Archive for the ‘cyber security’ Category

Adobe Releases Patches for Critical Flaws in Photoshop CC and Digital Edition

March 12th, 2019
Adobe users would feel lighter this month, as Adobe has released patches for just two security vulnerability in its March Security Update. The company today released its monthly security updates to address two critical arbitrary code execution vulnerabilities—one in Adobe Photoshop CC and another in Adobe Digital Editions. Upon successful exploitation, both critical vulnerabilities could

Posted in adobe software update, cyber security, hacking news, patch update, remote code execution, Security patch Update | Comments (0)

NSA Releases GHIDRA Source Code — Free Reverse Engineering Tool

March 6th, 2019
Update (4/4/2019) — Great news. NSA today finally released the complete source code for GHIDRA version 9.0.2 which is now available on its Github repository. GHIDRA is agency's home-grown classified software reverse engineering tool that agency experts have been using internally for over a decade to hunt down security bugs in software and applications. GHIDRA is a Java-based reverse

Posted in cyber security, cyber security software, Ghidra, hacking news, NSA, reverse engineering tool, Reverse-engineering, software reverse engineering | Comments (0)

Hackers Actively Exploiting Latest Drupal RCE Flaw Published Last Week

February 26th, 2019
Cybercriminals have actively started exploiting an already patched security vulnerability in the wild to install cryptocurrency miners on vulnerable Drupal websites that have not yet applied patches and are still vulnerable. Last week, developers of the popular open-source content management system Drupal patched a critical remote code execution (RCE) vulnerability (CVE-2019-6340) in Drupal

Posted in cryptocurrency, cyber security, Drupal, Drupal exploit, drupal hacked, Drupal hacking, hacking news, remote code execution, website security | Comments (0)

Android Gets FIDO2 Certification—Now Supports Secure Passwordless Logins

February 25th, 2019
Great news. If you have already installed the latest update of Google Play Services released earlier today, and your Android device is running Android version 7.0 Nougat or above—Congratulations! Your device is now FIDO2 Certified. Are you thinking… what the heck that actually means? It means, instead of remembering complex passwords for your online accounts, you can now actually use your

Posted in Android, cyber security, FIDO Alliance, FIDO U2F, FIDO Universal 2nd Factor Authentication, FIDO2 Protocol, hacking news, password security, passwordless, two-factor authentication, WebAuthn | Comments (0)

LPG Gas Company Leaked Details, Aadhaar Numbers of 6.7 Million Indian Customers

February 19th, 2019
Why would someone bother to hack a so-called "ultra-secure encrypted database that is being protected behind 13 feet high and 5 feet thick walls," when one can simply fetch a copy of the same data from other sources. French security researcher Baptiste Robert, who goes by the pseudonym "Elliot Alderson" on Twitter, with the help of an Indian researcher, who wants to remain anonymous,

Posted in aadhaar, Aadhaar Database, Aadhaar Leak, biometric data, cyber security, data breach, data leaked | Comments (0)

Popular Torrent Uploader ‘CracksNow’ Caught Spreading Ransomware

February 18th, 2019
It's not at all surprising that downloading movies and software from the torrent network could infect your computer with malware, but it's more heartbreaking when a popular, trusted file uploader goes rogue. Popular software cracks/keygens uploader "CracksNow," who had trusted status from many torrent sites, has now been banned from several torrent sites after he was repeatedly found

Posted in best torrent sites, cyber security, GandCrab ransomware, hacking news, kickass torrent, ransomware, The Pirate Bay, Torrent Download Software, torrent files | Comments (0)

Over 92 Million New Accounts Up for Sale from More Unreported Breaches

February 18th, 2019
All these numbers…. "More than 5 billion records from 6,500 data breaches were exposed in 2018" — a report from Risk Based Security says. "More than 59,000 data breaches have been reported across the European since the GDPR came into force in 2018" — a report from DLA Piper says. …came from data breaches that were reported to the public, but in reality, more than half of all data breaches

Posted in cyber security, dark web, data breach, data breached, Deep Web, dream market, hacking news, password hacking, password list | Comments (0)

Ex-US Intelligence Agent Charged With Spying and Helping Iranian Hackers

February 14th, 2019
The United States Department of Justice has announced espionage charges against a former US Air Force intelligence officer with the highest level of top-secret clearance for providing the Iranian government classified defense information after she defected to Iran in 2013. Monica Elfriede Witt, 39, was a former U.S. Air Force Intelligence Specialist and Special Agent of the Air Force Office

Posted in cyber espionage, cyber security, espionage, FBI, fbi most wanted hackers, Hacker wanted, intelligence agency, Iranian Hackers, Iranian military, most wanted hacker | Comments (0)

First Android Clipboard Hijacking Crypto Malware Found On Google Play Store

February 11th, 2019
A security researcher has discovered yet another cryptocurrency-stealing malware on the official Google Play Store that was designed to secretly steal bitcoin and cryptocurrency from unwitting users. The malware, described as a "Clipper," masqueraded as a legitimate cryptocurrency app and worked by replacing cryptocurrency wallet addresses copied into the Android clipboard with one belonging

Posted in Android Malware, Android Security, clipboard hijacking, cryptocurrency, cyber security, how to hack android, malware, malware protection software | Comments (0)

Android Phones Can Get Hacked Just by Looking at a PNG Image

February 6th, 2019
Using an Android device? Beware! You have to remain more caution while opening an image file on your smartphone—downloaded anywhere from the Internet or received through messaging or email apps. Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of

Posted in cyber security, hack android mobile, hacking android phone, how to hack android, mobile exploit, mobile vulnerability, PNG Image Hack, remote code execution, Vulnerability | Comments (0)