Smart Devices Can Be Hijacked to Track Your Body Movements And Activities Remotely

If your smartphones, tablets, smart refrigerators, smart TVs and other smart devices are smart enough to make your life easier, their smart behavior could also be leveraged by hackers to steal data, invade your privacy or spy on you, if not secured pro… Continue reading Smart Devices Can Be Hijacked to Track Your Body Movements And Activities Remotely

Android Trojan Now Targets Non-Banking Apps that Require Card Payments

The infamous mobile banking trojan that recently added ransomware features to steal sensitive data and lock user files at the same time has now been modified to steal credentials from Uber and other booking apps as well.

Security researchers at Kasper… Continue reading Android Trojan Now Targets Non-Banking Apps that Require Card Payments

Unpatchable Flaw in Modern Cars Allows Hackers to Disable Safety Features

Today, many automobiles companies are offering vehicles that run on the mostly drive-by-wire system, which means a majority of car’s functions—from instrument cluster to steering, brakes, and accelerator—are electronically controlled.

No doubt these auto-control systems make your driving experience much better, but at the same time, they also increase the risk of getting hacked.

Car Hacking

Continue reading Unpatchable Flaw in Modern Cars Allows Hackers to Disable Safety Features

Faulty Firmware Auto-Update Breaks Hundreds of ‘Smart Locks’

More features, more problems!

Today, we are living in a digital age that is creating a digital headache for people by connecting every other unnecessary home appliance to the Internet.

Last week, nearly hundreds of Internet-connected locks became ino… Continue reading Faulty Firmware Auto-Update Breaks Hundreds of ‘Smart Locks’

How Just Opening A Malicious PowerPoint File Could Compromise Your PC

A few months back we reported how opening a simple MS Word file could compromise your computer using a critical vulnerability in Microsoft Office.

The Microsoft Office remote code execution vulnerability (CVE-2017-0199) resided in the Windows Object L… Continue reading How Just Opening A Malicious PowerPoint File Could Compromise Your PC

Gmail for iOS Adds Anti-Phishing Feature that Warns of Suspicious Links

Phishing — is an older style of cyber-attack but remains one of the most common and efficient attack vectors for attackers, as a majority of banking malware and various ransomware attacks begin with a user clicking on a malicious link or opening a dangerous attachment in an email.

Phishing has evolved than ever before in the past few years – which is why it remains one of those threats that

Continue reading Gmail for iOS Adds Anti-Phishing Feature that Warns of Suspicious Links

IPS as a Service Blocks WannaCry Spread Across the WAN

One of the most devastating aspects of the recent WannaCry ransomware attack was its self-propagating capability exploiting a vulnerability in the file access protocol, SMB v1.

Most enterprises defences are externally-facing, focused on stopping incom… Continue reading IPS as a Service Blocks WannaCry Spread Across the WAN

Ukrainian Man Arrested For Distributing NotPetya Ransomware And Helping Tax Evaders

Ukrainian authorities have arrested a 51-year-old man accused of distributing the infamous Petya ransomware (Petya.A, also known as NotPetya) — the same computer virus that massively hit numerous businesses, organisations and banks in Ukraine as well as different parts of Europe around 45 days ago.

However, the story is not as simple as it seems, which portrayed this man as a criminal. I

Continue reading Ukrainian Man Arrested For Distributing NotPetya Ransomware And Helping Tax Evaders

Malware Encoded Into DNA Hacks the Computer that Reads It

Do you know — 1 Gram of DNA Can Store 1,000,000,000 Terabyte of Data for 1000+ Years?

Even in March this year, a team of researchers successfully stored digital data — an entire operating system, a movie, an Amazon gift card, a study and a computer virus — in the strands of DNA.

But what if someone stores a malicious program into the DNA, just like an infected USB storage, to hijack the

Continue reading Malware Encoded Into DNA Hacks the Computer that Reads It

Microsoft Issues Security Patches for 25 Critical Vulnerabilities

Here we go again…

As part of its August Patch Tuesday, Microsoft has today released a large batch of 48 security updates for all supported versions Windows systems and other products.

The latest security update addresses a range of vulnerabilities including 25 critical, 21 important and 2 moderate in severity.

These vulnerabilities impact various versions of Microsoft’s Windows operating

Continue reading Microsoft Issues Security Patches for 25 Critical Vulnerabilities