July 2014
Facebook's Internet.org App Goes Live in Zambia, Offers Free Data

Facebook's Internet.org App Goes Live in Zambia, Offers Free Data

Facebook have today launched the app for the internet.org, a initiative to connect people all around the world with internet. The app provides the people to access some of the basic and local informative service without any internet and data charges. The app is officially launched in Zambia with Airtel carrier but more countries are sure to be added to the list in the coming months. Users can browse internet for free via the app, and that also without any data charges. Through the Interne…
Zero-day Vulnerability in Symantec Endpoint Protection

Zero-day Vulnerability in Symantec Endpoint Protection

Researcher from the offensive security team have found three zreo-day vulnerability in the Symantec's Endpoint Protection. As during the security auditing session at a company offering financial services, experts team have successfully exploited the Endpoints Protection security. Offensive security team wrote - "the same software that was meant to protect the organization under review was the reason for its compromise". Expert team have found multiples vulnerability on …
Chinese Authorities Seized Microsoft Computers

Chinese Authorities Seized Microsoft Computers

May this could be the bad days for the software giants company, Microsoft that from couple of days Chinese authorities have raided several Microsoft offices. Although there is no reasons specified till yet of the raid, but with some of the sources stats that a new anti-trust case that could target the Redmond-based tech giant. According to the post on Wall Street Journal - in these days about 100 of Chinese investigator have made an unexpected visit in several Microsoft offices located  i…
Israel's Iron Dome Missile Defense System hacked by Chinese hackers

Israel's Iron Dome Missile Defense System hacked by Chinese hackers

Unknown group of hackers have breached the computers system of three defense contractors that built Israel’s missile defense mechanism, Iron Dome. The investigation done by the Cyber Engineering Services Inc. (CyberESI), claims that the incident was occurred in 2011 and 2012. On this breach hackers have managed steal large amount of data related to the technology used for building the missile shield Iron Drone. All the stolen data were highly sensitive, that includes all the details inform…
CBI Arrests Hackers For Stealing Microsoft Product Keys

CBI Arrests Hackers For Stealing Microsoft Product Keys

The piracy concerns is increasing and this is one that is something impossible to stop. With the recent updates from the Microsoft side, its says that Indian hacker have been arrested for hacking Microsoft's sites and stolen Microsoft products activation keys . Microsoft have recently worked with the Indian Authorities to arrest an individual who reportedly hacked its servers and stole several product keys for its software. According to press statement hacker had sold the stolen produc…
iPhones extracting deep personal data - Apple Employee

iPhones extracting deep personal data - Apple Employee

This week Apple employees have acknowledge that Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicised techniques. The same techniques to circumvent backup encryption could be used by law enforcement or others with access to the "trusted" computers to which the devices have been connected, according to the security expert who prompted Apple's admission. Last week a forensic security researcher Jonat…
Russia Offers $100,000 for Cracking TOR

Russia Offers $100,000 for Cracking TOR

Everyone searching for the loop holes in TOR bundle and everyone wants to break TOR security. As from long time NSA is searching for the loopholes in TOR now with that Russia is also came. Russian government is offering money to break the TOR security. Russian government is reportedly increasing its efforts to kill all kinds of anonymity and privacy on the Internet by putting the target on the Tor network. Russia’s Interior Ministry made the announced and  started to offer money for peopl…
MailPoet Vulnerability Targets 50,000 WordPress Sites

MailPoet Vulnerability Targets 50,000 WordPress Sites

A free and open source blogging tool as well as content management system (CMS), WordPress is now in targets of Cyber hackers. With the continuous security vulnerability in some of the popular plugins make it easy to hack WordPress sites. So Security firm have recommend all WordPress users to upgrade its CMS version along with the plugins that they use. In early of this month security researcher and CEO of the security firm Sucuri, Daniel Cid have pointed a security vulnerability on one…
Researchers Demonstrate Zero-Day Flaws in Tails Operating System

Researchers Demonstrate Zero-Day Flaws in Tails Operating System

Researcher at Exodus Intelligence have discovered a Zero-day critical vulnerability in  security dedicated Linux-based Tails operating system, that could lead to de-anonymize any of the its users identity. The Vulnerability was in I2P software which is a component of the Operating System. On the blog post Exodus researcher have thoroughly described the vulnerability and also posted a demonstrated video of vulnerability that unmask an anonymous user of the Tails operating system. On the de…
European Central Bank hacked, personal data stolen

European Central Bank hacked, personal data stolen

Ransom is getting common for the cyber criminals, as they are targeting mobile device with the malware that have a capability to encrypt all the data of the infected system and then asked for ransom. Here again a unknown hacker have hacked the public website of the European Central Bank (ECB) and stolen customers information, and asked for ransom. ECB had made a announcement today, inform about the data breached and also state that hackers have contacted the ECB officials and demanded …
Mozilla release 11 Security Updates in Firefox 31

Mozilla release 11 Security Updates in Firefox 31

Popular web browser Mozilla Firefox had released its update version in which Mozilla team have fixed 11 security vulnerabilities. In this 11 vulnerabilities 3 of them are critical, including a use-after-free vulnerability and a handful of memory safety issues. Firefox have several use-after-free vulnerability but team have noted one critical on them. That bug lies in the DirectWrite font handling component of the browser. Mozilla Firefox recommends its users to install the security …
Apple denies of Installing backdoors on iOS device

Apple denies of Installing backdoors on iOS device

Yesterday we have noted that a Forensic Security researcher Jonathan Zdziarski, who claim to identifies that Apple had installed several backdoors in iOS  and there are many hidden service in Apple iOS device that are being used to bypass the backup encryption on iOS device. It was suggested that this could be because Apple wanted to make it easy for law enforcement agencies to gain access in the event that they needed one, with the proper requests and paperwork of course. Well it se…
Breaking TOR security presentation on Black Hat Cancelled

Breaking TOR security presentation on Black Hat Cancelled

Two researcher who have claimed to break the security of the TOR anonymity Network in the low budget of $3,000, which was going to demonstrate in the up coming hackers conference Black Hat 2014, had been cancelled. The Black Hat organizers recently announced that a talk entitled “You Don’t Have to be the NSA to Break Tor: Deanonymizing Users on a Budget” by researchers Alexander Volynkin and Michael McCord from Carnegie Mellon University’s Computer Emergency Response Team (CERT) was ca…
Google Announced Email notification for Webmaster tools Message

Google Announced Email notification for Webmaster tools Message

This is a good news for all blogger and Google webmaster tool users, that Google have added a new features on it webmaster tool service. Now Google will send a email notification to your associated email about the error that Google finds with your site. Whenever Google finds a error with your site, which may be Error in crawling, broken links, spam or optimization issue, you will get the alert message in the inbox of your webmaster account. But now Google will also forward same error mess…
Alleged Windows 9 Screenshot Leaked shows new Start Menu

Alleged Windows 9 Screenshot Leaked shows new Start Menu

It is confirmed that Microsoft is working with the next upcoming version of the Windows operating system, which may be Windows 9. And in the coming version of Windows, Microsoft will have some new features and looks for it. It is been rumor that Microsoft is giving a UI flat design and Metro style in Start Menu. According to the recent leaks screenshots of the latest windows developing version which shows build Windows 8.1 pro, which may be Windows 9 can be release next year . The leak …
Vodafone India Official Twitter account Hacked

Vodafone India Official Twitter account Hacked

Last weekend. the official twitter account of Vodafone Indian (@vodafoneIN) have been hacked by the unknown hacker. With the compromised account hacker have posted some inappropriate tweets and message to its followers. Vodafone Twitter account is a verified account, having the more then 195k followers. This if the hackers have post some phishy link or some malicious link then there would be number of users get the victim. But hacker have just posted the inappropriate text continuously. …
Researcher Identifies Suspicious 'backdoors' Running on Every iOS Device

Researcher Identifies Suspicious 'backdoors' Running on Every iOS Device

Researcher Jonathan Zdziarski , who is also a forensic scientist and author have identifies that there are many hidden service in Apple iOS device that are being used to bypass the backup encryption on iOS device , and with a backdoor also. On the Slide/ paper that he published at the Hackers On Planet Earth (HOPE/X) conference in New York called Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices reveals many undocumented and hidden features and services on A…
NASDAQ System hacked through two Zeroday Vulnerability

NASDAQ System hacked through two Zeroday Vulnerability

Four years ago, Russian hackers have hacked into the system of  NASDAQ stock exchange, which have caused several damaged to the sock market and also brought down the entire financial structure of United State. And after the fours years, FBI team and investigator of this incident haven't identified the hackers behind it. But sources says that the attacker was not a teen or a student, but it may be the intelligence agency of other countries. After successfully exploiting the NASDAQ serve…
Wall Street Journal Facebook Page Hacked by Unknown Hacker

Wall Street Journal Facebook Page Hacked by Unknown Hacker

An unknown hacker have hacked the American based media "Wall Street Journal" Facebook page and posted  crash reports of Air Force One. On the same region here Malaysian MH17 shooted down. As the Facebook page of WSJ is actively popular, readers had took the news seriously as the Air Force One ferries the President of United States of America. After some time (about 15 minutes) of the first post, hackers have also posted the news of Vice President Joe Biden addressing the n…
Kim Dotcom's Mega Blocked by Italian Court

Kim Dotcom's Mega Blocked by Italian Court

The Italian judges seems to be very strict on piracy concerns, as Italian court have ordered to ban Kim Dotcom's Mega over the country. With the so many of the serious censorship taken against torrents site, now Italian court have censored Dotcom's new project Mega. Mega helps in distribution of the pirated movies over the internet. After the seized of its earlier biggest hosting Mega Cloud, Kim Dotcom's have recently started a new project called Mega . It seems that many of …
Critroni, crypto ransomware using Tor Network for Command and Control

Critroni, crypto ransomware using Tor Network for Command and Control

Another new crypto ransomware know as Critroni is being sold in underground forums from last month or so and is now being dropped by the Angler exploit kit. This ransomware have some unique features that researcher have not seen on earlier crypto ransomware. The most interesting features of Critroni ransomware is that it uses TOR network for command and control . The attack of ransomware malware have been active from last year, and we have seen many of the ransomware incidents, specially…
Google Offer Udacity Android Development Course material For Free

Google Offer Udacity Android Development Course material For Free

If you are looking to learn Android App Development then here is the good news for you all. Google will help you to learn in the Android App Development as it is offering for free with the collaboration with the Udacity. Udacity course called, “ Developing Android Apps: Android Fundamentals ” is offred for free via View Courseware. Google Developer Advocates Reto Meier , Dan Galpin , and Katherine Kuan will give you step-by-step training for how to build an Android app, as well as best…
Microsoft Cutting off 18,000 employees Job, 12,500 from Nokia

Microsoft Cutting off 18,000 employees Job, 12,500 from Nokia

Now this is really bad news for the Microsoft employees that yesterday Microsoft have officially confirmed that they will cutoff the jobs of the 18,000 employees over next 12 months. This would be the biggest cutoff made by the Software giants firm. In the Announcement Microsoft CEO Satya Nadella says that, the bulk of layoff count 12,500, would come from Nokia Device developer and Service. Microsoft have acquired Nokia in $7.2 billion this year. On the count of 12,500 employees both prof…
vBulletin Fixed Critical SQL injection vulnerability

vBulletin Fixed Critical SQL injection vulnerability

Apache Patched Five security Vulnerabilities

Apache Patched Five security Vulnerabilities

Google drops all real-name restrictions for GooglePlus

Google drops all real-name restrictions for GooglePlus

After three years of launch of Google social networking site Google Plus, finally Google have made a change on its rules. With the complaint from its users from more than a year, Google have finally dropped the real name restriction of Google plus. The company have apologized with its users that they faced with the restriction rules. Google have implemented the rules just to make the social network with the real name. Earlier when the Google plus was launched the restriction was on almost…
Google Annonce Project Zero - A team of Hackers

Google Annonce Project Zero - A team of Hackers

As like earlier Search engine giants Google is helpful to all the users and also step forward to get all the people connected to Internet with Facebook and other tech giants.  As Google always gives first priority to its users privacy and security, this time also Google have made another great initiative for the users security. Google team have announced a new project called " Project Zero ". What is Project Zero? Project Zero is a new initiative by Google team, where Google wil…
CNET got Hacked, 1 Million users data Stolen

CNET got Hacked, 1 Million users data Stolen

Oracle Releasing 113 Security Updates of its Products

Oracle Releasing 113 Security Updates of its Products

Researcher Found Critical vulnerabilities in Five Password Managers

Researcher Found Critical vulnerabilities in Five Password Managers

Last Monday, popular password manager 'The Last Password' have notifies its users to change their master password for the security concerns. The announcement is made because, in 2013, a security researcher Zhiwei Li from UC Berkeley, have notified the vulnerability  which could be leveraged against a user utilizing the bookmarklet on an attacking site. Password manager team have not discuss the technical details of the vulnerability, but they have said that bookmarklets is …
Security Company Offered $10,000 prize to Hack Tesla car

Security Company Offered $10,000 prize to Hack Tesla car

Earlier we have seen that hackers have hacked almost the things that are connected with Internet, from Computers to Aircraft, Cars and other things too. In this I remembered a line from Anonymous group " If you are connected with Internet You are Hackable " . So here is another good and challenging announcement for hackers. This announcement is from automaker company Tesla motors. The Symposium on Security for Asia Network (SyScan) has  called hackers for the competition to hac…