Skip to main content

Posts

Showing posts from August, 2019

Popular CamScanner app for Android infected with nasty malware

CamScanner app has been deleted by Google from Play Store. The IT security researchers at Kaspersky have discovered a dangerous malware in the CamScanner app, a tremendously popular application for Android devices used by more than 100 million users around the world. The purpose of the CamScanner app is to turn a smartphone into a portable scanner by allowing users to scan, save,  sync and collaborate on content across smartphones, tablets, and computers. This time however Kaspersky researchers have identified the presence of a malware in the app available on Google Play Store – which is bad news for unsuspecting Android users. Dubbed Trojan-Dropper.AndroidOS.Necro.n by researchers; the malware was previously found preinstalled in cheap Chinese smartphones. As the name indicates, the malware drops/downloads additional malware equipped with capabilities like downloading more pieces of malicious modules. The main purpose of this malware, according to Kasper...

New ‘Off-Facebook Activity Tool’ lets users control data collected by websites

Off-Facebook Activity lets users see a summary of the apps and websites that send Facebook information about their activity. Over the past decade when we saw Facebook shifting from just another social network, it greatly expanded its feature range. With this, tools such as “ Facebook Login ” and “ Facebook Pixel ” were launched. In the case of the former, website owners can record your information when you use Facebook to log in onto their sites and then use this to display targeted ads.  For the latter, it is a tool that allows website owners to integrate a piece of code which can be used to track site visitors and their actions. Later on, the data gained by tracking those users can be utilized for better ad targeting. With this, in a bid to increase transparency, Facebook has launched yet another feature working with its privacy experts. Dubbed as “Off-Facebook Activity”, it comes as a fulfillment of the  announcement  CEO Mark Zuckerberg made last year a...

Update Windows 10: 800 million devices at risk of critical vulnerability

According to Microsoft, unprotected servers can spread viruses and malware over the network without the user’s interaction. Microsoft is warning users to update their Windows 10 operating system immediately to protect themselves from critical vulnerabilities. According to the company, unprotected servers can spontaneously spread viruses and malware over the network, meaning without the user’s intention.  Windows 10 devices having automatic update feature enabled are already secure, the company said. The affected versions of Windows are Windows 7 SP1, Windows Server 2008 R2 SP1, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, etc. However, systems running on Windows XP are not vulnerable. Full list of vulnerable versions is available below: Products Windows 10 Version 1703 for 32-bit Systems Windows 10 Version 1703 for x64-based Systems Windows 10 Version 1803 for 32-bit Systems Windows 10 Version 1803 for x64-based Systems Win...

White hat hackers infect Canon DSLR camera with ransomware y

In July this year, in-depth research into cybercrime and online threats revealed that in 2018, ransomware-type attacks caused $8 billion in damages. It is believed that ransomware attacks will grow to cost $20 billion in 2021. To put the upcoming risk in a real-life scenario, the IT security researchers at Check Point have detailed a set of vulnerabilities in Canon DSLR camera which if exploited can infect DSLR cameras with ransomware.  In a ransomware attack, attackers can not only take over the targeted device but also lock your files and demand ransom money. For instance, the infamous WannaCry ransomware attack on the NHS’s computer system in the United Kingdom. In a  blog post  published by Check Point, researchers have demonstrated how malicious hackers can remotely infect Canon DSLR camera with malware and lockout user from accessing their personal data including private photos and video files which can be a highly lucrat...

Meet AttackSurfaceMapper; new automated penetration testing tool

Last week, Capital One breach shocked the IT security community after it was revealed that a wannabe hacker was able to steal and brag about personal and financial details of over 106 million users. The incident also highlighted the fact that penetration testing has become more critical than ever. If you’ve had the chance to lately go through an ethical hacking course, it is likely that you’ve come across the following 5 steps as an outline of the entire penetration testing process: Reconnaissance  – Collecting maximum information about the target to make one’s attack process easier, Scanning  – Identifying open ports, the services running on the host and any other vulnerabilities that can be detected, Gaining Access  – Actually doing the attack using different techniques which may range from social engineering to purely technical exploits, Maintaining Access  – Making sure that you have a backdoor that allows you continued access and does n...

Top Dangers' That Online Gamers Face

Contrary to the stereotype, kids and teens aren’t the only fans of video games. It turns out that people never really outgrow the enthusiasm for this activity nowadays, with   adults forming a large segment   of gaming addicts. This major industry is becoming growingly inclusive over time, and it’s not mere speculation. According to the findings of VentureBeat, a technology news and analysis company, the number of females who pay for online games exceeds the male audiences, and t he  average age of a gamer is 31 .  Furthermore, there are more gamers over 36 years old than in the 18-35 range, or under 18. Researchers at Newzoo, a well-known market intelligence firm, say the worth of the global gaming industry will reach $180.1 billion by 2021. Given the huge numbers, it comes as no surprise that cybercriminals are increasingly zeroing in on gamers. Lured by the opportunities of financial gain, hackers are constantly expanding their portfolio of attacks in this...