Posts

Showing posts from November, 2016

FBI Hacked into 8,000 Computers in 120 Countries Using A Single Warrant

Image
FBI Hacked into 8,000 Computers in 120 Countries Using A Single Warrant   Wednesday, November 23, 2016     The FBI hacked into more than 8,000 computers in 120 different countries with just a single warrant during an investigation into a dark web child pornography website, according to a newly published court filings. This FBI's mass hacking campaign is related to the high-profile child pornography Playpen case and represents the largest law enforcement hacking campaign known to date. The warrant was initially issued in February 2015 when the FBI seized the Playpen site and set up a sting operation on the dark web site, in which the agency deployed malware to obtain IP addresses from alleged site's visitors. The piece of malware used by the FBI is known as a  Network Investigative Technique  (NIT). The malware was used for at least 13 days to break into the computer of users who visited certain threads on Playpen and then sent their IP addresses back to the bu

Researchers Show How to Steal Tesla Car by Hacking into Owner's Smartphone

Image
Researchers Show How to Steal Tesla Car by Hacking into Owner's Smartphone   Friday, November 25, 2016   New technology is always a little scary, so are Smart Cars. From GPS system and satellite radio to wireless locks, steering, brakes, and accelerator, today vehicles are more connected to networks than ever, and so they are more hackable than ever. It's not new for security researchers to hack connected cars. Previously they had demonstrated how to hijack a car remotely, and how to disable car's crucial functions like airbags by exploiting security bugs affecting significant automobiles. Now this time, researchers at Norway-based security firm Promon have demonstrated how easy it is for hackers to steal Tesla cars through the company's official Android application that many car owners use to interact with their vehicle. Two months ago, Chinese security researchers from Keen Lab managed to hack a Tesla Model S, which allowed them to control a car in b
Image
Antivirus Firm Kaspersky launches Its Own Secure Operating System   Thursday, November 24, 2016       The popular cyber security and antivirus company Kaspersky has unveiled its new hack-proof operating system:  Kaspersky OS . The new operating system has been in development for last 14 years and has chosen to design from scratch rather than relying on Linux. Kaspersky OS makes its debut on a  Kraftway Layer 3 Switch , CEO Eugene Kaspersky says in his  blog post , without revealing many details about its new operating system. The Layer of 3-switch is the very first tool for running the Kaspersky OS, which is designed for networks with extreme requirements for data security and aimed at critical infrastructure and Internet of Things (IoT) devices. What's new in Kaspersky OS than others? Kaspersky OS is based on Microkernel Architecture:  The new secure OS is based on microkernel architecture that enables users to customize their own operating system according

Beware! Malicious JPG Images on Facebook Messenger Spreading Locky Ransomware

Image
Beware! Malicious JPG Images on Facebook Messenger Spreading Locky Ransomware   Friday, November 25, 2016     If you receive an image file sent by someone, even your friend, on your Facebook Messenger, LinkedIn or any other social media platform, just DO NOT CLICK ON IT. Even JPG image file could eventually infect your computer with the infamous Locky Ransomware. Earlier this week, we reported a new attack campaign that used Facebook Messenger to spread Locky Ransomware via .SVG image files, although Facebook denied this was the case. Now, researchers have discovered that the ongoing spam campaign is also using boobytrapped .JPG image files in order to download and infect users with the Locky Ransomware via Facebook, LinkedIn, and other social networking platforms. Security researchers from Israeli security firm Check Point have reportedly discovered how cyber criminals are hiding malware in image files, and how they are executing the malware code within thes