Category: Security

  • HSBC voice recognition security system spoofed by BBC

    A BBC Click reporter, Dan Simmons, reported that his non-identical twin brother was able to access his bank account through the newly developed voice-recognition verification system launched recently by the HSBC bank. How does the voice recognition ID system work? Most of you may have heard of the voice recognition system before. It was also […]

  • WannaCry responsible for infecting medical devices

    It is not surprising to know that Internet-connected Medical devices are vulnerable to cyber attacks. There have been several cases in the recent past in which cyber criminals took over life-saving devices and held them to ransom. Now, it has been identified that WannaCry ransomware, the heinous ransomware that has been on the loose for over […]

  • You were not alone; Twitter went down everywhere

    If you were wondering what’s going on with the social media giant Twitter, then don’t worry you were not alone. Reports indicated that Twitter was down in the United States, United Kingdom, Spain, the Netherlands, Japan, Italy, and France, etc. Those visiting the site could see a message saying “Something is technically wrong. Thanks for […]

  • Sweden drop rape case probe against WikiLeaks’ Julian Assange

    In a recent development, Swedish lawmakers have dropped the investigations against WikiLeaks founder, Julian Assange, which alleged him of rape back in August 2010. The decision will set free Assange after a 7-year legal stand-off. In a statement, the Prosecutors’ Office said that: “Chief Prosecutor Marianne Ny has today decided to discontinue the preliminary investigation regarding suspected […]

  • WannaCry Ransomware Attackers are sending new message to victims

    The WannaCry ransomware attack is still infecting unsuspecting users, hospitals, and businesses around the world. While some users on Twitter are claiming they have already paid victims a massive amount of ransom money and are still waiting for the decryption key; the cyber criminals behind the whole campaign are still sending new messages in the […]

  • Zomato Hacked; 17 Million Accounts Sold on Dark Web

    Since 2015 the Dark Web marketplaces have been flourishing. From drugs, weapons, databases, fake documents to all sorts of illegal stuff are available for anyone at anytime. Recently, HackRead found out a vendor going by the online handle of “nclay” is claiming to have hacked Zomato and selling the data of its 17 million registered users […]

  • CryptoMining malware Adylkuzz using the same vulnerability as WannaCry

    It seems that WannaCry had a predecessor that apparently carried out attacks which involved mining the cryptocurrency Monero using the same vulnerability found in Windows’ Sever Message Block (SMB) protocol. Adylkuzz – another NSA enabled malware: According to the researchers, the crypto miners malware uses the same tool, EternalBlue, to exploit the same vulnerability in Microsoft […]

  • Shocking: ExtraTorrent has been permanently shut down

    The world renowned torrenting platform ExtraTorrent (ET) has been shut down on permanent bases. The announcement came just a few minutes ago when users visiting the site saw a brief message on its home page stating that ExtraTorrent along with all of its mirror has gone offline while all of its data has also been permanently […]

  • Chrome vulnerability can allow attackers to steal user credentials

    Google Chrome may not be as safe as it was thought to be. Recently, a security engineer, Bosko Stankovic, found a vulnerability in Google Chrome that hackers can easily exploit to get a user’s credentials such as their username and password and potentially launch SMB relay attacks. It must be noted that WannaCry ransomware attack also […]

  • 10 Crucial Security Tips to Reduce Data Loss in Microsoft Office 365

    The protection of crucial data is highly important. Microsoft Office 365 has a data loss feature that highly secures your data. According to research, four in every ten organizations are currently using or planning to implement this application. It’s no wonder Microsoft has deemed it necessary to implement the right safety measures for all of […]

  • WikiLeaks Posts User Manuals for CIA Malware AfterMidnight and Assassin

    WikiLeaks recently leaked some files as part of its Vault 7 series, that contained user manuals for two malware called, Assassin and AfterMidnight. According to the documents, these viruses belong to the CIA. RELEASE: CIA remote control & subversion malware systems 'After Midnight' and 'Assassin' #Vault7 — WikiLeaks (@wikileaks) May 12, 2017 What […]

  • How can you make your digital privacy more certain

    In this high-tech and incredibly automated era, cyber crime is not an uncommon phenomenon. Privacy breaches are happening with many falling victims worldwide for which consequences can be grave!  As such, it has become quite important to raise awareness as to how people can effectively protect their privacy and prevent getting their data falling into […]

  • Microsoft Slams NSA over WannaCry Ransomware Attack

    Earlier today, Microsoft’s President and Chief Legal Officer, Brad Smith stated that part of the responsibility of the recent WannaCry ransomware attack that resulted in a major chaos in more than 150 countries falls on the US government, particularly, the National Security Agency (NSA) and the Central Intelligence Agency (CIA). Why NSA and CIA? For long, […]

  • How to Improve Your SEO through Enhanced Web Security

    The last thing a lot of people think about when it comes to SEO is security, but your site’s search engine optimization is increasingly affected by how secure it is. Let’s look at the ways website security impacts your site’s SEO, brand recognition, and treatment by the search engines. We’ll also address how your site’s […]

  • Uiwix, yet another ransomware like WannaCry – only more dangerous

    In the last few days, the internet has been caught off guard with numerous updates being posted regarding the sprawling effects of the WannaCry ransomware that exploited the vulnerabilities in Microsoft’s Windows operating system to hack more than 75,000 computers and counting last Friday. Nevertheless, it seems like the worst is yet to come. In […]

  • Researcher Finds Kill Switch for new variant of WannaCry Ransomware

    Internet users worldwide are now familiar with the WannaCry or WanaCrypt0r ransomware attack and how cybercriminals used it to infect cyber infrastructure of banking giants, hospitals, tech firms and sensitive installation in more than 90 countries. The users may also know that a British security researcher MalwareTechBlog accidentally discovered the kill switch of WanaCry by […]

  • WannaCry ransomware: Researcher halts its spread by registering domain for $10.69

    Last year the Internet was taken down by cyber criminals through a massive Distributed Denial of Service Attack (DDoS) attack using the infamous Mirai malware. But last Friday afternoon, almost 99 countries including Russia, UK, USA and Australia became victims of a worldwide mass cyber-attack that has been reported to have caused major disruptions to […]

  • Keylogger spotted – HP machines could turn into a spyware

    Security researchers have warned that HP machines could turn into a spyware thanks to an audio driver developed by Conexant Systems, Inc. which comes pre-installed in more than a dozen of HP devices. According to a security advisory published by Switzerland-based security consulting firm Modzero Conexant, responsible for making audio drivers comes with a component “MicTray64.exe” which is an executable […]

  • Hospital computers across England hacked; cyber criminals demanding ransom

    The cyberinfrastructure at hospitals across England has come under a massive cyber attack locking out the staff from their computers and diverting emergency patients. According to The Guardian, National Health Service (NHS) hospitals in the country have been hit with an attack displaying popups on the system demanding ransom money. Doctors have taken the issue […]