Archive for the ‘cyber security’ Category
Adobe users would feel lighter this month, as Adobe has released patches for just two security vulnerability in its March Security Update.
The company today released its monthly security updates to address two critical arbitrary code execution vulnerabilities—one in Adobe Photoshop CC and another in Adobe Digital Editions.
Upon successful exploitation, both critical vulnerabilities could
Posted in adobe software update, cyber security, hacking news, patch update, remote code execution, Security patch Update | Comments (0)
Update (4/4/2019) — Great news.
NSA today finally released the complete source code for GHIDRA version 9.0.2 which is now available on its Github repository.
GHIDRA is agency's home-grown classified software reverse engineering tool that agency experts have been using internally for over a decade to hunt down security bugs in software and applications.
GHIDRA is a Java-based reverse
Posted in cyber security, cyber security software, Ghidra, hacking news, NSA, reverse engineering tool, Reverse-engineering, software reverse engineering | Comments (0)
Cybercriminals have actively started exploiting an already patched security vulnerability in the wild to install cryptocurrency miners on vulnerable Drupal websites that have not yet applied patches and are still vulnerable.
Last week, developers of the popular open-source content management system Drupal patched a critical remote code execution (RCE) vulnerability (CVE-2019-6340) in Drupal
Posted in cryptocurrency, cyber security, Drupal, Drupal exploit, drupal hacked, Drupal hacking, hacking news, remote code execution, website security | Comments (0)
If you have already installed the latest update of Google Play Services released earlier today, and your Android device is running Android version 7.0 Nougat or above—Congratulations! Your device is now FIDO2 Certified.
Are you thinking… what the heck that actually means?
It means, instead of remembering complex passwords for your online accounts, you can now actually use your
Posted in Android, cyber security, FIDO Alliance, FIDO U2F, FIDO Universal 2nd Factor Authentication, FIDO2 Protocol, hacking news, password security, passwordless, two-factor authentication, WebAuthn | Comments (0)
Why would someone bother to hack a so-called "ultra-secure encrypted database that is being protected behind 13 feet high and 5 feet thick walls," when one can simply fetch a copy of the same data from other sources.
French security researcher Baptiste Robert, who goes by the pseudonym "Elliot Alderson" on Twitter, with the help of an Indian researcher, who wants to remain anonymous,
Posted in aadhaar, Aadhaar Database, Aadhaar Leak, biometric data, cyber security, data breach, data leaked | Comments (0)
It's not at all surprising that downloading movies and software from the torrent network could infect your computer with malware, but it's more heartbreaking when a popular, trusted file uploader goes rogue.
Popular software cracks/keygens uploader "CracksNow," who had trusted status from many torrent sites, has now been banned from several torrent sites after he was repeatedly found
Posted in best torrent sites, cyber security, GandCrab ransomware, hacking news, kickass torrent, ransomware, The Pirate Bay, Torrent Download Software, torrent files | Comments (0)
All these numbers….
"More than 5 billion records from 6,500 data breaches were exposed in 2018" — a report from Risk Based Security says.
"More than 59,000 data breaches have been reported across the European since the GDPR came into force in 2018" — a report from DLA Piper says.
…came from data breaches that were reported to the public, but in reality, more than half of all data breaches
Posted in cyber security, dark web, data breach, data breached, Deep Web, dream market, hacking news, password hacking, password list | Comments (0)
The United States Department of Justice has announced espionage charges against a former US Air Force intelligence officer with the highest level of top-secret clearance for providing the Iranian government classified defense information after she defected to Iran in 2013.
Monica Elfriede Witt, 39, was a former U.S. Air Force Intelligence Specialist and Special Agent of the Air Force Office
Posted in cyber espionage, cyber security, espionage, FBI, fbi most wanted hackers, Hacker wanted, intelligence agency, Iranian Hackers, Iranian military, most wanted hacker | Comments (0)
A security researcher has discovered yet another cryptocurrency-stealing malware on the official Google Play Store that was designed to secretly steal bitcoin and cryptocurrency from unwitting users.
The malware, described as a "Clipper," masqueraded as a legitimate cryptocurrency app and worked by replacing cryptocurrency wallet addresses copied into the Android clipboard with one belonging
Posted in Android Malware, Android Security, clipboard hijacking, cryptocurrency, cyber security, how to hack android, malware, malware protection software | Comments (0)
Using an Android device?
Beware! You have to remain more caution while opening an image file on your smartphone—downloaded anywhere from the Internet or received through messaging or email apps.
Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of
Posted in cyber security, hack android mobile, hacking android phone, how to hack android, mobile exploit, mobile vulnerability, PNG Image Hack, remote code execution, Vulnerability | Comments (0)