GIF Images via WhatsApp platform could have resulted in Android Phone Hack

WhatsApp is widely known for its usability in Android devices as it includes various functions incorporating exchanging text and voice messages making voice and audio calls, delivering images, documents and several types of files. Recently this year in May, a Vietnam-based researcher found the remote code execution vulnerability believing that the code could have been used to steal essential files and information from WhatsApp users. However, it remains unsettled for three months after it was discovered. This potential dangerous vulnerability helping hackers to execute commands remotely on the WhatsApp platform…

Read More

Will You Trust US Carriers Debut New Password-less Login System?

Google, Microsoft, Apple tech companies, and cellular operators are trying to kill the password. The four major US mobile carriers – AT&T, Sprint, T-mobile US, and Verizon Wireless – have joined together for a new authentication system that would manage your logins without even entering a password.   A new system ZenKey works just like any other single sign-on service (SSO) that provides enhanced protection from data breaches resulting from username and password hacks because ZenKey uses multiple unique data elements to identify and authenticate your accounts.   ZenKey continuously…

Read More

How Email becomes Greatest Cybersecurity Vulnerability?

In today’s digital world, Email has become the most lucrative channel for cyber crooks to make money. And that’s because it is very simple to gain financial assistance by acquiring someone else’s monetary and personal data via emails. A survey conducted recently says that 57% of respondents admitted that their company has experienced a malicious attack in the past 12 months. And over 12% of them admit that their business could experience the risk soon. In most cases of email malicious attacks, hackers not only access personal data from emails…

Read More

New Malware Converts PC into a Hacking Tool : Microsoft 

Tech-giant Microsoft recently revealed a new malware campaign affecting thousands of Windows computers across the world. This new strain of malware that downloads and installs in the system automatically infecting the system turns into proxies for launching other cyberattacks and performs click-fraud.   The malware, named Nodersok, was first spotted over the summer, circulated via malicious ads that forcibly downloaded HTA which is HTML application files on users’ computers. Users who found and ran these HTA files started a multi-stage infection process involving Excel, JavaScript, and PowerShell scripts that eventually…

Read More

DoorDash Data Breach, Affecting 4.9M Customers

Popular on-demand food delivery platform DoorDash has upheld a data breach affecting 4.9 million customers around the world.   DoorDash, an economy giant founded in 2013, connects customers with local restaurants, on independent contractors who use their vehicles for door-to-door delivery, also known as “Dashers.” It operates in over 4,000 cities across the US and Canada.   The data which have been found breached was accessed by an unspecified third-party service provider on May 4, including profile information such as names, emails, delivery addresses, phone numbers, useful official passwords, as…

Read More