A research team from Israel’s Ben-Gurion University of the Negev ‘s cybersecurity research center has discovered a new way of data extraction from air-gapped computers via using passive devices like earbuds, earphones, headphones, and speakers. Now, the same research center has claimed to be able to use computer speakers and […]
Haythem Elmir
Chinese Crooks Assembling Massive Botnet of Nearly 5 Million Android Devices
A Chinese malware operation is currently building a massive botnet of nearly 5 million Android smartphones using a strain of malware named RottenSys. In its current form, RottenSys is being used to aggressively display ads on users’ devices, but researchers from security firm Check Point have found evidence that crooks […]
Hacking group threatens researchers’ lives after they discover attack servers
A hacking group commonly linked to the Iranian government threatened to kill security researchers who came across their cyber espionage operation, according to a new report. Researchers with multinational cybersecurity company Trend Micro were probing a server that appeared connected to a possible data breach in the Middle East when they received a […]
Hardware Backdoor for Remote Control over Cars
A modern car’s resistance to hacking has been once again tested by security researchers, who have built a device to spy on internal communications and deliver commands to the vehicle. The piece of hardware has GSM support, allowing an attacker to activate available payloads by sending an SMS from anywhere […]
Let’s Encrypts Now Offers Free Wildcard SSL Certificates Using ACMEv2
Let’s Encrypt announced yesterday that their ACMEv2 API is now live and with it comes the ability for users to get free wildcard certificates. This has been a long awaited feature as wildcard domain certificates are much more expensive then regular single host certificates and it also makes managing SSL certs […]
Qrypter RAT hits 243 organizations worldwide in February
Qrypter RAT hits 243 organizations worldwide in February 2018, its popularity in the cybercrime ecosystem continues to increase. A new strain of remote access Trojan dubbed Qrypter RAT (aka Qarallax, Quaverse, QRAT, and Qontroller) hit hundreds of organizations worldwide. The malware was spotted by security firm Forcepoint, it has been around […]
March Patch Tuesday Fixes 75 Security Issues, Drops Registry Key Requirement in Windows 10
Microsoft’s Patch Tuesday for March is an eventful one, with updates that comprise fixes for 75 security issues and a change of tack in its patch deployment process for Windows 10. Of the vulnerabilities Microsoft patched for this month, 14 were rated as Critical and 61 Important. Six of these were disclosed through […]
HotSpot Shield, PureVPN & ZenMate found leaking users real IP addresses
According to VPN Mentor, a privacy advocate firm which reviews virtual private networks (VPN), after an in-depth research, it has been discovered that three VPN service providers with millions of customers worldwide are leaking sensitive data such as users’ IP addresses – These VPNs include HotSpot Shield, PureVPN, and Zenmate. What Is A VPN Used […]
Experts discovered a new tiny Pos Malware dubbed Pinkkite
Researchers presented findings on a new strain of point-of-sale malware, dubbed PinkKite, that was spotted by security experts at Kroll Cyber Security. A new strain of point-of-sale malware, dubbed PinkKite, was spotted by security experts at Kroll Cyber Security. PinkKite was first discovered in 2017 while the experts were instigating into a […]
Microsoft starts buying speculative execution exploits
Adds bug bounty class for Meltdown and Spectre attacks on Windows and Azure Microsoft has created a new class of bug bounty specifically for speculative execution bugs like January’s Meltdown and Spectre processor CPU design flaws. Noting that the Project Zero discoveries “represented a major advancement in the research in […]