FoneMonitor Application To Track Any Android or iOS Phone or Tablet Android or iOS phones are generally utilized over the world and they are an essential piece of our everyday lives. We invest a great deal of energy looking at smartphones. Technology can be helped much of the time, it […]
Année : 2018
WiFi Broadcasts in All Version of Android OS Leaking Sensitive Data Including IP Addresses, BSSID, WiFi Network Name
WiFi Broadcasts in Android OS Leaking sensitive data from a user’s Android device and the details about all the application that running on the user’s device. All the version of Android running devices is affected by this vulnerability including Amazon’s FireOS for the Kindle. It leaks Sensitive information such as WiFi network name, BSSID, […]
MagentoCore Malware That Steals Payment Card Details While You Shop Online
A new payment card stealing campaign with skimmer script targeting Magento stores. The malicious campaign is embedding Javascript based MagentoCore Malware on Magento stores that record keystrokes from customers and transfer the data in real-time to magentocore command and control servers. A Netherland security researcher Willem uncovered the attack, it […]
What is a Credit Card Dump?
That black strip on the back of your credit card holds a lot of information about your credit card account. A credit card dump is stolen electronic copy of that information. Criminals use the credit card dump to create clones of your credit card and use them to make unauthorized credit […]
Le FBI avertit que les cybercriminels préparent un piratage de masse contre les guichets automatiques bancaires
Le FBI avertit que les cybercriminels préparent un piratage de masse contre les guichets automatiques bancaires Les chefs des services de renseignement américains ont averti les banques qu’une menace de piratage importante pesait sur les distributeurs de billets dans le monde entier au cours des prochains jours. Le FBI a […]
Experts published a PoC code for Intel Management Engine JTAG flaw
A group of security researchers has published a proof-of-concept exploit code for a vulnerability in the Intel Management Engine JTAG. A team of security researchers has published a proof-of-concept exploit code for a vulnerability in the Intel Management Engine JTAG. Last year the same group of experts at Positive Technologies discovered an undocumented configuration […]
Mobile’s Latest Malware Threat: The All-in-One Android Trojan
A new Android Trojan — dubbed Android.Banker.L — combines the functionality of banking Trojans, keyloggers and ransomware to compromise victim devices and steal data. As reported by Quick Heal, the latest malware threat uses multiple methods simultaneously to attack user devices. In addition to a typical Android banking Trojan, the […]
Windows 10 est vulnérable, une faille Zero-day est divulguée publiquement
Surgit de nul part, une publication sur Twitter dévoile l’existence d’une faille Zero day affectant Windows 10. Les utilisateurs de ce système d’exploitation sont désormais vulnérables. Aucun correctif n’est disponible, Microsoft a été pris au dépourvu. Cette faille a été dévoilée au travers d’un simple tweet. La vulnérabilité concerne le […]
CeidPageLock Malware that Monitors User’s Browsing Data and Redirects Fake Pages
CeidPageLock RootKit evolves again with more improved features, this times it has been distributed by the RIG Exploit kit. The latest version contains functionalities such as monitoring user browsing activities, replace websites with fake pages and ability to redirect victims to fake pages. The CeidPageLock is a browser hijacker which […]
Novel Attack Technique Uses Smart Light Bulbs to Steal Data
Researchers have determined that some light bulbs are suitable for covert data exfiltration from personal devices, and can leak multimedia preferences by recording their luminance patterns from afar. For the light sources to become an attack surface, they need to meet some requirements such as support for multimedia visualizations and […]