News Clipping


Facebook’s iOS app might be opening the camera in the background [theverge]

Facebook’s iOS app appears to be activating the camera in the background of the app in some situations without a user’s knowledge. However, Facebook tells The Verge that it’s submitting a fix to address these issues to Apple today. There are a couple ways that this has been found to happen. One person found that the camera UI for Facebook Stories briefly appeared behind a video when...

Read More


1.3 Million Indian Payment Card Details Up For Sale On Dark Web [ndtv]

Nearly 1.3 million debit and credit card data of Indian banking customers that can fetch up to $130 million for cybercriminals are available on Dark Web for open sale. According to ZDNet, the cards’ details is available on Joker’s Stash — one of the oldest card shops on the dark web which is known to be the place where major hackers sell card dumps. The...

Read More


Over 15 Indian States Have Been Infected By The Dtrack Malware [mashable]

We’re already aware that data breaches are on a constant rise these days. Hackers are making use of stealthy creative ways to get access to our sensitive data. Kaspersky, a Russia-based cybersecurity firm, revealed recently that it has discovered samples of ‘Dtrack’ malware from enterprises across Indian states including Maharashtra, Karnataka and Telangana, according to a report by IANS. The Dtrack malware is kind of a...

Read More


NordVPN confirms it was hacked [techcrunch]

NordVPN, a virtual private network provider that promises to “protect your privacy online,” has confirmed it was hacked. The admission comes following rumors that the company had been breached. It first emerged that NordVPN had an expired internal private key exposed, potentially allowing anyone to spin out their own servers imitating NordVPN. VPN providers are increasingly popular as they ostensibly provide privacy from your internet provider...

Read More


Wi-Fi Bug in Millions of Amazon Echo and Kindle Devices [gbhackers]

The KRACK attack was published by two Belgian researchers in October 2017. The attacks are based on the weaknesses in the WPA2 protocol used in modern Wi-Fi devices. The weakness can be exploited by the attackers using key reinstallation attacks if the victim resides within the network. Successful exploitation of the attack allows attackers to steal sensitive details such as credit card numbers, passwords, chat...

Read More


Chrome for Android Enables Site Isolation Security Feature [thehackernews]

After enabling ‘Site Isolation‘ security feature in Chrome for desktops last year, Google has now finally introduced ‘the extra line of defence’ for Android smartphone users surfing the Internet over the Chrome web browser. In brief, Site Isolation is a security feature that adds an additional boundary between websites by ensuring that pages from different sites end up in different sandboxed processes in the browser....

Read More


Emsisoft released a free decryption tool for the STOP (Djvu) ransomware [securityaffairs]

Emsisoft firm has released a new free decryption tool the STOP (Djvu) ransomware, in the last months the research team helped victims of many other threats. STOP (Djvu) ransomware has 160 variants that infected more hundreds of thousands of victims worldwide. Experts estimated a total number of 460,000 victims, that makes this threat the most active and widespread ransomware today. According to data included in...

Read More


OSINT Resources for 2019 [source: medium.com]

Whether you are new to OSINT (Open Source Intelligence) or use it regularly in your professional life for reconnaissance, threat intelligence or investigations, the recent speed of growth in the field means constant development in terms of tooling, data, content and community. In this post I aim to highlight some essentials that everyone relying on OSINT should know, plus newer resources that might provide additional...

Read More


How Future Technologies Can Innovate New Way for States for Helping foreign policy [medium]

Cars won’t need drivers. Factories won’t need human workers. Human settlement will extend beyond the boundaries of earth. Institutions of our world are changing in rapid ways. Businesses and nonprofit organizations are taking advantage of exponential technologies to upgrade their operations to explore better, more cost-efficient ways of fulfilling their missions. And so, too, are government organization. When we think of the administration of diplomacy...

Read More


New Phishing Campaign Bypasses Microsoft ATP to Deliver Adwind to Utilities Industry [anomali]

Intel_Acquisition_Team New Phishing Campaign Bypasses Microsoft ATP to Deliver Adwind to Utilities Industry (Aug 19, 2019) A new phishing campaign has been identified by Cofense that delivers the Adwind malware, a cross-platform malware program. Using an attachment, the phishing campaign has been targeting national grid utilities infrastructure with and email informing the user they need to sign and return a copy of the remittance advice. While...

Read More


Page 10 of 62« First...89101112...203040...Last »