Tuesday, December 10, 2019
Home Blog Page 3
The LEA in Ukraine have arrested a 42 year old person whose identity was not disclosed by officials. The culprit infected approximately 2000 users with a remote access Trojan called (RAT). The name of the application is DarkComet (RAT). The individual was arrested this week by the local law enforcement agencies with the permission...
Users that are still using the Windows 7 operating system just have one year left until Microsoft will end support for its 9 year old operating system. For users that are still using Windows 7 it is time to move on to a new operating system because from 1 year today  i.e. 14-January-2020 no more updates are going to be launched...
Proofpoint researchers have found out a new way through which they can exploit Google Apps Script to deliver malware via URL. After the discovery Proofpoint made a proof of concept exploit for the issue which already exists in Google Apps Script. The platform has been developed in JavaScript and allows the creation of both...
Every smart phone application that asks for location permission can track you.You probably knew that but a lot of these application can still collect your location data and track you in real time while you are not even using that application. Furthermore some applications by just installing them can give the application maker rightful consent to track...
National Security Agency has officially released a reverse engineering tool that helps the agency to find out security bugs in software’s and applications. The release of GHIDRA is free and anyone can download it and use it. GHIDRA is designed in Java frame work language. It has a graphical user interface and can run...
Security experts are stating that a simple procedure implemented by hackers and email scammers is being used to bypass security features of Microsoft office 365, safe links which are used to protect users from external intruder, malware & phishing attacks. Safe links is a feature of Microsoft office 365, the abbreviation (ATP) advanced threat...
It can be rightfully said that today’s generation lives on the internet and we general users are not aware how these random bits of ones and zeros packets reach us safely. For hackers it is a golden age with so many access points and IP addresses and tons of data traffic due to which...
The Facebook bug that might have made your images vulnerable was a programming flaw in the website giving accidentally approximately 1500 apps access to personal images of users. Around 6.8 million users have been reported to be affected by this bug. Facebook today unobtrusively reported that it found another API bug in its photograph...
p>The VPN (Virtual Private Network) technology came as an answer to individuals' request to protect their online activities and to maintain their online confidentiality. Besides this functionality, the technology helps internet users access restricted content from anywhere in the world, with just a click of a mouse It is pertinent to know that in order to have...
The accounts of mr Eamonn Holmes , Louis Theroux and several others briefly showed messages saying they had been taken over by a cyber security agency Insinia Security . The team at Insinia security managed to find a vulnerability in the way twitter handles messages posted by the phone. By knowing a person’s...

HOT NEWS