Uber Sued by Google’s Waymo for Stealing its Self-Driving Car Technology

By Uzair Amir

We always need to be alert while sending out emails especially when sending the same email using the Carbon Copy (Cc) option on your email account’s address bar. If you accidentally send out Cc emails, you must be prepared for shocking outcomes. The news that we are going to share with you explains the dangers […]

This is a post from HackRead.com Read the original post: Uber Sued by Google’s Waymo for Stealing its Self-Driving Car Technology

Continue reading Uber Sued by Google’s Waymo for Stealing its Self-Driving Car Technology

Shamoon malware revisiting Saudi Arabia; cyberinfrastructure on high alert

By Uzair Amir

The dreaded Shamoon malware is back to haunt Saudi Arabia; therefore, the government has wasted no time in issuing a warning alert to a number of organizations. This time Shamoon’s new variant Shamoon 2 has been identified to be circulating and affecting Saudi organizations, according to CrowdStrike, an American cybersecurity technology company. Adam Meyers, CrowdStrike VP, […]

This is a post from HackRead.com Read the original post: Shamoon malware revisiting Saudi Arabia; cyberinfrastructure on high alert

Continue reading Shamoon malware revisiting Saudi Arabia; cyberinfrastructure on high alert

Cyber Criminals Held Cancer Services Computers for Ransom

By Uzair Amir

Little Red Door is the name of the Cancer Services of East Central Indiana. The executive director of the organization revealed on Tuesday that their computer systems have been infected with a ransomware by cyber criminals who happen to be “an international cyber terrorist organization”. Aimee Fant, the Executive Director of Little Red Door, officially revealed its involvement in the […]

This is a post from HackRead.com Read the original post: Cyber Criminals Held Cancer Services Computers for Ransom

Continue reading Cyber Criminals Held Cancer Services Computers for Ransom

Gmail Phishing Scam Stealing Credentials Through Infected Attachment

By Uzair Amir

Malicious threat actors are using exclusively designed URLs to deceive users into providing their Gmail credentials. This latest phishing campaign, discovered by security experts, utilizes a very effective phishing attack that can trick even the most alerted users and tech-savvy people. The campaign involves sending infected messages to the contacts from an already infected computer. […]

This is a post from HackRead.com Read the original post: Gmail Phishing Scam Stealing Credentials Through Infected Attachment

Continue reading Gmail Phishing Scam Stealing Credentials Through Infected Attachment

Gmail Phishing Scam Stealing Credentials Through Infected Attachment

By Uzair Amir

Malicious threat actors are using exclusively designed URLs to deceive users into providing their Gmail credentials. This latest phishing campaign, discovered by security experts, utilizes a very effective phishing attack that can trick even the most alerted users and tech-savvy people. The campaign involves sending infected messages to the contacts from an already infected computer. […]

This is a post from HackRead.com Read the original post: Gmail Phishing Scam Stealing Credentials Through Infected Attachment

Continue reading Gmail Phishing Scam Stealing Credentials Through Infected Attachment

Cerber Ransomware Infecting Devices by Exploiting Flaws in Web Browsers

By Uzair Amir

There is a fresh ransomware campaign circulating on the web that is spreading Cerber ransomware. This campaign is quite dangerous because it has the tendency of infecting a large number of systems. Andra Zaharia, a member Heimdal Security research team states that this ransomware campaign affects not just individual internet users but also enterprises. The research […]

This is a post from HackRead.com Read the original post: Cerber Ransomware Infecting Devices by Exploiting Flaws in Web Browsers

Continue reading Cerber Ransomware Infecting Devices by Exploiting Flaws in Web Browsers

Customers reporting their Groupon accounts are being hacked

By Uzair Amir

Groupon, an American e-commerce marketplace is used by millions of people worldwide. Naturally, its usage during Christmas skyrockets and it looks like hackers are well aware of this fact that’s why several Groupon’s UK customers are complaining that their accounts are being compromised and someone is buying stuff they never signed up for. The confused customers are taking their […]

This is a post from HackRead.com Read the original post: Customers reporting their Groupon accounts are being hacked

Continue reading Customers reporting their Groupon accounts are being hacked

PCILeech Allows Hacking of Apple Mac Encryption Passcode in Seconds

By Uzair Amir

PCILeech is a $300 device that was effectively and successfully used by a Swedish hacker and penetration tester for obtaining complete control over Mac or Macbook. The hacker Ulf Frisk is the creator of PCILeech, which any hacker can use to hack a MacBook. This particular device can hack the passcode of literally any Apple laptop […]

This is a post from HackRead.com Read the original post: PCILeech Allows Hacking of Apple Mac Encryption Passcode in Seconds

Continue reading PCILeech Allows Hacking of Apple Mac Encryption Passcode in Seconds

This Malware converts your Computer into a Cryptocurrency Miner

By Uzair Amir

Zcash, a cryptocurrency that debuted on 28th October 2016, is believed to be more anonymous than the overhyped Bitcoin. This new virtual currency has attracted the attention of investors, academics as well as hackers since the latter have managed to use this new currency for their malicious purposes. Reportedly, hackers are installing software on Windows-based computers […]

This is a post from HackRead.com Read the original post: This Malware converts your Computer into a Cryptocurrency Miner

Continue reading This Malware converts your Computer into a Cryptocurrency Miner

Meet “Legion Hacking Group” Hacking Bigwigs of India

By Uzair Amir

Legion Hacking Group needs no introduction because this is the same group of hackers that hijacked the Twitter accounts of various high profile Indian officials. These include the Twitter handles of Indian Congress Party and its Vice President Rahul Gandhi, renowned Indian business tycoon Vijay Mallya and two popular journalists namely Burkha Dutt and Ravish […]

This is a post from HackRead.com Read the original post: Meet “Legion Hacking Group” Hacking Bigwigs of India

Continue reading Meet “Legion Hacking Group” Hacking Bigwigs of India