Posts

Showing posts from July, 2017

DEFCON: Researcher hacked Voting Machine in maximum 90 minutes

Image
Attendees at a hacking convention in las vegas will spend some time this weekend attempting to break in to over thirty voting machines utilized in recent elections. Hackers at at DEFCON in las vegas were able to successfully breach the software of U.S. voting machines in exactly ninety minutes. The idea behind to hack these machines is to boost awareness and find out exactly how at risk of tampering they're, said by Jeff Moss,DefCon. Technocrats at the annual "DEF CON" in las vegas got physical voting machines and remote access, with the directions of gaining access to the software. According to a Register report, within minutes, hackers exposed evident physical and software vulnerabilities across multiple U.S. mechanical device companies' product. Some devices were found to own physical ports that would be accustomed attach devices containing malicious software. Others had insecure Wi-Fi connections, or were running obsolete software with securit

"FruitFly" Mac malware: longstanding Mac backdoor discovered

Image
The FBI is presently work many infections tied to a mysterious family of Mac-based malware known as "FruitFly." When asked concerning the threat, a proponent for the Bureau told Motherboard that "as a matter of long policy, the FBI neither confirms nor denies the existence of investigations." however 2 security researchers say the FBI is so work the malware. One of the researchers, Malwarebytes's Thomas Reed, discovered the primary variant of FruitFly back in Jan 2017. At the time, he represented the threat as "a piece of malware in contrast to something I’ve seen before, that seems to possess really been alive, undetected, for a few time." FruitFly one is "extremely oversimplified on the surface," in Reed's estimation. however it distinguishes itself by its use of "ancient" functions to capture screenshots and acquire digital camera access. The malware's binary additionally contains lib jpeg, open ASCII tex

Professionals are more vulnerable while on Vacation: Do and Don't while enjoying vacation

Image
With the summer, most are beginning to prepare with programming their future vacations. As operating professionals begin planning and judge on what to pack and produce with them, it's terribly doubtless that their bag are going to be filled with technical gadgets, tablets, smartphones and each personal and work laptops – particularly once their vacations embrace some work that simply can’t wait. Many of these with rigorous jobs apprehend that even once on vacation they have to stay connected to the planet in additional ways that than one to answer emails and handle vital business matters. With the enhanced use, on-line services by these traveling professionals, particularly in unknown territory, those traveling will quickly become a target of cyber criminals and hackers. during this case, it's critically vital to understand however cyber criminals target their victims, what travelers will do to scale back the chance and create it tougher for the attackers to steal thei

RIP MS Paint: 1985-2017, MS Paint will not be available in future update of Windows 10

Image
Fans of Microsoft's long-standing Paint program are suddenly feeling terribly blue. The company recently declared that Microsoft Paint is on an inventory of options that area unit set to be "removed and deprecated" within the Windows 10 Fall Creators Update, set to be free this fall. The 32-year-old(1985-2017) graphic-editing program is formally marked as deprecated, that means it'll be within the fall update however is not any longer being actively updated and will be phased out at some purpose. It's unclear once Microsoft can formally take away Paint from its package. Paint was Microsoft's original Windows 1.0 program once the corporate launched in 1985 and had been a staple in its systems for years. better-known for its simplicity, Paint allowed users to dream of being the digital technologist carver by victimization their computer's mouse because the brush. In October, Microsoft free Paint 3D, associate degree updated version of th

'Devil's Ivy': Millions of IoT Devices at Risk

Image
Millions of IoT devices area unit liable to cybersecurity attacks as a result of a vulnerability ab initio discovered in remote security cameras, Senrio reportable on. The firm found the flaw in an exceedingly security camera developed by Axis Communications, one in every of the world's biggest makers of the devices. The Model 3004 security camera is employed for security at the la International field and different places, consistent with Senrio. The problem clad to be a stack buffer overflow vulnerability, that the firm dubbed "Devil's Hedera helix." Axis notified the safety firm that 249 totally different models of the camera were full of the vulnerability. It found solely 3 models that were unaffected. The problem lies deep within the communication layer of gSOAP, associate open supply third-party toolkit that's employed by every kind of device manufacturers for IoT technology, consistent with Senrio. gSOAP manager Genivia reportable that the t

27,000+ cyber security incidents reported in First half of 2017 in India

Image
Over twenty-seven thousand cyber security incidents were reported within the 1st six months of this year to Indian Computer Emergency Response Team (CERT-In), Parliament was educated nowadays. These incidents embrace phishing, web site intrusions and defacement in addition as ransomware attacks. "As per the data reported to and caterpillar-tracked by Indian Computer Emergency Response Team (CERT-In), a complete range of 44,679; 49,455; 50,362 and 27,482 cyber security incidents were determined throughout the year 2014, 2015, 2016 and 2017 (till June), severally," Minister of State for natural philosophy and IT P P Chaudhary aforesaid in an exceedingly written reply to the Rajya Sabha. He else that the kinds of cyber security incidents as well as phishing, scanning/probing, web site intrusions and defacements, virus/malicious code, ransomware, denial of service attacks etc. The minister aforesaid CERT-In problems alerts and advisories relating to latest cy

YouTube Redirect IS video searches to other non violent videos

Image
YouTube says it'll send folks checking out "violent extremist propaganda" and provide them videos that denounce coercion. People checking out bound terms about the questionable Islamic State cluster are going to be offered playlists of videos "debunking its mythology". YouTube aforesaid it wished to assist stop folks being radicalised. In a diary post, the video-streaming large aforesaid it absolutely was implementing concepts from the send technique, a campaign that tries to steer the IS audience towards videos that poke fun the group's achievement techniques. The themed video playlists challenge claims by the questionable Islamic State cluster that it provides smart governance, could be a sturdy social unit, which world powers ar conspiring to damage Muslims. Rather than manufacturing new material, the playlists contain videos already uploaded to YouTube that gift Associate in Nursing opposing purpose of read, such as: ·      

"Alphabay" and "Hansa Market": Big name of DarkWeb seized

Image
The AlphaBay and Hansa Market -DarkWeb sites had been associated with the trade in items such as drugs, weapons, malware and stolen data online as well as offline. Hansa Market was monitored for a month before being deactivated. AlphaBay and Hansa were accessible only through the Tor network, which presence a significant challenge to law enforcement agents hoping to seize the host servers. It’s still unclear how authorities were able to locate the servers or site admin, but it appears to have been done without compromising the underlying protections of Tor. The agency said it believed the bust would lead to hundreds of new investigations in Europe. "The capability of drug traffickers and other serious criminals around the world has taken a serious hit today," said Europol's executive director Rob Wainwright. Marketplace URL: http://pwoah7foa6au2pul.onion/register.php?aff=41211  (Seized) Forum Registty: http://pwoah7foa6au2pul.onion/forum/ Sub Reddit:

PhaaS-Phishing as a Service: HackShit made Phishing easy ever

Image
Crimeware as a service is not new for the cyber criminal. After Katyusha Scanner- Fully automated SQL vulnerabilities scanner a new platform introduced Hackshit. The Hackshit is a Phishing as a Service (PhaaS) platform provide low cost phishing campaign and marketplace. They offer free trial of their service for limited set of attempts. They allow beginner scammer to launch phishing campaign without knowledge of hacking. You can buy hacking tools - mass senders, spam-page generators, crypters, surveillers, spywares, RAT and trojan in their Marketplace. You can easily create phishing page of famous site like facebok, google, twitter etc. Here you can also trade logs in which you get by your campaign in the marketplace to earn money from ready buyers all over the world and get to meet professional hackers to earn digital currency (Bitcoin / Perfect money). Hackshit, that records the credentials of the phished victims. The phished bait pages are packaged with base64 enc

WikiLeaks - Vault7 : HighRise used for SMS monitoring

Image
WikiLeaks has released details about HighRise, a tool allegedly developed by the US- CIA, which intercepts and redirects SMS messages to a remote web server through an Android application. The malware can enable a CIA agent to access the message before it reaches its intended recipient. As per tweets of WikiLeaks, HighRise acts as a proxy server for text messages. However, it is limited to devices which have the malware installed on it manually – meaning that the CIA would need physical access to the Android device to infect the handset. The manual suggested that it only works on Android versions from 4.0 (Ice Cream Sandwich) to 4.3 (JellyBean) – although it could have been updated to work on more recent versions of the Android OS. The HighRise tool is packaged inside an app called TideCheck. Once the CIA installs the app on the target’s device, they have to run it at least once, in order for it to work at all times – including when the phone is rebooted. The app starts w