Category: Security

  • Email Encryption Service Provider ‘ProtonMail’ Now on Tor

    ProtonMail, launched in 2014 by a group of MIT and CERN experts, is the largest email encryption service provider in the world having more than two million users. It is the preferred emailing platform of activists and journalists who need to keep information confidential. In its latest announcement, ProtonMail’s co-founder Dr. Andy Yen stated that […]

  • Quimitchin Malware Targeting Mac Users also Compatible with Linux

    IT security researchers have discovered a new malicious code which affects Mac and Linux systems. It has been dubbed by Apple Inc., as Fruitfly while Malwarebytes named it as Quimitchin, a name inspired by Aztec spies. This newly identified malware spy on biomedical research centers. It is being speculated that the malicious code has remained […]

  • Hacker Exploits Remote Code Execution Bug to Breach Facebook Security

    Andrew Leonov, a security researcher, discovered a critical remote execution bug on Facebook allowing him to breach the security of social media giant through ImageMagick flaw which was previously reported and patched in 2016 yet Leonov was successful in using the flaw to carry the attack against Facebook servers. In a blog post, Leonov explained […]

  • Cyber Criminals Held Cancer Services Computers for Ransom

    Little Red Door is the name of the Cancer Services of East Central Indiana. The executive director of the organization revealed on Tuesday that their computer systems have been infected with a ransomware by cyber criminals who happen to be “an international cyber terrorist organization”. Aimee Fant, the Executive Director of Little Red Door, officially revealed its involvement in the […]

  • Gmail Phishing Scam Stealing Credentials Through Infected Attachment

    Malicious threat actors are using exclusively designed URLs to deceive users into providing their Gmail credentials. This latest phishing campaign, discovered by security experts, utilizes a very effective phishing attack that can trick even the most alerted users and tech-savvy people. The campaign involves sending infected messages to the contacts from an already infected computer. […]

  • Hacker claims our private cell number on Facebook may not be so private

    Inti De Ceukelaire, a Belgian hacker and security researcher has discovered a new method that further sabotages Facebook’s claim to protect users’ data through its supposedly comprehensive privacy setting features. De Ceukelaire has discovered that he can exploit Facebook to obtain cell phone numbers of users; which they want to remain hidden. According to De Ceukelaire, he […]

  • Researchers Expose Fake Android Apps Stealing Instagram Passwords

    Instagram undoubtedly is a very popular social networking platform, which is the main reason why it attracts the attention of cyber-criminals, hackers and scammers so frequently. According to latest findings from the mobile malware research team at Intel Security, Google Play store has become a haven for Instagram password stealers. These malicious cybercriminals are distributing […]

  • Botnet of things: Samsung SmartCams vulnerable to hackers

    It is a fact that users have become suspicious of Internet of Things (IoT) devices since the appearance of Mirai botnet and the subsequent DDoS attacks on high-profile companies. The latest exploit involving Samsung SmartCams further strengthens this notion that IoT devices are quite vulnerable to hacks. Since the time Samsung’s SmartCams went on sale, […]

  • Netflix Users Targeted with yet another sophisticated Phishing Scam

    If you have a Netflix account you might be at risk of falling prey to a new phishing scam that targets Netflix users through emails. These emails contain a fake login screen of Netflix and ask for the login information. If the user enters the login information, the scammers ask for the credit card details. This particular […]

  • Meet Spora, a ransomware that infects users in good faith – Literally

    Security researchers have discovered a new ransomware campaign that not only gives back the encrypted files after payment of ransom but also offers immunity from future ransomware attacks to the victim. It is being distributed through spam emails that appear as invoices and contain a ZIP file in which an HTML Application or HTA file […]

  • Student Arrested for Selling Keylogger that Infected thousands of devices

    A malware developer from Great Falls, Virginia created a keylogger having the capability of recording every single keystroke on a computer and sold it to over 3,000 people. As a result, around 16,000 systems were infected. The US Department of Justice released a press release revealing that the 21-year old hacker Zachary Shames was arrested […]

  • Facebook users hit with “You are in this video?” malware scam

    Until now you must have heard about so many scams involving Facebook Messenger that whenever you see a suspicious chat message sent from other friends on your Facebook profile, you instantly feel alerted. However, there are still innocent Facebook users who fall prey to such scams every other day. The latest scam also uses the […]

  • Researchers Warn Against “free internet without Wi-Fi” WhatsApp Scam

    WhatsApp has lately become the prime target of malicious threat actors and scammer probably due to the widespread global following that the platform enjoys. Eset Security researchers are unearthing one scam after another that is making use of WhatsApp. On the other hand, scammers are coming up with innovative new strategies to lure victims towards […]

  • Adobe’s Latest Security Patch Installs Chrome Extension to Collect Data

    Did you notice the Google Chrome Extension for Adobe Acrobat when you opened Chrome today? If you did and you clicked on Remove button, you are probably safe but if you chose to let the extension be added to your browser, you might be in trouble. On Tuesday, Adobe released latest updates to fix security issues […]

  • Microsoft sued over exposing employees to watch child porn for online safety

    We know that child porn and subsequent child abuse are a reality. In order to prevent criminal-minded pedophiles from running child porn services on their websites, social website moderators are required to keep a check. To perform their duties, they need to watch some highly disturbing pictures and videos to determine if the person who […]

  • Shadow Brokers quit operation; giving away free Windows hacking tools

    Earlier yesterday it was reported that the notorious Shadow Brokers hacking group is selling hacking tools which can be used to hack Windows-based devices. Now, it may come as a surprise the group has suddenly decided to quit their operation and give away some of the stolen Windows hacking tools for free. In a goodbye note on […]

  • Hamas Compromised Dozens of IDF Soldiers’ Phones Using Seductive Female Images

    The IDF and Israeli Security Agency Shin Bet have jointly conducted an operation called “Operation Hunter’s Network” against the Hamas network after the officials got a hint of a new campaign from Gaza-based Hamas hackers. In this new campaign, hackers posted seductive pictures of young, beautiful Israeli women on social media to attract IDF soldiers […]

  • Users reporting Electronic Arts (EA) servers are doing

    Electronic Arts users are taking their questions on Twitter wondering why they are unable to connect to the servers. The service interruption started about two hours ago and since then users have been reporting the issue to the official support Twitter account of Electronic Arts. In a reply to one of those tweets, the EA support […]

  • How Blockchain Can Revolutionize Personal Data Storage?

    Blockchain, the technology underlying the cryptocurrency Bitcoin, is modeled to revolutionize as per the nature of commercial transactions. Bitcoin is a non-governmental and peer-to-peer currency, and it is the first currency of its nature. Bitcoin is famously known as a virtual currency, and its maker is trying to make it equivalent to the currencies issued […]