Computer security news, opinion, advice and research from anti-virus experts & New Technologies for Computer Security, Sharing the crazy for the betterment of online security

3 Nigerian Scammers Get 235-Years of Total Jail Sentence in U.S.

3 Nigerian Scammers Get 235-Years of Total Jail Sentence in U.S.
You may have heard of hilarious Nigerian scams. My all time favourite is this one:A Nigerian astronaut has been trapped in space for the past 25 years and needs $3 million to get back to Earth, Can you help?Moreover, Nigerians are also good at promising true love and happiness.But You know, Love hurts.Those looking for true love and happiness lost tens of millions of dollars over the Nigerian dating and romance scams.These criminals spend their whole day trolling the online dating sites for c…
Rate this blog entry:
Continue reading
54 Hits
0 Comments

All Android Phones Vulnerable to Extremely Dangerous Full Device Takeover Attack

All Android Phones Vulnerable to Extremely Dangerous Full Device Takeover Attack
Researchers have discovered a new attack, dubbed 'Cloak and Dagger', that works against all versions of Android, up to version 7.1.2.Cloak and Dagger attack allows hackers to silently take full control of your device and steal private data, including keystrokes, chats, device PIN, online account passwords, OTP passcode, and contacts.What's interesting about Cloak and Dagger attack?The attack doesn't exploit any vulnerability in Android ecosystem; instead, it abuses a pair of legitimate app pe…
Rate this blog entry:
Continue reading
61 Hits
0 Comments

Wanna Cry Again? NSA’s Windows 'EsteemAudit' RDP Exploit Remains Unpatched

Wanna Cry Again? NSA’s Windows
Brace yourselves for a possible 'second wave' of massive global cyber attack, as SMB (Server Message Block) was not the only network protocol whose zero-day exploits created by NSA were exposed in the Shadow Brokers dump last month.Although Microsoft released patches for SMB flaws for supported versions in March and unsupported versions immediately after the outbreak of the WannaCry ransomware, the company ignored to patch other three NSA hacking tools, dubbed "EnglishmanDentist," "EsteemAudi…
Rate this blog entry:
Continue reading
108 Hits
0 Comments

7-Year-Old Samba Flaw Lets Hackers Access Thousands of Linux PCs Remotely

7-Year-Old Samba Flaw Lets Hackers Access Thousands of Linux PCs Remotely
A 7-year-old critical remote code execution vulnerability has been discovered in Samba networking software that could allow a remote attacker to take control of an affected Linux and Unix machines.Samba is an open-source software (re-implementation of SMB networking protocol) that runs on the majority of operating systems available today, including Windows, Linux, UNIX, IBM System 390, and OpenVMS.Samba allows non-Windows operating systems, like GNU/Linux or Mac OS X, to share network shared …
Rate this blog entry:
Continue reading
68 Hits
0 Comments

System piggybacks on Bitcoin to prevent identity theft

System piggybacks on Bitcoin to prevent identity theft
A reaction to the 2008 financial crisis, Bitcoin is a digital-currency scheme designed to wrest control of the monetary system from central banks. With Bitcoin, anyone can mint money, provided he or she can complete a complex computation quickly enough. Through a set of clever protocols, that computational hurdle prevents the system from being coopted by malicious hackers. At the IEEE Symposium on Security and Privacy this week, researchers from MIT's Computer Science and Artificial Intelligence…
Rate this blog entry:
Continue reading
42 Hits
0 Comments

Secure VPN Services With Lifetime Subscription (Save up to 95%) - Limited Time Deal

Secure VPN Services With Lifetime Subscription (Save up to 95%) - Limited Time Deal
PRIVACY – a bit of an Internet buzzword nowadays, because the business model of the Internet has now shifted towards data collection.Today, most users surf the web unaware of the fact that websites and online services collect their personal information, including search histories, location, and buying habits and make millions by sharing your data with advertisers and marketers.If this is not enough, then there are governments across the world conducting mass surveillance, and hackers and cybe…
Rate this blog entry:
Continue reading
59 Hits
0 Comments

Microsoft Unveils Special Version of Windows 10 For Chinese Government

Microsoft Unveils Special Version of Windows 10 For Chinese Government
China is very strict about censorship, which is why the country has become very paranoid when it comes to adopting foreign technologies.The country banned Microsoft's Windows operating system on government computers in 2014 amid concerns about security and US surveillance.Even in the wake of that, China had been pushing its custom version of Windows XP and its forked version of Ubuntu Linux.To deal with this issue and target the world's largest market, Microsoft's CEO for the Greater China re…
Rate this blog entry:
Continue reading
79 Hits
0 Comments

It's Insanely Easy to Bypass Samsung Galaxy S8 Iris Scanner with a Photo

It
Samsung recently launched its new flagship smartphones, the Galaxy S8 and Galaxy S8 Plus, with both Facial and IRIS Recognition features, making it easier for users to unlock their smartphone and signing into websites.We already knew that the Galaxy S8's facial unlock feature could be easily fooled with just a simple photograph of the device owner, but now hackers have also discovered a simple way to bypass the iris-based authentication, which Samsung wants you to think is unbeatable.All it t…
Rate this blog entry:
Continue reading
114 Hits
0 Comments

Beware! Subtitle Files Can Hack Your Computer While You're Enjoying Movies

Beware! Subtitle Files Can Hack Your Computer While You
Do you watch movies with subtitles?Just last night, I wanted to watch a French movie, so I searched for English subtitles and downloaded it to my computer.Though that film was excellent, this morning a new research from Checkpoint scared me.I was unaware that a little subtitle file could hand over full control of my computer to hackers, while I was enjoying the movie.Yes, you heard that right.A team of researchers at Check Point has discovered vulnerabilities in four of the most popular medi…
Rate this blog entry:
Continue reading
70 Hits
0 Comments

Hacking Group Arrested For Infecting Over 1 Million Phones With Banking Trojan

Hacking Group Arrested For Infecting Over 1 Million Phones With Banking Trojan
The Russian Interior Ministry announced on Monday the arrest of 20 individuals from a major cybercriminal gang that had stolen nearly $900,000 from bank accounts after infecting over one million Android smartphones with a mobile Trojan called "CronBot."Russian Interior Ministry representative Rina Wolf said the arrests were part of a joint effort with Russian IT security firm Group-IB that assisted the massive investigation.The collaboration resulted in the arrest of 16 members of the Cron gr…
Rate this blog entry:
Continue reading
146 Hits
0 Comments