Quantcast
Channel: Information Security News|Cyber Security|Hacking Tutorial
Browsing all 1097 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

New GhostAdmin Malware Used for Data Theft and Exfiltration

Security researcher MalwareHunterTeam discovered today a new malware family that can infect computers and allow crooks to take control of these PCs using commands sent via an IRC channel. Named...

View Article


Image may be NSFW.
Clik here to view.

Dutch coder built backdoors into thousands of websites

Dutch developer used built-in backdoors in websites to steal personal information of customers. A 35-year-old unnamed web developer from Leeuwarden, Netherlands has used personal information stolen...

View Article


Image may be NSFW.
Clik here to view.

Hacker found a way to hack Facebook by exploiting the ImageMagick flaw

I want to believe that all of you know about ImageMagick and its Tragick. This issue was found in the end of the April, 2016 and due to many processing plugins depends on the ImageMagick library this...

View Article

Image may be NSFW.
Clik here to view.

Database Ransom Attacks Hit CouchDB and Hadoop Servers

For the past week, unknown groups of cyber-criminals have taken control of and wiped data from CouchDB and Hadoop databases, in some cases asking for a ransom fee to return the stolen files, but in...

View Article

Image may be NSFW.
Clik here to view.

New Mac backdoor using antiquated code

The first Mac malware of 2017 was brought to my attention by an IT admin, who spotted some strange outgoing network traffic from a particular Mac. This led to the discovery of a piece of malware...

View Article


New Intel CPUs Can Be “Hacked” Using The USB Port And A Hardware Feature

Short Bytes: On Modern Intel CPUs, the USB 3.0 port can be used to access the hardware debugging interface JTAG via DCI. According to a research duo at Positive Security, the availability of DCI can...

View Article

Image may be NSFW.
Clik here to view.

Android Ransomware Locks Phone and Asks for Credit Card Number

A new ransomware family is targeting Android devices, locking access to the screen, and constantly pestering the user to enter his payment card details. According to Fortinet researcher Kai Lu, the...

View Article

Android Trojan Hijacks Google Play Store, Covertly Downloads or Purchases Apps

Security researchers have discovered a new Android trojan named Skyfin that can infiltrate the local Play Store Android app and download or purchase other apps behind the user’s back. Until now,...

View Article


Image may be NSFW.
Clik here to view.

Satan ransomware-as-a-service starts trading in the Dark Web

Users can expect to share 30 percent of their ill-gotten gains for signing up. A new kind of ransomware-as-a-service (RaaS) which offers users the chance to tailor their own code and ransom demands has...

View Article


Hack a Furby to Rickroll Your Friends Through Its Creepy Eyeball Menu

The first generation of Furby, the owlish electronic toy made by Hasbro, was met with enormous consumer demand when it hit shelves in November 1998. Thanks to their novel communication abilities and...

View Article

Image may be NSFW.
Clik here to view.

Widely used WebEx plugin for Chrome will execute attack code—patch now!

Publicly known “magic string” lets any site run malicious code, no questions asked. The Chrome browser extension for Cisco Systems WebEx communications and collaboration service was just updated to fix...

View Article

Image may be NSFW.
Clik here to view.

APPS CARRYING HUMMINGBAD VARIANT BOOTED FROM GOOGLE PLAY

Android malware known as HummingBad, that infected as many as 10 million devices in 2016, has resurfaced with several new features allowing it to perform ad fraud even more efficiently than its...

View Article

Image may be NSFW.
Clik here to view.

AlphaBay Dark Web marketplace hacked, private messages leaked

Over 200,000 messages were compromised due to a security flaw. One of the largest trading posts on the Dark Web, AlphaBay, has rewarded a researcher for disclosing the existence of a vulnerability...

View Article


Image may be NSFW.
Clik here to view.

Sage 2.0 Ransomware is spreading and demands a $2,000 Ransom

A newly observed spam campaign is spreading a ransomware variant known as Sage 2.0 that is demanding a $2,000 ransom for the decryption key. Sage 2.0 is a new ransomware recently spotted by security...

View Article

Image may be NSFW.
Clik here to view.

Trojan Transforms Linux Devices into Proxies for Malicious Traffic

Security researchers have uncovered a new trojan that targets Linux devices that is capable of transforming infected machines into proxy servers and relay malicious traffic, hiding the true origin of...

View Article


Image may be NSFW.
Clik here to view.

How Your Android’s Pattern Lock Can Be Cracked In Just 5 Attempts

Short Bytes: Pattern lock on Android smartphones is probably the quickest and easiest way to gain access to the device. A group of researchers has a created a computer vision algorithm which is capable...

View Article

Image may be NSFW.
Clik here to view.

VirLocker Ransomware Returns Just as Virulent as Ever

The VirLocker ransomware made a comeback this past week with a new and very virulent version, but the Malwarebytes security team says there’s a way for victims to recover files by entering a special...

View Article


Image may be NSFW.
Clik here to view.

Expect renewed push for encryption backdoors from Trump administration

Top law enforcement officers, FBI director James Comey and Trump’s nominee for attorney general, Sen. Jeff Sessions, are supportive of giving law enforcement means to sidestep encryption. It seems...

View Article

Image may be NSFW.
Clik here to view.

Texas cops lose evidence going back eight years in ransomware attack

We have to get very, very tough on cyber and cyber warfare… and backups? Cockrell Hill, Texas has a population of just over 4,000 souls and a police force that managed to lose eight years of evidence...

View Article

Image may be NSFW.
Clik here to view.

Dridex Banking Trojan Returns, Leverages New UAC Bypass Method

First observed in July 2014, “Dridex,” a financial banking Trojan, is considered the successor to the “GameOver ZeuS” (GoZ) malware. • Dridex was most active between 2014 and 2015, and smaller...

View Article
Browsing all 1097 articles
Browse latest View live