EXPOSED AMAZON S3 SERVERS RESULTED IN INTELLIGENCE LEAKS FROM PENTAGON

Due to a misconfiguration, huge amounts of information stored in Amazon S3 Servers were exposed to the public, including intelligence from Pentagon. Amazon S3, or Simple Storage Service, is storage for the Internet, similar to Google Drive.  It is designed to make web-scale computing easier for developers. Amazon S3 has web services interface that can Read more…

 

KASPERSKY FINALLY DISPUTED THE ALLEGATIONS AGAINST THEIR ANTIVIRUS

Kaspersky Lab is a Russian-based cyber-security provider.  Kaspersky Lab is the developer behind the popular Kaspersky anti-virus software. Last October 2017, Kaspersky was blamed by several security companies worldwide, especially US-based security agencies, for providing access on their anti-virus software to Russian intelligence.  It was reported that last 2015, a set of NSA hacking tools Read more…

 

A NORTH KOREAN MALWARE DUBBED FALLCHILL EMERGED IN CYBERSPACE

Details of a hacking tool known as FallChill was disclosed to the public by the Department of Homeland Security which originated from the North Korean hacking group known as Hidden Cobra. Activities from malicious cyber-actors identified as Hidden Cobra began in 2009.  These activities include exploits by threat actors on victims in the public and Read more…

 

MESSAGING APP TELEGRAM IS NOW OFFICIALLY BEING USED BY ISIS

Telegram is now the ISIS’s top means of circulating information to their members and supporters.  It has become a part of the terror group’s communication strategy, following the trend of online messaging encryption. Telegram is a non-profit cloud-based messenger. Telegram applications exist for Android, iOS, BlackBerry 10, Windows Phone, Windows NT, macOS and Linux. Users Read more…

 

A NORTH KOREAN MALWARE DUBBED FALLCHILL EMERGED IN CYBERSPACE

Details of a hacking tool known as FallChill was disclosed to the public by the Department of Homeland Security which originated from the North Korean hacking group known as Hidden Cobra. Activities from malicious cyber-actors identified as Hidden Cobra began in 2009.  These activities include exploits by threat actors on victims in the public and Read more…

 

WITH ANDROHACKBAR, ANDROID USERS NOW PERFORM SQL INJECTION ON THEIR DEVICES

Using ANDROHACKBAR, a mobile application, Android devices can now be used to perform SQL injections, test XXS holes and determine site security. ANDROHACKBAR is an Android application which performs similar to the Mozilla Firefox’ plug-in Hackbar. However, instead of the Hackbar, the ANDROHACKBAR is not a test tool. It can actually execute standard exploits against Read more…

 

MANTISTEK GK2 104 KEYBOARD HAS KEYLOGGING CAPABILITIES

The Mantistek GK2 104 Keyboard is discovered to have keylogging capabilities which secretly transmits users’ key logs using a Cloud Driver to an Alibaba Server based in China. The MantisTek GK2 is a modest mechanical keyboard console from China that costs half as much as the mechanical models from popular manufacturers.  Due to cheap costs, Read more…

 

FAKE WHATSAPP ON GOOGLE PLAY STORE DOWNLOADED BY MILLIONS

Around a million Android clients were tricked into downloading a phony form of the well-known messaging application WhatsApp claiming to be the official one.  The application was called “Update WhatsApp” accessible on official Google Play Store. WhatsApp Messenger is a freeware and cross-platform texting administration for smart phones.  It utilizes the Internet to make voice Read more…

 

ELMEDIA PLAYER CONTAINS MALICIOUS PROTON MALWARE

Specialists from ESET have found that the Elmedia Player download has been bound with Proton malware and has already breached a few Mac gadgets.  In spite of the fact that Apple has constantly averred that their gadgets are the most secure available, obviously, the Elmedia Player malware proves otherwise. The Proton malware was quietly added Read more…

 

3 APPS FROM GOOGLE PLAY WERE FOUND TO HAVE MINING MALWARE

Three apps from Google Play Store were discovered to contain malware used to secretly mine cryptocurrency. These apps were Recitiamo Santo Rosario Free, SafetyNet Wireless App, and Car Wallpaper HD: Mercedes, Ferrari, bmw and audi In cryptocurrency mining, resources such as CPU and GPU are utilized to contribute to the computing power of mining pools Read more…