MESSAGING APP TELEGRAM IS NOW OFFICIALLY BEING USED BY ISIS

Telegram is now the ISIS’s top means of circulating information to their members and supporters.  It has become a part of the terror group’s communication strategy, following the trend of online messaging encryption. Telegram is a non-profit cloud-based messenger. Telegram applications exist for Android, iOS, BlackBerry 10, Windows Phone, Windows NT, macOS and Linux. Users Read more…

 

A NORTH KOREAN MALWARE DUBBED FALLCHILL EMERGED IN CYBERSPACE

Details of a hacking tool known as FallChill was disclosed to the public by the Department of Homeland Security which originated from the North Korean hacking group known as Hidden Cobra. Activities from malicious cyber-actors identified as Hidden Cobra began in 2009.  These activities include exploits by threat actors on victims in the public and Read more…

 

WITH ANDROHACKBAR, ANDROID USERS NOW PERFORM SQL INJECTION ON THEIR DEVICES

Using ANDROHACKBAR, a mobile application, Android devices can now be used to perform SQL injections, test XXS holes and determine site security. ANDROHACKBAR is an Android application which performs similar to the Mozilla Firefox’ plug-in Hackbar. However, instead of the Hackbar, the ANDROHACKBAR is not a test tool. It can actually execute standard exploits against Read more…

 

MANTISTEK GK2 104 KEYBOARD HAS KEYLOGGING CAPABILITIES

The Mantistek GK2 104 Keyboard is discovered to have keylogging capabilities which secretly transmits users’ key logs using a Cloud Driver to an Alibaba Server based in China. The MantisTek GK2 is a modest mechanical keyboard console from China that costs half as much as the mechanical models from popular manufacturers.  Due to cheap costs, Read more…

 

FAKE WHATSAPP ON GOOGLE PLAY STORE DOWNLOADED BY MILLIONS

Around a million Android clients were tricked into downloading a phony form of the well-known messaging application WhatsApp claiming to be the official one.  The application was called “Update WhatsApp” accessible on official Google Play Store. WhatsApp Messenger is a freeware and cross-platform texting administration for smart phones.  It utilizes the Internet to make voice Read more…

 

ELMEDIA PLAYER CONTAINS MALICIOUS PROTON MALWARE

Specialists from ESET have found that the Elmedia Player download has been bound with Proton malware and has already breached a few Mac gadgets.  In spite of the fact that Apple has constantly averred that their gadgets are the most secure available, obviously, the Elmedia Player malware proves otherwise. The Proton malware was quietly added Read more…

 

3 APPS FROM GOOGLE PLAY WERE FOUND TO HAVE MINING MALWARE

Three apps from Google Play Store were discovered to contain malware used to secretly mine cryptocurrency. These apps were Recitiamo Santo Rosario Free, SafetyNet Wireless App, and Car Wallpaper HD: Mercedes, Ferrari, bmw and audi In cryptocurrency mining, resources such as CPU and GPU are utilized to contribute to the computing power of mining pools Read more…

 

THE CULPRIT BEHIND THE FIREEYE 2015 HACK ARRESTED

The hacker, yet to be publicly identified, who carried out the 2015 doxing attack against Mandiant, a FireEye owned firm based in Virginia, was arrested last 02 November 2017 by international law enforcers. FireEye is an international private cyber-security company known for their impenetrability and reliability.  FireEye conductions cyber-security operations for enormous companies and stands Read more…

 

BAD RABBIT DISCOVERED TO BE USING ETERNALROMANCE EXPLOIT FROM NSA

Recently, the Bad Rabbit ransomware was detected to be rapidly-spreading across Europe.  Now, it was discovered that the Bad Rabbit infection is using an exploit called EternalRomance which is believed to be one of the leaked NSA tools. The said ransomware functions like Petya ransomware.  Bad Rabbit is a ‘Win32/Diskcoder.D’ malware, a new but similar Read more…

 

The CoinHive Monero Mining Service was hacked using DNS Settings

The CoinHive website for Monero mining was hijacked so that the websites embedded by its code have purposely redirected their generated cryptocurrency to the attackers’ servers, instead of CoinHive’s official servers. The blooming popularity of cryptocurrencies was so rapid that even attackers have diverted their attention into these digital currencies rather than physical ones.  Attackers Read more…