Skip to main content

Posts

Showing posts with the label Hacks

Breaking News : Chinese smartphone manufacturer OnePlus website was hacked and 40K users credit card data were compromised

image source Today (January 19th, 2017),   Mingyu,  a    staff of OnePlus company has published a post to its official OnePlus blog site stated that the hackers injected some malicious scripts  into the company’s payment page code and stolen all credit card data.  However, OnePlus maintains that customers  who used saved credit cards or paid via the “Credit Card via PayPal” and  those who bought OnePlus products via PayPal should not be affected.   According to  Mingyu's statement on the official OnePlus blog --  “We cannot apologize enough for letting  something like this happen. We are eternally grateful to have such a  vigilant and informed the community, and it pains us to let you down.”   “We are working with our current payment  providers to implement a more secure credit card payment method, as well  as conducting an in-depth security audit. All these measures will hel...

A critical vulnerability was just found on Electrum Bitcoin Wallet

What's this vulnerability ? Just one day ago a Github user  taviso  reported a serious vulnerability in Electrum Bitcoin Wallet. This is a very serious security bug which allows an attacker to steal your Electrum wallet seed via a simple browser and java script. The attacker can only steal your seed if you left your wallet unprotected without encrypting it. How does it work ? On the Electrum's  github issue page  he shows how it is possible to steal Electrum wallet seed -- He Installed Electrum 3.0.3 on Windows. Created a new wallet with all default settings. He left the wallet not encrypted with password- the default setting. Visited in Chrome. Now, it's time to guess the right port number. He used JSON RPC server by default. It does use a random port but a website (run by an attacker) can simply scan for the right port in seconds. After a few seconds he succeeded to guesses the right port, and then an alert() appeared with: seed: {"id": 0.7398595...

A small $5 worth USB hacking tool can compromise a password protected PC

Samy Kamkar who previously developed many sophisticated hacking tools has recently developed a very strong hacking tool called “Poison Tap”. It’s a very small USB device that works by re-routing all the internet traffic to its own domain and hence accesses cookies. And for this the attacker can access even password protected computer.  This hacking tool evades the following security mechanisms: Password Protected Lock Screens Routing Table priority and network interface Service Order Same-Origin Policy X-Frame-Options HttpOnly Cookies SameSite cookie attribute Two-Factor/Multi-Factor Authentication (2FA/MFA) DNS Pinning Cross-Origin Resource Sharing (CORS) reference : https://www.hackread.com/hacking-tool-bypass-locked-computers-security/ Tags : Hacks, Security, Technology, Cyber Attack, News, Video, Youtube,  This Post Was Published On My Steemit Blog . Please, navigate to steemit and cast a free upvote to help me if you like my post. Fir...

xLED Malware Lets Criminals Exfiltrate Sensitive Information Through Router LEDs

Tags : Malware, Technology, Hacks, Security, Cyber Crime, Cyber Attack, News, Amazing News,  This Post Was Published On My Steemit Blog . Please, navigate to steemit and cast a free upvote to help me if you like my post. First Time heard about Steemit ? Click Here To Know Everything About Steemit 

Hackers spreading Locky ransomware by uploading infected .SVG images on Facebook Messenger

image credit What is Locky Ransomware ? The name of this ransomware is LOCKY. What is Locky ? it actually denotes one of the today’s prevalent ransomware families. It was discovered in the mid-February 2016. This file-encrypting epidemic proved to be sophisticated enough to fly under the radar of conventional anti-malware defense. However, Locky is one of the most preferred malicious software used by hackers.  Who Discovered ? Bart Blaze, a very well known reputed security researcher first discovered this type of ransomware attack which is being conducted via Facebook Messenger. Later, Peter Kurse, another security researcher with extensive experience in investigating cyber-crimes confirmed the news to reporters. Bart Blaze wrote in his personal blog :  “As always, be wary when someone sends you just an ‘image’ – especially when it is not how he or she would usually behave”.  And Facebook has released the following statement in response to the discovery...

BREAKING : Beware of Top Three Types of Cyber Attacks in 2017

  image credit 1. Widespread DDoS Attacks The main target of DDoS (Distributed Denial of Service) attacks are the Financial institutions (which companies that have online financial transactions). DDoS Attacks keep their servers & online base services down for several hours or days and causes a huge loss of these victim companies. image credit 2. Cyber Terrorist Attacks Cyber Terrorist Attacks could infiltrate the highest levels of security in government servers & computers, disrupt government operations, bring down the entire Internet, close down the power grid, cause nuclear arms to launch, and so much more. image credit 3. A New Breed of Ransomware Is Looming Ahead Nowadays Ransomware is a very real threat to not only companies but also every individuals around the world. Ransomware is a malware which attacks your PC & then encrypts all your personal & important files. To get your files decrypt back it demands virtual currencies such as Bitcoin....

Beware of fake instagram, whatsapp, facebook, netflix android apps contained SpyNote RAT malware

image credit Several months ago I published this warning post for all social media users to avoid SpyNote RAT malware. I repeated it to warn again -- Zscaler, a famous IT Security researchers company has recently identified some fake malicious apps which are uploaded by cyber criminals. These malicious apps are infected with an infamous SpyNote RAT (Remote Access Trojan). It’s a good news that at present time, SpyNote doesn’t exist in Google Play Store. But, researchers at Zscaler have identified several fake third-party apps which are infected with SpyNote. The names of these fake infected apps as identified by Zscaler are: Netflix  Whatsapp  YouTube  Video Downloader  Google Update  Instagram  Hack Wifi  AirDroid  WifiHacker  Facebook  Photoshop  SkyTV  Hotstar  Trump Dash  PokemonGo  Among the above-mentioned apps, Zscaler researchers have kept their emphases on fake Netflix app being infected...

New era of hacking technique : You may be attacked through malicious movie subtitles

image credit Now-a-days computer and internet is an essential part of our daily life. Everything is now connected to computers through internet. But, in the last couple of years this internet world are being faced numerous cyber attacks & threats. Only a few days ago WannaCry ransomware was spread out in the form of epidemic. Thousands of computers were infected by it.  All of this goes to show computer users have to worry about a lot of potential problems these days.  Now, another very anxious news is that - "Watching a movie with external subtitles has become a threat right now". More specifically, researchers  came across a vulnerability of how video players load and parse subtitle  files. This exploit can lead to computers being taken over by third  parties.   image credit Playing a downloaded or copied movie with external subtitles has now turned into an risky habit. All the more particularly, video player software parses and loads s...

Security researchers just traced Uiwix, a ransomware which is very similar to WannaCry but more dangerous than it

image credit Now-a-days, the word "WannaCry" is very familiar to all of us. This ransomware exploited the vulnerabilities in  Microsoft’s Windows operating system (except Windows 10) to hack more than 75,000 computers in more than 150 countries & counting last Friday. Microsoft has recently released the security patches for all versions of Winows including XP to prevent this ransomware. Also numerous security researchers are continuously working to develop a permanent solution. Although a temporary solution called "WannaCry KillSwitch" is already discovered by a british security researcher Marcus Hutchins. He slows down the spreads of WannaCry by registering a domain name "wannacry". Heimdal Security, a cyber security software company has recently reported that another ransomware called Uiwix, has emerged, which is exploiting the vulnerabilities found in Windows SMB v1 and SMB v2. Wannacry is doing in the same method to spread. Is Uiwix simi...
Back to Top