xiny_60 0

New Android.Xiny trojan is able to steal banking information or intercept IM

The recent version of the Android.Xiny trojan is now able to steal confidential information (including credit card numbers, logins and passwords), transfer money to cybercriminal-owned bank accounts and intercept or send instant messages (IM) by infecting system processes. Android.Xiny trojan family got famous in January 2016 when ‘Doctor Web Anti-virus’ researchers detected [1] that Android.Xiny.19.origin trojan was incorporated into more than 60 games...

52 total views, 7 views today

https 0

Multiple DoS vulnerabilities found in OpenSSL, update needed

If you are using OpenSSL to secure your web servers, then you may have a security issue again. Because multiple vulnerabilities found [1,2]  in popular open-source cryptography library that may lead to crashing of target server remotely. And as a system administrator, you need to know that your servers using OpenSSL may remain vulnerable until you patch them. OpenSSL, which contains an...

625 total views, 250 views today

mambalogo 0

Mamba ransomware encrypts all disk partitions! How to protect your systems?

As you may already know, or experienced, ransomware is a type of dangerous malware that usually restricts access to critical files and documents stored on the computer system it infects. It encrypts the data on all local drives, removable drives, and mapped network drives using a cipher (AES or RSA for example) with the private key stored only on the malware’s control servers and...

1,099 total views, 24 views today

yahoo 0

Yahoo confirms 500 million accounts stolen. How to protect your account?

  Yahoo confirmed Thursday that at least 500 million user account information were stolen by hackers back in 2014. The stolen data includes names, email addresses, telephone numbers, dates of birth…. and much more worse is the stolen data also includes hashed passwords (the vast majority with bcrypt) and (in some cases) encrypted or unencrypted security questions and answers. But, according...

70 total views, no views today

ciscologo 0

859.000 Cisco devices affected by critical zero-day vulnerability

If you have one of the Cisco products running Cisco IOS software releases listed below and you are using LAN-to-LAN VPN, Remote access VPN (excluding SSLVPN), Dynamic Multipoint VPN (DMVPN) or Group Domain of Interpretation (GDOI), then you may have a security issue. The VPN types above and the vast majority of IPsec VPNs use IKE for key exchange. Internet key...

133 total views, 2 views today

carhackkapak 0

Security concerns increasing over car hacking, Volkswagen starts an automotive cyber security company

In July 2015, Fiat Chrysler Automobiles (FCA) issued a recall for 1.4 million vehicles (including 2014-2015 Jeep Grand Cherokee and Cherokee SUVs, 2015 Dodge Challenger sports coupes and other models) in order to patch a software vulnerability which allowed security researchers to remotely hack vehicles and take control of significant functions (including brakes) using cellular connection while they were 10 miles away. The hack also shocked...

119 total views, no views today

whatsapplogo 0

Research revealed that deleted WhatsApp messages aren’t actually deleted!

An iOS security expert discovered that your WhatsApp messages aren’t actually deleted even you try to delete them by selecting ‘Clear All Chats’ option.  The same issue also exists on Apple’s popular instant messaging service called iMessage. Jonathan Zdziarski’s research revealed that the latest version of WhatsApp, the most popular cross-platform instant messaging client with some one billion users, leaves forensic...

244 total views, no views today

dlllogo 0

Windows weakness allows ‘UAC bypass’ attack and malicious DLL loading

Quick Summary: Two security researchers discovered an interesting method for bypassing one of the Windows operating system security features which allows attackers to run malicious DLL files on target system. They found a weakness in one of the Windows default scheduled tasks. Successful exploit of the weakness may lead to malware infection, information disclosure or even remote users gaining full control over...

200 total views, no views today

pokemonlogo 0

Malicious Pokémon GO application installs backdoor on your device

Remote access tools (RAT) are one of the most dangerous malware types. RAT provides attackers with full control over the victim’s system which allows them to remotely access files, private conversations, accounting data and other type of files on the victim’s device. Wrapping popular applications with remote access trojans/tools is one of the methods used by cyber criminals to infect and control victim’s device....

258 total views, 1 views today

netgear 0

Netgear D6000 and D3600 routers contain hard-coded cryptographic keys and are vulnerable to authentication bypass

If you have Netgear D6000 or D3600 router devices with and prior firmware versions installed in your network environment, you should update your device to firmware version which released by Netgear on Friday to patch two critical vulnerabilities. Successful exploitation of vulnerabilities by remote unauthenticated attacker may allow gaining administrator access to affected device, performing man-in-the-middle attack on victims network or...

472 total views, 2 views today