Android vulnerability Janus malware Allows Hackers to Modify Apps

Relevance score 0: Android’s regular security update for December 2017 included a fix for Janus malware With over 2 Billion active devices Android market is the biggest smartphone market and competitor of IOS devices. But these 2 Billions of devices are at a severe security risk by the detection of this newly discovered vulnerability. The vulnerability dubbed … Read more

Tizi: New Android Spyware Discovered by Google

Google play protect is well known for its new AI-powered malware detection mechanism, Google Play Protect Service recently detected an Android spyware dubbed as “Tizi.” Targeting devices in African countries, Tizi comes with fully featured android rooting and data collection capabilities. It creates a backdoor in the affected device and sends sensitive information related to … Read more

Firefox To Alert Users When They Visit Previously Hacked Website

Mozilla Firefox recently launched their all-new version of Firefox, the “Firefox Quantum,” which tends to be faster than its competitor Google Chrome, compared to chrome, firefox quantum uses 30% fewer resources and is quite faster. Quantum launched with brand new stylish design and couple of new features including the tracking protection feature. Apart from the … Read more

Google Caught Collecting Android Location Data Even When GPS is Disabled

There are over 2 billion people using Androids nowadays, this figure is given by Google itself, in the month of May 2017 Google announced that there are over 2 billion active smartphone users. But what Google didn’t announce is that these 2 billion smartphones data is been collected by Google for there location-based marketing purpose. … Read more

Windows Defender Can’t Defend You Anymore

Windows Defender, which is by default an anti-threat software for Windows operating system can be bypassed using a technique called Illusion Gap. Security Researchers at CyberArk on this Thursday published a blog post explaining about this new technique of bypassing Windows Defender called Illusion Gap. (Windows Defender is widely used as a default anti-malware program in … Read more

New FinFisher Campaigns Are Scary. Read why

FinFisher an infamous spyware which was widely sold to the government organizations and other agencies. Security researchers at ESET discovered malware/surveillance campaigns utilizing variants of FinFisher in the wild. “New surveillance campaigns utilizing FinFisher, are in the wild, featuring technical improvements, some of these variants have been using a cunning, previously-unseen infection vector with strong indicators … Read more

WikiLeaks Revealed CIA Tool To Monitor Linux Network Traffic

wikileaks

WikiLeaks as part of Vault 7 leaks published documents from a project of CIA dubbed as ‘OutlawCountry‘. The documents published on Thursday on their website explains about a malware which probably CIA used to monitor the network traffic of Linux users. The two documents named as ‘OutlawCountry v1.0 User Manual‘ and ‘OutlawCountry v1.0 Test Plan‘ … Read more

Linux Machine Can Be Remotely Hijacked By Malicious DNS Response

linux systemd bug

Now Linux machines can be hacked using a malicious DNS response (TCP). An attacker just has to send a Psuedo DNS Response to the victim. This vulnerability has been discovered in Systemd, which is a popular service manager for Linux machines, it allows remote attackers to overflow the buffer to execute a malware on the … Read more

Details of over 198 million U.S voters leaked

Chris Vickery, a security researcher at UpGuard, discovered that nearly 198 million U.S voters were kept exposed on an unsecured Amazon S3 server. The researcher says that the data included sensitive details of the voters. Chris Vickery is the researcher who previously discovered the data leak of 100 million Mexican voters. This is largest data … Read more

Zusy: New PowerPoint Mouseover Based Malware

zusy malware

#Hackers have found a way to download a malicious file when a hover action is performed over a #hyperlink. The interesting fact about this technique is that it did not rely on Macros, JavaScript or VBA for the execution method. This makes it unique as it does not uses normal exploitation methods as most of … Read more

Dvmap: Android-Rooting Trojan with Code Injection Ability

dvmap android rooting trojan

Earlier today Security researchers at Kaspersky Lab released a blog post explaining about an Android-rooting trojan with code injection ability spreading through the Android official play store (Google Play Store). The attackers are using several techniques to hack fool the google’s security framework, earlier this week we have mentioned in our blog post how hackers … Read more

Russian Hackers using Google’s APM Service to hack Gmail Users

gmail hacking campaign

  Everyone is crazy about hacking social media accounts of people, meanwhile, some target social media accounts of celebrities or high ranked officials of the country. Gmail has 1 Billion monthly active users and going on, Gmail is also used for official works by many officials. If such email accounts can be hacked then it can … Read more

Android Malware And The Way You Are Infecting Yourself

android-mobile-1

Android is used by 328 million users worldwide, the operating system has dominated the smartphone market. Android, by 3rd quarter of 2016 covered 88% of the smartphone market. Being so popular, the developers showed huge interest in building applications for the platform, in a result of which, the android play store (google play store) now … Read more

EternalRocks: New Malware is Even More Dangerous than WannaCry

Last Few weeks have had a rattling effect on the field of Cyber Security.  Where Security Researcher’s had a hard time for finding solutions to prevent the society from an explicitly dangerous Ransomware WannaCry. The Ransomware So far has affected around 300,000 computers in around 150 countries all over the globe, managing to fund a six … Read more

Around 25 Percent TalkTalk Customers Could Still Be Left With Vulnerable Routers

Up to 25 Percent of TalkTalk UK Customers Could Still Left With Vulnerable Routers Around 25 Percent TalkTalk UK Customers Could Still Be Left Vulnerable Routers Back in late 2016 exploits were found in D-Link DSL-3680 routers provided by TalkTalk. This exploit known as in the Hacker World as PixieWPS exploit left many home owners and … Read more

WannaCry? No Thanks! I have Free Decryption Tool

Wannacry Decrypt

A simple Ransomware which got widely spread around the globe rising tensions around different Cyber Security Firms. The Ransomware so far has made a huge impact by affection around 200,000+ computers around the globe and was able to make 6 digits for the people behind this evil Ransomware. The Ransomware was using an SMB remote … Read more

WannaCry : All You Need To Know About This Trendy Ransomware

wannacry

From the Start of this year, the Ransomware attacks are taking place in different regions around the globe. One such big ransomware which simple peeps into your computer like a boss and asks you WannaCry? Yes true it really does that, How it does? , what the damage caused by this ransomware? everything we are … Read more

Zero Day Discovered in Riverbed Technology’s Steel Central Portal

zero day

Riverbed Technology, Inc. is an American IT company that develops products to improve application performance across wide area networks (WANs), a technique known as WAN optimization. Its products reduce latency and bandwidth constraints in delivering applications via WANs to multiple locations across long distances. It also develops products to support network and application performance management. … Read more