A Fake Russian Tor Browser Steals $40,000 in Bitcoin

Cyber security firm ESET have unveiled a malicious version of the Tor browser – a program used to access the dark web. And it has been stealing user’s Bitcoin. According to the firm, the illicit actors were able to steal $40,000 in BTC. A Trojan effected version of an official Tor browser has been used by the scammers which redirects users to two websites that claim the user’s version of Tor is out of date even if it has been updated timely. When a user clicks on the “Update” on…

Read More

Google Needs All Android Phones Approved to Run on Android 10

Reportedly, Google has been launched Android 10 approving all smartphones to be run on it after January 31, 2020. According to Google’s GMS – Google Mobile Services – documents accessed by XDA Developers, Google has made it mandatory for all smartphone makers to ship new smartphones approved with the latest version of the company’s mobile operating system. GMS is essentially a suite of Google apps, services, and libraries that has to be licensed by smartphone makers because it enables them to pre-install Google Play Store and Google Play Services on…

Read More

GIF Images via WhatsApp platform could have resulted in Android Phone Hack

WhatsApp is widely known for its usability in Android devices as it includes various functions incorporating exchanging text and voice messages making voice and audio calls, delivering images, documents and several types of files. Recently this year in May, a Vietnam-based researcher found the remote code execution vulnerability believing that the code could have been used to steal essential files and information from WhatsApp users. However, it remains unsettled for three months after it was discovered. This potential dangerous vulnerability helping hackers to execute commands remotely on the WhatsApp platform…

Read More

Will You Trust US Carriers Debut New Password-less Login System?

Google, Microsoft, Apple tech companies, and cellular operators are trying to kill the password. The four major US mobile carriers – AT&T, Sprint, T-mobile US, and Verizon Wireless – have joined together for a new authentication system that would manage your logins without even entering a password.   A new system ZenKey works just like any other single sign-on service (SSO) that provides enhanced protection from data breaches resulting from username and password hacks because ZenKey uses multiple unique data elements to identify and authenticate your accounts.   ZenKey continuously…

Read More

How Email becomes Greatest Cybersecurity Vulnerability?

In today’s digital world, Email has become the most lucrative channel for cyber crooks to make money. And that’s because it is very simple to gain financial assistance by acquiring someone else’s monetary and personal data via emails. A survey conducted recently says that 57% of respondents admitted that their company has experienced a malicious attack in the past 12 months. And over 12% of them admit that their business could experience the risk soon. In most cases of email malicious attacks, hackers not only access personal data from emails…

Read More

New Malware Converts PC into a Hacking Tool : Microsoft 

Tech-giant Microsoft recently revealed a new malware campaign affecting thousands of Windows computers across the world. This new strain of malware that downloads and installs in the system automatically infecting the system turns into proxies for launching other cyberattacks and performs click-fraud.   The malware, named Nodersok, was first spotted over the summer, circulated via malicious ads that forcibly downloaded HTA which is HTML application files on users’ computers. Users who found and ran these HTA files started a multi-stage infection process involving Excel, JavaScript, and PowerShell scripts that eventually…

Read More

DoorDash Data Breach, Affecting 4.9M Customers

Popular on-demand food delivery platform DoorDash has upheld a data breach affecting 4.9 million customers around the world.   DoorDash, an economy giant founded in 2013, connects customers with local restaurants, on independent contractors who use their vehicles for door-to-door delivery, also known as “Dashers.” It operates in over 4,000 cities across the US and Canada.   The data which have been found breached was accessed by an unspecified third-party service provider on May 4, including profile information such as names, emails, delivery addresses, phone numbers, useful official passwords, as…

Read More

How to Stay Safe from Gorgon APT?

The Gorgon APT, Advanced Persistent Threat, is an older yet unsafe online threat first discovered in February 2018. While the activities of the Gorgon APT flared on and off from February 2018 until now, the group is now back strongly with a new spear-phishing campaign. So far, the targets are being carried out in Europe though everyone else should be on safeguard too. It begins with an email containing subjects, invoice numbers, content with the description with the attached Excel document. Once the attached file gets clicked, the malicious file…

Read More

National Cyber Security Centre Warns Universities for Cyberattacks

The UK’s National Cyber Security Centre (NCSC) has issued a stark cautioning to universities across the country, urging them to be on their guard counter to Cyberattacks. The key risk, in fact, two-fold. Primarily, it comes from ne’er-do-wells looking for financial gain via untargeted attacks; however, they do “have the potential for greater financial impact”, reports the cybersecurity agency. In the meanwhile, though, the report sounds an alarm on a more silent threat, one that is “possibly to cause greater long-term harm” – state-sponsored attacks and surveillance. These infiltrations seek concerted…

Read More

2 Photo Apps Containing Malware Removed from Play Store

 Two popular malware-infected photo apps with over 1.5 million downloads have been officially removed from google play store for security concerns due to malware-related issues. These two apps having requirements for more authorizations than usual, granting them to record audio without users’ consensus and serve full-screen ads without even opening them violating Google’s policies.   Apart from this, both these apps were requesting users for unwanted permissions when they install on their respective Smartphones; and also asking for the audio recording and microphone’s permission from the users once they install…

Read More