Category

Hacking

Hacking Page 36

Trading Platform and Cryptocurrency Hacks Blamed on North Korea

Trading Platform and Cryptocurrency Hacks Blamed on North Korea

North Korea’s programmers and agents have completely embraced digital currency as a strategy for bypassing global authorizes and raising assets for the Pyongyang administration. Two reports discharged in the previous two weeks by Group-IB and Recorded Future, individually, uncover the profundities to which North Korea has gone to do as such, depending on hacks of...
Continue Reading
Malware detection removal LeakerLocker

Hackers Are Now Using Your Private Photos As Ransom

Active smartphone users are being warned about a scary new piece of “ransomware” designed to send victims’ private photographs to all the contacts in their address book. The tech security firm McAfee has sounded the alarm over a new type of virus called LeakerLocker, reports The Sun. This creepy ransomware is capable of locking down...
Continue Reading
Online Love Scam Syndicate Busted

Online Love Scam Syndicate Busted

A syndicate associated with nearly $20 million worth of Internet love tricks has been disabled in a joint global activity including officers from Singapore, Malaysia and Hong Kong. Eight Internet love trick cases detailed in Singapore, including in any event, around $450,000, were solved because of the joint task. The task was done in Malaysia...
Continue Reading
LoJax: The First Ever UEFI Rootkit Released

LoJax: The First Ever UEFI Rootkit Released

Researchers from ESET who discovered the rootkit say this is the first time researchers successfully detected an actively exposed rootkit that exploits the UEFI or Unified Extensible Firmware Interface specification that defines a software interface between an operating system and platform firmware. By injecting itself this deeply into the computer, the attackers hope to achieve...
Continue Reading
Hackers Prefer Tuesdays When Deploying Phishing Attacks

Hackers Prefer Tuesdays When Deploying Phishing Attacks

Malicious cyber attackers steal user credentials by tricking unsuspecting users into using their login information on engineered fake websites. By hijacking an existing login page or creating an accurately similar login website that you can’t tell it apart from the authentic site, attackers easily gain access to the target network. Organized phishing operations, in which...
Continue Reading
Facebook Breach

Facebook Breach

The latest Facebook breach has affected at least 90 million users worldwide after hackers exploited a vulnerability that allowed access to profile data. Users were logged out on September 28 as Facebook forcefully ended the session of social media users to secure the accounts affected by the recent breach. Hackers gained the ability to access profiles...
Continue Reading
Hackers Stole $15Million from Cosmos Bank

Hackers Stole $13.4 million from Cosmos Bank

Police in India have launched a formal investigation of a malware attack on a Cosmos Bank ATM server that enabled attackers to siphon off US$13.4 million. The hackers cloned the bank’s Visa and Rupay debit cards and used them to siphon cash from ATMs on Aug. 11 and Aug. 13, according to the bank. An investigation...
Continue Reading
Fortnite Hacked – Leaked Info Sold on Dark Web

Fortnite Hacked – Leaked Info Sold on Dark Web

Fortnite hack leads to children’s personal data being shared on dark web as scammers rack up huge in-play charges. For a measly £2.05 each, user logins and passwords of gamers are currently being sold on the lucrative online black market through this Fortnite hack. Fortnite is a game of survival wherein players can create a...
Continue Reading
Cold Boot Attacks - A Chilling Reality

Cold Boot Attacks: A Chilling Reality

A couple of cybersecurity researchers have developed a method that can bypass mitigations for concentrated attacks on laptops. A physical attacker can compromise a laptop that’s in sleep mode, potentially acquiring sensitive information such as passwords, encryption keys and other personal data. The complications are immeasurable – the attack will work on any make and...
Continue Reading
Magecart

More victims for Magecart Hack Group

Just days after the British Airways breach which exposed almost 400,000 payment card information, the hack group was also recognized as behind the hacking of two additional victims this week – Feedify and Groopdealz. The hack of Feedify was disclosed after a Twitter user named “Placebo” posted Tuesday that Magecart was seen attacking the Feedify...
Continue Reading
1 34 35 36 37 38 39