that Fits in a Tweet





Did you install the latest update OS X 10.11.4?



If yes, then you might be wondering with a fact that the Apple had delivered an ineffective patch update this time.



Yes! This news would definitely disappoint many Apple users, as the latest update of OS X El Capitan 10.11.4 and iOS 9.3 still contain a privilege escalation vulnerability that could affect 130 Million Apple customers.



Read more ...

Advanced Malware targeting Internet of the Things and Routers





Anything connected to the Internet could be hacked and so is the Internet of Things (IoTs).



The market fragmentation of IoTs or Internet-connected devices is a security nightmare, due to poor security measures implemented by their vendors.



Now, the researchers at security firm ESET have discovered a piece of Malware that is targeting embedded devices such as routers, and other
Read more ...

Microsoft adds Linux Bash Shell and Ubuntu Binaries to Windows 10





'Microsoft loves Linux' so much that now the company is bringing the popular Bash shell, alongside the entire Linux command environment, to its newest Windows 10 OS in the upcoming 'Anniversary Update,' Redstone.



The rumours before the Microsoft’s Build 2016 developer conference were true. Microsoft has just confirmed that it is going to enable its users to run Bash (Bourne Again Shell)
Read more ...

Enable this New Setting to Secure your Computer from Macro-based Malware




Do you deal with MS Word files on the daily basis?

If yes, then are you aware that even opening a simple doc file could compromise your system?

It is a matter to think that the virus does not directly affect you, but it is you who let the virus carry out the attack by enabling deadly "Macros" to view the doc contents that are generally on eye-catching subjects like bank invoice.


How
Read more ...

Wednesday 30 March 2016

Google has also been Ordered to Unlock 9 Android Phones




The legal battle between Apple and the FBI (Federal Bureau of Investigation) over a locked iPhone that belonged to one of the San Bernardino shooters may be over, but the Department of Justice (DoJ) are back in front of a judge with a similar request.

The American Civil Liberties Union (ACLU) has discovered publicly available court documents that revealed the government has asked Google’s
Read more ...

How to Disable Windows 10 Upgrade (Forever) With Just One Click





If you are a Windows 7 or Windows 8.1 user, who don't want to upgrade to Windows 10 now or anytime soon, you might be sick of Microsoft constantly pestering you to upgrade your OS.

Aren't you?



With its goal to deploy Windows 10 on over 1 Billion devices worldwide, Microsoft is becoming more aggressive to convince Windows 7 and 8.1 users to upgrade to its newest operating system, and it is
Read more ...

Tuesday 29 March 2016

FBI is fighting back against Judge's Order to reveal TOR Exploit Code




Last month, the Federal Bureau of Investigation (FBI) was ordered to reveal the complete source code for the TOR exploit it used to hack visitors of the world’s largest dark web child pornography site, PlayPen.

Robert J. Bryan, the federal judge, ordered the FBI to hand over the TOR browser exploit code so that defence could better understand how the agency hacked over 1,000 computers and if
Read more ...

Microsoft built a special version of Windows 10 just for Chinese Government




China is very strict about censorship, which makes it difficult for companies to launch their products in the country. But companies like Microsoft are playing smartly to target the largest market in the world.

Microsoft has found a way to enter into the banned Chinese Market, but this time with official support for Chinese Government through a new custom and exclusive Windows 10 version for
Read more ...

Remotely Exploitable Bug in Truecaller Puts Over 100 Million Users at Risk





Security researchers have discovered a remotely exploitable vulnerability in Called ID app "Truecaller" that could expose personal details of Millions of its users.



Truecaller is a popular service that claims to "search and identify any phone number," as well as helps users block incoming calls or SMSes from phone numbers categorized as spammers and telemarketers.



The service has mobile
Read more ...

5 Things Google has Done for Gmail Privacy and Security





Over the past few years, Google has increasingly improved the online security and protections of its Gmail users.



Besides two-factor authentication and HTTPS, Google has added new tools and features to Gmail that ensures users security and privacy, preventing cyber criminals and intelligence agencies to hack email accounts.



1. Enhanced State-Sponsored Attack Warnings



Apple vs. FBI
Read more ...

FBI Has Successfully Unlocked Terrorist's iPhone Without Apple's Help





End of Apple vs. FBI. At least for now, when the FBI has unlocked iPhone successfully.



Yes, you heard it right. The Federal Bureau of Investigation (FBI) has unlocked dead terrorist's iPhone 5C involved in the San Bernardino shooting without the help of Apple.



After weeks of arguments, the United States government is withdrawing its motion compelling Apple to build a backdoored version
Read more ...

Monday 28 March 2016

6 Charged for Hacking Lottery Terminals to Produce More Winning Tickets





Police have arrested and charged six people with crimes linked to hacking Connecticut state lottery terminals in order to produce more winning tickets than usual.



Prosecutors say all the six suspects are either owners or employees of retail stores that produced a much higher number of winning tickets than the state average, according to the Hartford Courant.



Suspects Hacked Lottery
Read more ...

Saturday 26 March 2016

Facebook's latest feature Alerts You if Someone Impersonates Your Profile





Online harassment has been elevated a step with the advent of popular social networks like Facebook.



Cyber stalkers create fake profiles impersonating other Facebook users and start doing activities on their behalf until and unless the owners notice the fake profiles and manually report it to Facebook.



Even in some cases, cyber stalkers block the Facebook account holders whom they
Read more ...

Microsoft says It's Deeply Sorry for Racist and Offensive Tweets by Tay AI Chatbot





After Microsoft's Twitter-based Artificial Intelligence (AI) chatbot 'Tay' badly defeated earlier this week, Microsoft has expressed apology and explained what went wrong.



For those unaware, Tay is Millennial-inspired artificial intelligence chatbot unveiled by Microsoft on Wednesday that's supposed to talk with people on social media networks like Twitter, Kik and GroupMe and learn from
Read more ...

New Bill targets Anonymous Prepaid 'Burner' phones by requiring Registration





Terrorist organisations are increasingly using high-grade encryption technologies to prevent being caught by the law enforcement. But, that was not in the case of last year's Paris attacks that killed 129 people, as Encryption seems to have played little to no role.



So, Who was the Real Culprit Behind the Attacks?



The 'Burner' Phones.



Burner Phones, or Prepaid mobile phones, are
Read more ...

Friday 25 March 2016

The 7 Most Wanted Iranian Hackers By the FBI





The Federal Bureau of Investigation (FBI) has lengthened its Most Wanted List by adding seven Iranian hackers who are accused of attacking a range of US banks and a New York dam.



On Thursday, the United States Department of Justice (DoJ) charged seven Iranian hackers with a slew of computer hacking offences for breaking into computer systems of dozens of US banks, causing Millions of
Read more ...

Mac OS X Zero-Day Exploit Can Bypass Apple's Latest Protection Feature





A critical zero-day vulnerability has been discovered in all versions of Apple's OS X operating system that allows hackers to exploit the company’s newest protection feature and steal sensitive data from affected devices.



With the release of OS X El Capitan, Apple introduced a security protection feature to the OS X kernel called System Integrity Protection (SIP). The feature is designed
Read more ...

Thursday 24 March 2016

Microsoft's Artificial Intelligence Tay Became a 'Racist Nazi' in less than 24 Hours




Tay, Microsoft’s new Artificial Intelligence (AI) chatbot on Twitter had to be pulled down a day after it launched, following incredibly racist comments and tweets praising Hitler and bashing feminists.

Microsoft had launched the Millennial-inspired artificial intelligence chatbot on Wednesday, claiming that it will become smarter the more people talk to it.

The real-world
Read more ...

What is SMTP STS? How It improves Email Security for StartTLS?




Despite so many messaging apps, Email is still one of the widely used and popular ways to communicate in this digital age.

But are your Emails secure?

We are using email services for decades, but the underlying 1980s transport protocol used to send emails, Simple Mail Transfer Protocol (SMTP), is ancient and lacks the ability to secure your email communication entirely.

However, to
Read more ...

Wednesday 23 March 2016

Israeli Forensic Firm 'Cellebrite' is Helping FBI to Unlock Terrorist's iPhone





Meet the security company that is helping Federal Bureau of Investigation (FBI) in unlocking San Bernardino shooters’ iPhone:



The Israeli mobile forensics firm Cellebrite.



Yes, Cellebrite – the provider of mobile forensic software from Israel – is helping the FBI in its attempt to unlock iPhone 5C that belonged to San Bernardino shooter, Syed Rizwan Farook, the Israeli YNetNews reported
Read more ...

Warning! Think Twice Before Using USB Drives




Security researchers have discovered a new data-stealing Trojan that makes special use of USB devices in order to spread itself and does not leave any trace of activity on the compromised systems.

Dubbed USB Thief ( or Win32/PSW.Stealer.NAI), the malware has the capability of stealthy attacking against air-gapped or isolated computers, warns ESET security firm.

The malware author has
Read more ...

Badlock — Unpatched Windows-Samba Vulnerability Affects All Versions of Windows





Security researchers have discovered a nasty security vulnerability that is said to affect almost every version of Windows and Samba and will be patched on April 12, 2016, the Samba development team announced Tuesday.



So, Save the Date if you are a Windows or Samba file server administrator.



Samba is a free, open source implementation of the SMB/CIFS network file sharing protocol that
Read more ...

FBI Most Wanted — Three 'Syrian Electronic Army' Hackers Charged for Cyber Crime





Syrian Electronic Army (SEA) Hackers have made their place on the FBI's Most Wanted List.



The US Department of Justice and the Federal Bureau of Investigation (FBI) are willing to pay $100,000 reward for any information that leads to the arrest of the heads of the infamous hacking group Syrian Electronic Army.



On Tuesday, the DoJ unsealed charges against three suspected members of the
Read more ...

Tuesday 22 March 2016

FBI may have found a New Way to Unlock Shooter's iPhone without Apple





There's more coming to the high-profile Apple vs. FBI case.



The Federal Bureau of Investigation (FBI) might not need Apple's assistance to unlock iPhone 5C that belonged to San Bernardino shooter, Syed Rizwan Farook.



If you have followed the San Bernardino case closely, you probably know everything about the ongoing encryption battle between the FBI and Apple.



In short, the US
Read more ...

Who Viewed Your Profile on Instagram? Obviously, Hackers!





Are you curious about who viewed your profile on Instagram?



This is probably the most frequently asked question nowadays, and there are several applications available on Google Play Store and Apple App Store, which claims to offer you the opportunity to see who is looking at your Instagram profile.



But, should we believe them?



Is there really some kind of way out to
Read more ...

Saturday 19 March 2016

Security Researcher Goes Missing, Who Investigated Bangladesh Bank Hack





Tanvir Hassan Zoha, a 34-year-old security researcher, who spoke to media on the $81 Million Bangladesh Bank cyber theft, has gone missing since Wednesday night, just days after accusing Bangladesh's central bank officials of negligence.



Zoha was investigating a recent cyber attack on Bangladesh's central bank that let hackers stole $81 Million from the banks' Federal Reserve bank account.
Read more ...

Bored With Chess? Here's How To Play Basketball in Facebook Messenger





Hope all of you have enjoyed the Game of Chess in the Facebook Messenger.



But if you're quite bored playing Chess or not really good at the game, then you probably felt a bit excited about Facebook's recent inclusion of a little Basketball mini-game into Messenger.



Now you can play Basketball through Facebook Messenger, just by typing in the Basketball emoji and sending to one of your
Read more ...

Apple Engineers say they may Quit if ordered to Unlock iPhone by FBI





Apple Vs. FBI battle over mobile encryption case is taking more twists and turns with every day pass by.



On one hand, the US Department of Justice (DOJ) is boldly warning Apple that it might compel the company to hand over the source code of its full iOS operating system along with the private electronic signature needed to run a modified iOS version on an iPhone, if…



…Apple does not
Read more ...

How to Make $100,000? Just Hack Google Chromebook





Yes, you could earn $100,000 if you have the hacking skills and love to play with electronics and gadgets.



Google has doubled its top bug bounty for hackers who can crack its Chromebook or Chromebox machine over the Web.



So if you want to get a big fat check from Google, you must have the ability to hack a Chromebook remotely, that means your exploit must be delivered via a Web page.

Read more ...

Friday 18 March 2016

The Best Way to Send and Receive End-to-End Encrypted Emails





How many of you know the fact that your daily e-mails are passaged through a deep espionage filter?



This was unknown until the whistleblower Edward Snowden broke all the surveillance secrets, which made privacy and security important for all Internet users than ever before.



I often get asked "How to send encrypted email?", "How can I protect my emails from prying eyes?" and "Which is
Read more ...

Malvertising Campaign Hits Top Websites to Spread Ransomware





Hackers are always in search for an elite method to create loopholes in the cyberspace to implement the dark rules in the form of vulnerability exploitation.



Top Trustworthy sites such as The New York Times, BBC, MSN, AOL and many more are on the verge of losing their face value as a malwertized advertisement campaign are looming around the websites, according to SpiderLabs.



Here's
Read more ...

Anonymous claims they Hacked Donald Trump ...Really?





The 'Hacktivist' collective group Anonymous claimed to have leaked personal details of the controversial US presidential candidate Donald Trump, including his Mobile Phone Number and Social Security Number (SSN).



Donald Trump



SSN: 086-38-5955
DOB: 06/14/1946
Phone Number: 212-832-2000
Cell/Mobile Phone Number: (917) 756-8000


The hacktivist group has declared war against Trump under a
Read more ...

Ever Wondered How Facebook Decides — How much Bounty Should be Paid?




Facebook pays Millions of dollars every year to researchers and white hat hackers from all around the world to stamp out security holes in its products and infrastructure under its Bug Bounty Program.

Facebook recognizes and rewards bug hunters to encourage more people to help the company keep Facebook users safe and secure from outside entities, malicious hackers or others.

Recently, the
Read more ...

Thursday 17 March 2016

DARPA Invites Geeks to Convert Everyday Objects into Deadly Weapons





Do you know that your daily household items can be turned into deadly weapons?



Yes, it's possible to convert some of your everyday household appliances into explosives, weapons or surveillance devices.



DARPA – the agency which does research in various fields for improving the US Military and US Department of Defense capabilities – had announced a new project dubbed "Improv" to transform
Read more ...

Warning — Hackers can Silently Install Malware to Non-Jailbroken iOS Devices





Hard time for mobile phone users!

Just recently, two severe vulnerabilities in Qualcomm Snapdragon chip and Stagefright were spotted on the Android platform, affecting more than a Billion and Millions of devices respectively.

And now:

Hackers have discovered a new way to install malicious apps onto your iPhone without your interaction.



Researchers at Palo Alto Networks have uncovered a
Read more ...

New Exploit to 'Hack Android Phones Remotely' threatens Millions of Devices





Attention Android users!



Millions of Android devices are vulnerable to hackers and intelligence agencies once again – Thanks to a newly disclosed Android Stagefright Exploit.



Yes, Android Stagefright vulnerability is Back…



…and this time, the Stagefright exploit allows an attacker to hack Android smartphones in 10 seconds just by tricking users into visiting a hacker's web page
Read more ...

Wednesday 16 March 2016

'The Fappening' Hacker Reveals How He Stole Nude Pics of Over 100 Celebrities





Almost one and a half years ago after the massive leakage of celebrities' nude photographs — famous as "The Fappening" or "Celebgate" scandal — a man had been charged with the Computer Fraud and Abuse Act, facing up to 5 years in prison as a result.



The US Department of Justice (DOJ) announced on Tuesday that it charged Ryan Collins, 36, of Pennsylvania for illegally accessing the Gmail
Read more ...

More than a Billion Snapdragon-based Android Phones Vulnerable to Hacking





More than a Billion of Android devices are at risk of a severe vulnerability in Qualcomm Snapdragon chip that could be exploited by any malicious application to gain root access on the device.



Security experts at Trend Micro are warning Android users of some severe programming blunders in Qualcomm's kernel-level Snapdragon code that if exploited, can be used by attackers for gaining root
Read more ...

Russia Rejects Google's Appeal and Orders to Stop Pre-Installing its own Android Apps





The Giant search engine Google has lost an anti-monopoly appeal in Russia against ruling related to its Android mobile OS



The Moscow Arbitration Court on Monday ruled that Google had violated its dominant position with the help of its free open source mobile platform "Android" by forcing its own apps and services like Youtube, Google Map, and others, on users — reducing competition.



The
Read more ...

Tuesday 15 March 2016

After Apple, WhatsApp Under Fire from US Govt Over Encryption





Before winding up the dispute of Apple and FBI over encryption, another buzz on the Whatsapp Snooping is now the hot debate on the court bench.



In the wake of WhatsApp's move to offer end-to-end encryption to text messages as well as VoIP calls made through its app, federal authorities have not been able to execute wiretapping warrants on WhatsApp users.



Though the US Department of
Read more ...

Watch Video: How Hacker Installs a Credit Card Skimmer in 3 Seconds





Card Skimmers have been around for years, but the video posted below is a perfect example of the evolution of the technology used by thieves.



The video released by Miami Beach Police involved two men who work as a team to install a credit card Skimmer on top of a card terminal at a local gas station in LESS THAN 3 SECONDS.



Yes, in just less than 3 seconds hackers can turn a regular
Read more ...

Monday 14 March 2016

Here's How Hackers Stole $80 Million from Bangladesh Bank





The recent cyber attack on Bangladesh's central bank that let hackers stole over $80 Million from the institutes' Federal Reserve bank account was reportedly caused due to the Malware installed on the Bank's computer systems.



Few days ago, reports emerged of a group of unknown hackers that broke into Bangladesh's central bank, obtained credentials needed for payment transfers from Federal
Read more ...

Florida Sheriff threatens to Arrest 'Rascal' Tim Cook if He Doesn't Unlock the iPhone





The legal battle between Apple and the Federal Bureau of Investigation (FBI) is turning ugly with each passing day.



Apple is fighting with the federal authorities over iPhone encryption case. The Federal Bureau of Investigation (FBI) requires Apple’s assistance to unlock an iPhone 5C belonging to San Bernardino shooter Syed Rizwan Farook.



Apple CEO Tim Cook has said explicitly that
Read more ...

Anti-DDoS Firm Staminus HACKED! Customers Data Leaked





Staminus Communications – a California-based hosting and DDoS (Distributed Denial of Service) protection company – is recovering a massive data breach after hackers broke down into its servers and leaked personal and sensitive details of its customers.



Though the company acknowledged that there was a problem in a message posted to Twitter on Thursday morning, it did not specify a data
Read more ...

FBI threatens to Force Apple to Hand Over iOS Source Code





The Department of Justice (DoJ) has warned Apple that it may force the tech giant for handing over the source code to the complete operating system if it does not help the Federal Bureau of Investigation (FBI) unlock the San Bernardino shooter's iPhone.



Apple is battling with the FBI over iPhone encryption case. The federal investigators needs Apple's assistance to unlock an iPhone 5C
Read more ...

Microsoft Quietly Stops Accepting Bitcoin in Windows Store





Microsoft reckoned Bitcoin was the future of payment system and added it as a payment option for Windows store at the end of 2014, but the company has silently pulled support for Bitcoin in the Windows 10 Store.



In November 2014, Microsoft struck a deal with third-party bitcoin payment processor 'Bitpay' that allowed people to use Bitcoin to purchase Microsoft’s products and services from
Read more ...

Friday 11 March 2016

ISPs Sell Your Data to Advertisers, But FCC has a Plan to Protect Privacy




The Federal Communication Commission (FCC) has put forward a proposal that aims to protect Internet user's privacy.

The proposal [pdf] will regulate the amount of customers’ online data the Internet Service Providers (ISPs) are able to collect and sell to the advertising companies.

Currently, there is no particular rule by law covering broadband providers and customer privacy, and if adopted
Read more ...

How a Typo Stopped Hackers from Stealing $1 Billion from Bank




Typos are really embarrassing, but this time it saved the Bangladesh Central Bank and the New York Federal Reserve by preventing a nearly $1 Billion (£700 Million) heist.

Last month, some unknown hackers broke into Bangladesh's central bank, obtained credentials needed for payment transfers and then transfer large sums to fraudulent accounts based in the Philippines and Sri Lanka. But…
Designed By