Computer security news, opinion, advice and research from anti-virus experts & New Technologies for Computer Security, Sharing the crazy for the betterment of online security

Ukrainian Video-Blogger Arrested For Spreading Petya (NotPetya) Ransomware

Ukrainian Video-Blogger Arrested For Spreading Petya (NotPetya) Ransomware
Ukrainian authorities have arrested a 51-year-old man accused of distributing the infamous Petya ransomware (Petya.A, also known as NotPetya) — the same computer virus that massively hit numerous businesses, organisations and banks in Ukraine as well as different parts of Europe around 45 days ago.However, the story is not as simple as it seems, which portrayed this man as a criminal. I recommend you to read complete article to understand the case better and then have an opinion accordingly.S…
Rate this blog entry:
Continue reading
156 Hits
0 Comments

USB connections make snooping easy

USB connections make snooping easy
As you were browsing www.sciencedaily.com something about your browser made us think you were a bot. There are a few reasons this might happen: You're a power user moving through this website with super-human speed. You've disabled JavaScript in your web browser. A third-party browser plugin, such as Ghostery or NoScript, is preventing JavaScript from running. Additional information is available in this support article. After completing the CAPTCHA below, y…
Rate this blog entry:
Continue reading
179 Hits
0 Comments

Online CISSP Certification Training Course — Learn from Experts

Online CISSP Certification Training Course — Learn from Experts
If you dream of making it big in the IT security community, the CISSP certification is a necessary milestone.Certified Information Systems Security Professional (CISSP) is a globally recognised certification in the field of information security, which has become a gold standard of achievement that is acknowledged worldwide.CISSP certification deals with a range of information security topics including security engineering and software development security and helps you understand the various …
Rate this blog entry:
Continue reading
152 Hits
0 Comments

CouchPotato: CIA Hacking Tool to Remotely Spy On Video Streams in Real-Time

CouchPotato: CIA Hacking Tool to Remotely Spy On Video Streams in Real-Time
After disclosing CIA's strategies to hijack and manipulate webcams and microphones to corrupt or delete recordings, WikiLeaks has now published another Vault 7 leak, revealing CIA's ability to spy on video streams remotely in real-time.Dubbed 'CouchPotato,' document leaked from the CIA details how the CIA agents use a remote tool to stealthy collect RTSP/H.264 video streams.Real Time Streaming Protocol, or RTSP, is a network control protocol designed for use in entertainment and communication…
Rate this blog entry:
Continue reading
180 Hits
0 Comments

Chinese Quantum Satellite Sends First ‘Unhackable’ Data to Earth

Chinese Quantum Satellite Sends First ‘Unhackable’ Data to Earth
In what appears to be the world's first quantum satellite transmission, China has successfully sent an "unbreakable" code over a long distance from an orbiting satellite to the Earth, achieving a milestone in the next generation encryption based on "quantum cryptography."In August last year, China launched the world's first quantum communication satellite into the Earth’s orbit aboard a Long March-2D rocket to test the fundamental laws of quantum mechanics at space.Dubbed Quantum Science Sate…
Rate this blog entry:
Continue reading
118 Hits
0 Comments

Malware Encoded Into DNA Hacks the Computer that Reads It

Malware Encoded Into DNA Hacks the Computer that Reads It
Do you know — 1 Gram of DNA Can Store 1,000,000,000 Terabyte of Data for 1000+ Years?Even in March this year, a team of researchers successfully stored digital data — an entire operating system, a movie, an Amazon gift card, a study and a computer virus — in the strands of DNA.But what if someone stores a malicious program into the DNA, just like an infected USB storage, to hijack the computer that reads it.A team of researchers from the University of Washington in Seattle have demonstrated t…
Rate this blog entry:
Continue reading
143 Hits
0 Comments

How Top Companies Accidentally Leaking Terabytes of Sensitive Data Online

How Top Companies Accidentally Leaking Terabytes of Sensitive Data Online
An anti-malware detection service provider and premium security firm has been accused of leaking terabytes of confidential data from several Fortune 1000 companies, including customer credentials, financial records, network intelligence and other sensitive data.However, in response to the accusations, the security firm confirmed that they are not pulling sensitive files from its customers; instead, it's up to companies—who are accidentally (but explicitly) sharing their sensitive data to leve…
Rate this blog entry:
Continue reading
112 Hits
0 Comments

Self-Driving Cars Can Be Hacked By Just Putting Stickers On Street Signs

Self-Driving Cars Can Be Hacked By Just Putting Stickers On Street Signs
Car Hacking is a hot topic, though it's not new for researchers to hack cars. Previously they had demonstrated how to hijack a car remotely, how to disable car's crucial functions like airbags, and even how to steal cars.But the latest car hacking trick doesn't require any extra ordinary skills to accomplished. All it takes is a simple sticker onto a sign board to confuse any self-driving car and cause accident.Isn't this so dangerous?A team of researchers from the University of Washington de…
Rate this blog entry:
Continue reading
136 Hits
0 Comments

Companies Could Face $22 Million Fine If They Fail to Protect Against Hackers

Companies Could Face $22 Million Fine If They Fail to Protect Against Hackers
Over the past few years, massive data breaches have become more frequent and so common that pretty much every week we heard about some organisation being hacked or hacker dumping tens of millions of users records.But even after this wide range of data breach incidents, many organisations fail to grasp the importance of data protection, leaving its users' sensitive data vulnerable to hackers and cyber criminals.Not now! At least for organisations in Britain, as the UK government has committed …
Rate this blog entry:
Continue reading
121 Hits
0 Comments

Microsoft Issues Security Patches for 25 Critical Vulnerabilities

Microsoft Issues Security Patches for 25 Critical Vulnerabilities
Here we are again…As part of its August Patch Tuesday, Microsoft has today released a large batch of 48 security updates for all supported versions Windows systems and other products.This month's security updates cover vulnerabilities in Microsoft's Windows operating systems, Internet Explorer, Microsoft Edge, Microsoft SharePoint, Adobe Flash Player, Windows Hyper-V and Microsoft SQL Server.The security updates address a range of issues including 25 critical, 21 rated important and two moder…
Rate this blog entry:
Continue reading
195 Hits
0 Comments