Home Blog Page 3

State of the Art Cyber-Security and Network Security a Top Priority for The Business Market

0
Reportedly, accepting the growing need for better cyber-security tactics and embracing a further developed regime for securing the businesses on the cyber front, European organizations are up for upgrading their network security.With a high rise in the number of cyber-crime, mainly data breaches, and other infamous cyber-attacks it’s become the need of the hour to promote more initiatives...

The Kremlin opposed cross-border persecution of Russians in the United States

0
Dmitry Peskov, the Press Secretary for the President of Russia, commenting on the largest award in history appointed for Russian hacker Maxim Yakubets, said that Moscow opposes cross-border persecution of Russians by the American authorities. The State Department announced awards of $5 million for information that would help detain the Russian Maxim Yakubets. American authorities consider this citizen...

DROWN attack risks millions of popular websites

0
An international team of researchers warned that more than 11 million websites and e-mail services protected by the transport layer security protocol are vulnerable to a new, low-cost attack that decrypts sensitive communications in few hours.The cybersecurity experts from universities in Israel, Germany and the US as well as a member of Google's security team found that more than 81,000 of top one...

Attackers Launched a Rapidly Changing Malware which uses .DOC Extension

0
A new malware has been discovered by security experts, they observed that it is constantly altering its behavioral patterns in an attempt to bypass the email security protection.As dissemination of malware through email campaigns is becoming common day by day, email security providers are devising new ways to battle and terminate such malicious activities.However, cybercriminals are employing subtle...

Facebook Files a Lawsuit Against a Company for Running Malicious Ads?

0
Reportedly, Facebook filed a lawsuit against a “Chinese Company” that allegedly put user accounts at large only to put up suspicious ads on the platform.The running and distribution of advertisements which were about “counterfeit goods” and “dietary pills” was the only purpose of compromising the accounts in question.The aforementioned company, per reports, goes by the name...

Security Vulnerability in McDonald’s India allows hackers to access Customer data

0
  If you are from India and have ordered Burger in McDonald's, your personal details are at risk.Security researchers from  Fallible found a serious vulnerability McDonald’s India application that allows hackers to access millions of customer data.There is no authentication or authorization check in API used in the application.   Sending request to "http://services.mcdelivery.co.in/ProcessUser.svc/GetUserProfile" with customer id...

The First-Ever Millionaire Hacker on HackerOne

0
At a tender age of 19, Santiago Lopez is earning a handsome sum of money via bug bounty program HackerOne and discovering security flaws through vulnerability coordination. He is said to be the first one to make more than USD 1 million through the aforementioned channels and he ranks second on HackerOne.Lopez is...

Hike in Banking Malware Attacks; Mobile Malware A Part of Cyber-Crime Too!

0
Banking malware is on a rise and the percentage of the wreckage it causes has risen up to 50%.The viral banking malware usually is on the lookout for payment data, credentials and of course, cash.Development kits for mobile malware code are easily available on underground portals and hence this issue is relevant.The creators of mobile bankers...

Meltdown and Spectre: Breakdown of The recent CPU Security Bug

0
Much like how Icarus flew too close to the sun.In trying to catch up with Moors law the CPU's manufacturers have left open a serious vulnerability that will haunt us for years to come. Whats the cause for the vulnerability ?Almost all modern CPU's have a feature called "Speculative execution" which increases speed by predicting the path of a...

In the Czech Republic, the Russian center of cyber attacks has been neutralized – Local Media

0
According to the Czech local news magazine Respekt, Russian Intelligence Services used two computer companies in Prague for performing cyber attacks.It is alleged that the Czech Security Forces disclosed the activities of the cyber attack center in early 2018.According to a journalistic investigation, the two companies were formally engaged in the sale of computer hardware and software, but...