Bio hacking – technology and humans have never been so close, they complement each other. But what are the security and privacy risks? IS BIOHACKING A SECURITY RISK? Imagine a world where our day to day activities like door locking, supermarket purchases, credit card swipes and smartphone usage are replaced by just one chip embedded […]
Experts at Kaspersky Lab revealed that the capabilities of the Equation Group Surpass anything known in terms of sophistication of hacking techniques. Security experts at Kaspersky revealed the existence of a hacking group operating since 2001 that targeted practically every industry with sophisticated zero-day malware. According to a new report from Kaspersky Lab, this group, dubbed […]
The security Expert Peter Adkins discovered a serious Information disclosure vulnerability that affects several Netgear wireless routers. The researcher Peter Adkins discovered that several wireless routers produced by Netgear are affected by serious vulnerability that could allow an unauthenticated attacker to access sensitive data from the network device. By exploiting the vulnerability a hacker could also […]
Kaspersky discovered that a multinational gang of hackers dubbed Carbanak cybergang has stolen at least $300 million from 100 financial institutions. A group of cybercriminals used a malware to steal at least $300 million from banks and other financial institutions worldwide, according to a report published Saturday by The New York Times. The hackers have named […]
A Group of hackers has stolen money from Standard Chartered Bank Accounts by hacking the ATMs of the organization in Pakistan. Recently Pakistan customers of the Standard Chartered Bank have received transaction alerts via email and SMS that alerted them about alleged withdrawals of Rs.50, 000 ($500) cash from their bank accounts. The problem is […]
Three German students have discovered that tens of thousands of MongoDB databases running as a service or website backend were exposed on the Internet. MongoDB is a cross-platform document-oriented database which uses JSON-like documents with dynamic schemas (BSON) improving the integration of data between different applications. MongoDB is very popular for scalability, performance and high availability, it represents […]
Security researchers discovered how to install and launch malicious applications remotely on Android devices exploiting two flaws. Security researchers have uncovered a couple of vulnerabilities in the Google Play Store that could allow cyber criminals to install and launch malicious apps remotely on Android mobile devices. The expert Tod Beardsley, technical lead for the Metasploit […]
An Indian security expert Laxman Muthiyah exploited a vulnerability in Facebook Graph API mechanism to delete Facebook photo albums of every user. A critical flaw in the popular social network Facebook recently discovered could allow ill-intentioned to completely delete users’ Facebook photo album without being authenticated. According the security expert Laxman Muthiyah the vulnerability resides […]
Microsoft issued a security advisory for the JASBUG critical flaw, affecting all Windows OSs, that could be remotely exploitable. The news of the day is that a 15-year-old vulnerability in all Microsoft systems was fixed by the last critical patch issued by the company. The vulnerability, dubbed JASBUG and coded as CVE-2015-0008, could be exploited by an attacker to […]
The Netherlands’ ANP news agency revealed that the outage of Dutch Government websites, lasted for most of Tuesday, was caused by a major cyber attack. According to the Netherlands’ ANP news agency, the outage that brought down several Dutch Government websites for most of Tuesday was caused by a major cyber attack. The outage began […]