Computer security news, opinion, advice and research from anti-virus experts & New Technologies for Computer Security, Sharing the crazy for the betterment of online security

Android Trojan Now Targets Non-Banking Apps that Require Card Payments

Android Trojan Now Targets Non-Banking Apps that Require Card Payments
The infamous mobile banking trojan that recently added ransomware features to steal sensitive data and lock user files at the same time has now been modified to steal credentials from Uber and other booking apps as well.Security researchers at Kaspersky Lab have discovered a new variant of the Android banking Trojan called Faketoken that now has capabilities to detect and record an infected device's calls and display overlays on top of taxi booking apps to steal banking information.Dubbed Fak…
Rate this blog entry:
Continue reading
264 Hits
0 Comments

Two Critical Zero-Day Flaws Disclosed in Foxit PDF Reader

Two Critical Zero-Day Flaws Disclosed in Foxit PDF Reader
Are you using Foxit PDF Reader? If yes, then you need to watch your back.Security researchers have discovered two critical zero-day security vulnerabilities in Foxit Reader software that could allow attackers to execute arbitrary code on a targeted computer, if not configured to open files in the Safe Reading Mode.The first vulnerability (CVE-2017-10951) is a command injection bug discovered by researcher Ariele Caltabiano working with Trend Micro's Zero Day Initiative (ZDI), while the second…
Rate this blog entry:
Continue reading
199 Hits
0 Comments

Unpatchable Flaw in Modern Cars Allows Hackers to Disable Safety Features

Unpatchable Flaw in Modern Cars Allows Hackers to Disable Safety Features
Today, many automobiles companies are offering vehicles that run on the mostly drive-by-wire system, which means a majority of car's functions—from instrument cluster to steering, brakes, and accelerator—are electronically controlled.No doubt these auto-control systems make your driving experience much better, but at the same time, they also increase the risk of getting hacked.Car Hacking is a hot topic, though it is not new for security researchers who hack cars. A few of them have already d…
Rate this blog entry:
Continue reading
200 Hits
0 Comments

Game of Thrones and HBO — Twitter, Facebook Accounts Hacked

Game of Thrones and HBO — Twitter, Facebook Accounts Hacked
The Game of Thrones hacking saga continues, but this time it's the HBO's and GOT's official Twitter and Facebook accounts got compromised, rather than upcoming episodes.As if the leak of episodes by hackers and the accidental airing of an upcoming episode of Game of Thrones by HBO itself were not enough, a notorious group of hackers took over the official Twitter and Facebook accounts for HBO as well as Game of Thrones Wednesday night.The hacker group from Saudi Arabia, dubbed OurMine, claime…
Rate this blog entry:
Continue reading
174 Hits
0 Comments

Oopss! HBO Itself Accidentally Leaked 'Game of Thrones' Season 7 Episode 6

Oopss! HBO Itself Accidentally Leaked
HBO doesn't need hackers to leak its widely watched "Game of Thrones" episodes, as it is sufficient enough to leak them by its own.In what seems to be a terrible blunder, HBO Spain appeared to have accidentally broadcast the next episode—Episode 6—of Game of Thrones season 7 five days before its official premiere.And as expected, the GoT episode 6 quickly began circulating online.HBO has recently been facing trouble from a hacker or group of hackers who claimed to have obtained nearly 1.5 ter…
Rate this blog entry:
Continue reading
239 Hits
0 Comments

Smart electrical grids more vulnerable to cyber attacks

Smart electrical grids more vulnerable to cyber attacks
As you were browsing www.sciencedaily.com something about your browser made us think you were a bot. There are a few reasons this might happen: You're a power user moving through this website with super-human speed. You've disabled JavaScript in your web browser. A third-party browser plugin, such as Ghostery or NoScript, is preventing JavaScript from running. Additional information is available in this support article. After completing the CAPTCHA below, y…
Rate this blog entry:
Continue reading
134 Hits
0 Comments

Corrupt Federal Agent, Who Stole Bitcoins From Silk Road, Pleads Guilty To Money Laundering

Corrupt Federal Agent, Who Stole Bitcoins From Silk Road, Pleads Guilty To Money Laundering
A former the United States Secret Service agent who stole hundreds of thousands of dollars worth of Bitcoins during an investigation into then-largest underground marketplace Silk Road has now pleaded guilty to money laundering.Shaun W. Bridges is one of two former US undercover agents who pleaded guilty in 2015 to one count of money laundering and one count of obstruction and was sentenced in December same year to almost six years in prison for stealing over $800,000 in Bitcoin while investi…
Rate this blog entry:
Continue reading
177 Hits
0 Comments

8 More Chrome Extensions Hijacked to Target 4.8 Million Users

8 More Chrome Extensions Hijacked to Target 4.8 Million Users
Google's Chrome web browser Extensions are under attack with a series of developers being hacked within last one month.Almost two weeks ago, we reported how unknown attackers managed to compromise the Chrome Web Store account of a developer team and hijacked Copyfish extension, and then modified it to distribute spam correspondence to users.Just two days after that incident, some unknown attackers then hijacked another popular extension 'Web Developer' and then updated it to directly inject a…
Rate this blog entry:
Continue reading
168 Hits
0 Comments

Backdoor Found in Popular Server Management Software used by Hundreds of Companies

Backdoor Found in Popular Server Management Software used by Hundreds of Companies
Cyber criminals are becoming more adept, innovative, and stealthy with each passing day. They are now adopting more clandestine techniques that come with limitless attack vectors and are harder to detect.Recently, cyber crooks managed to infiltrate the update mechanism for a popular server management software package and altered it to include an advanced backdoor, which lasts for at least 17 days until researchers discovered it.Dubbed ShadowPad, the secret backdoor gave attackers complete con…
Rate this blog entry:
Continue reading
213 Hits
0 Comments

Faulty Firmware Auto-Update Breaks Hundreds of 'Smart Locks'

Faulty Firmware Auto-Update Breaks Hundreds of
More features, more problems!Today, we are living in a digital age that is creating a digital headache for people by connecting every other unnecessary home appliance to the Internet.Last week, nearly hundreds of Internet-connected locks became inoperable after a faulty software update hit some models.Users of remotely accessible smart locks made by Colorado-based company LockState have taken to social media platforms including Twitter to complain that their $469 Lockstate 6000i locks started…
Rate this blog entry:
Continue reading
213 Hits
0 Comments