WannaCry ransomware: researcher halts its spread by registering domain for $10.69
Posted by
Posted in

WannaCry ransomware: researcher halts its spread by registering domain for $10.69

Last year the Internet was taken down by cyber criminals through a massive Distributed Denial of Service Attack (DDoS) attack using the infamous Mirai malware. But last Friday afternoon, almost 99 countries including Russia, UK, USA and Australia became victims of a worldwide mass cyber-attack that has been reported to have caused major disruptions to systems that were being used by hospitals, companies, and other institutions.

WannaCry ransomware –  hitting world right now uses NSA windows exploit
Posted by
Posted in

WannaCry ransomware – hitting world right now uses NSA windows exploit

Earlier today, a massive ransomware campaign hit computer systems of hundreds of private companies and public organizations across the globe – which is believed to be the most massive ransomware delivery campaign to date. The Ransomware in question has been identified as a variant of ransomware known as WannaCry (also known as ‘Wana Decrypt0r,’ ‘WannaCryptor’ or ‘WCRY’).

Warning! Google phishing – don’t click that google docs link
Posted by
Posted in

Warning! Google phishing – don’t click that google docs link

There are chances that you might’ve received an email with a Google document. It could be a phishing attempt that has gone viral. This attack has affected about 1 million Gmail users. While Google has blocked the attack, make sure to take security check and look for suspicious app permissions.

Over 85% of Smart TVs can be hacked remotely using broadcasting signals
Posted by
Posted in

Over 85% of Smart TVs can be hacked remotely using broadcasting signals

The Internet-connected devices are growing at an exponential rate, and so are threats to them. Due to the insecure implementation, a majority of Internet-connected embedded devices, including Smart TVs, Refrigerators, Microwaves, Security Cameras, and printers, are routinely being hacked and used as weapons in cyber attacks.

“Disappearing Malware” Allowed Hackers Steal $800,000 Cash From Russian ATMs
Posted by
Posted in

“Disappearing Malware” Allowed Hackers Steal $800,000 Cash From Russian ATMs

A team of researchers at Kaspersky Labs have recently cracked the mystery of a fileless malware that was used to hack bank ATMs in Russia and steal $800,000 in a single night. It was possible because of the two log files unintentionally left on the machine by the attackers. The researchers were able to reverse engineer the attack.

Shattered – SHA-1 is definitely dead
Posted by
Posted in

Shattered – SHA-1 is definitely dead

Researchers at Google have realized the first real world collision attack against SHA-1, creating two documents with different content but identical hashes.

Vault 7: Top 15 Discoveries & Implications
Posted by
Posted in

Vault 7: Top 15 Discoveries & Implications

As we have already announced, WikiLeaks published CIA’s hacking capabilities, so called Vault 7. Hereby we are providing list of top 15 discoveries & implications.

Vault 7: WikiLeaks publishes CIA’s hacking capabilities
Posted by
Posted in

Vault 7: WikiLeaks publishes CIA’s hacking capabilities

On 07/03/2017, Wikileaks published a massive collection of data which is the biggest ever leak on CIA (Central Intelligence Agency). This immediate sensational news highlights the hacking capabilities for of CIA.