WPA2 encryption can now be hacked with new KRACKS method
Posted by
Posted in

WPA2 encryption can now be hacked with new KRACKS method

Security Researcher Mathy Vanhoef of Imec-DistiNet discovered a weakness within the WPA2 protocol, potentially affecting all the wireless routers supporting WPA2, an attacker can take advantage of this vulnerability by using key re-installation attacks (KRACKS).

Top 5 best cryptocurrency exchanges where you can buy or sell bitcoin
Posted by
Posted in

Top 5 best cryptocurrency exchanges where you can buy or sell bitcoin

Cryptocurrency trading can be a lucrative career and has already made many a person very, very rich. Whether you’re a seasoned professional trader or a total cryptocurrency novice who only wants to buy your first cryptocoin, this list has something to suit your needs. Just the same if you want to back the ideals behind decentralized cryptocurrencies and help out the community.

WannaCry ransomware: researcher halts its spread by registering domain for $10.69
Posted by
Posted in

WannaCry ransomware: researcher halts its spread by registering domain for $10.69

Last year the Internet was taken down by cyber criminals through a massive Distributed Denial of Service Attack (DDoS) attack using the infamous Mirai malware. But last Friday afternoon, almost 99 countries including Russia, UK, USA and Australia became victims of a worldwide mass cyber-attack that has been reported to have caused major disruptions to systems that were being used by hospitals, companies, and other institutions.

WannaCry ransomware –  hitting world right now uses NSA windows exploit
Posted by
Posted in

WannaCry ransomware – hitting world right now uses NSA windows exploit

Earlier today, a massive ransomware campaign hit computer systems of hundreds of private companies and public organizations across the globe – which is believed to be the most massive ransomware delivery campaign to date. The Ransomware in question has been identified as a variant of ransomware known as WannaCry (also known as ‘Wana Decrypt0r,’ ‘WannaCryptor’ or ‘WCRY’).

Warning! Google phishing – don’t click that google docs link
Posted by
Posted in

Warning! Google phishing – don’t click that google docs link

There are chances that you might’ve received an email with a Google document. It could be a phishing attempt that has gone viral. This attack has affected about 1 million Gmail users. While Google has blocked the attack, make sure to take security check and look for suspicious app permissions.

Over 85% of Smart TVs can be hacked remotely using broadcasting signals
Posted by
Posted in

Over 85% of Smart TVs can be hacked remotely using broadcasting signals

The Internet-connected devices are growing at an exponential rate, and so are threats to them. Due to the insecure implementation, a majority of Internet-connected embedded devices, including Smart TVs, Refrigerators, Microwaves, Security Cameras, and printers, are routinely being hacked and used as weapons in cyber attacks.

“Disappearing Malware” Allowed Hackers Steal $800,000 Cash From Russian ATMs
Posted by
Posted in

“Disappearing Malware” Allowed Hackers Steal $800,000 Cash From Russian ATMs

A team of researchers at Kaspersky Labs have recently cracked the mystery of a fileless malware that was used to hack bank ATMs in Russia and steal $800,000 in a single night. It was possible because of the two log files unintentionally left on the machine by the attackers. The researchers were able to reverse engineer the attack.

Shattered – SHA-1 is definitely dead
Posted by
Posted in

Shattered – SHA-1 is definitely dead

Researchers at Google have realized the first real world collision attack against SHA-1, creating two documents with different content but identical hashes.

Vault 7: Top 15 Discoveries & Implications
Posted by
Posted in

Vault 7: Top 15 Discoveries & Implications

As we have already announced, WikiLeaks published CIA’s hacking capabilities, so called Vault 7. Hereby we are providing list of top 15 discoveries & implications.