Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
Flashlight Application from Google’s Play Store Disseminates Malverts PDF Print E-mail
Written by Administrator   
Friday, 27 May 2016 07:00


At 2016 beginning, Google cleared the Play Store off thirteen apps because they were malicious. These applications were Cake Blast, Just Fire, Honeycomb, Tiny Puzzle, Drag Box, Crazy Block, Piggy Jump, Ninja Hook, Jump Planet, Crazy Jelly, Cake Tower, Hit Planet and Eat Bubble. But, there were more applications which Google removed from its Play Store.

Whilst it isn't anything new to find apps which display advertisements, those that have been removed display advertisements that are related to scareware alerting device owners that infection has set into their phones alternatively virus has entered their battery.

Here, certain more savvy end-users may simply uninstall the application to substitute it with some other, while those not so savvy may click on the advertisement that will dupe them into pulling down one more application supposedly an anti-virus or virus remover.

Security Company Trend Micro states that one particular application Super-Bright LED Flashlight inside Play Store is persistently serving advertisements to end-users once they download it. Softpedia.com posted this dated May 21, 2016.

And though the company states that the application along with those behind its development mightn't be entirely responsible because an ad network plays the role of retrieving and exhibiting the advertisements, however, given negative user remarks are enormous, it indicates they aren't also making any effort for resolving the problem.

Presently, Flashlight continues to be obtainable from Google's Play Store, and according to Google, people downloaded the app more than 100m times over. As per Trend Micro, Google as well as each and every store that offers the application have been informed.

Flashlight applications have high demand because they aren't built into most phones. Previously, miscreants frequently utilized flashlight apps and games for disseminating malware considering the high popularity the former carried. Whilst mostly these malevolent applications get disseminated through intermediate application stores, occasionally these applications entered Google Play Store too.

The kind of applications is called Potentially Unwanted Applications (PUAs) since they usually contain malicious software. Trend Micro reports in its yearly research paper that during 2015, 0.15% of the entire applications from Play Store that was downloaded contained malware.

Read more... - Flashlight Applicati...
 
Humanitarian Hacker Phineas Fisher Teaches His Hacking Techniques PDF Print E-mail
Written by Administrator   
Friday, 27 May 2016 07:00


Phineas Fisher, the humanist hacker, whose other name is Hack Back, and has association with another hacker who attacked Gamma Group's and Hacking Team's websites the providers of surveillance software and spying gadgets, is back making another headline.

Phineas Fisher presents one video on hacking tutorial giving in detail the procedure of his most recent breach against the website for Catalan's police union which is known as Sindicat De Mossos d'Esquadra, in short SME.

This isn't the first time Phineas Fisher has done such a thing. Previously, following the mega exploit he carried out against Hacking Team, he had released one likewise video explaining thoroughly the way he intruded the servers of Hacking Team followed with silently stealing the company's maximum sensitive data that nearly caused it to collapse.

Fisher's hack into SME seems effective because the website is currently inaccessible. Furthermore, the hacker leaked whole lot of the filched data on the Internet; however, the hosting company later eliminated it.

Like with the majority of operations that Phineas Fisher carried out, he is guided with some sort of social righteousness. Following the crashing of SME's online site, the hacker as well altered the police union's Twitter account, as well as posted those people's pictures whom ultra-enthusiastic SME officers had beat up.

Notably, after conducting philanthropic activities using stolen funds, Fisher wants towards giving lessons to enthusiastic wannabe hackers regarding the way he breaches online sites. Thus, one video named "how-to" has got released from him providing thoroughly the different hacking techniques he employed.

As one can perhaps already guess that Phineas Fisher desires getting regarded as certain warrior for social justice, also referred to as the Internet's 'Robin Hood.' Indeed he even defaced the Twitter A/C of SME, as also posted those individuals' pictures whom ultra-enthusiastic SME officers had beat up. Techworm.com posted this dated May 20, 2016.

On this day, it is further known that Phineas the hacker broke into a bank, robbed money from it, converted it all into bitcoin and donated 25BTC (USD 11,300) towards one humanitarian project being executed in a Kurdish region of Syria.

Read more... - Humanitarian Hacker ...
 
Hacker Exposes Healthcare Data Stolen from Hospices in Turkey PDF Print E-mail
Written by Administrator   
Thursday, 26 May 2016 13:00


A hacker apparently an Anonymous member posted one web-link opening onto one archive consisting of personal information of inmates of several Turkish hospitals. The data was posted onto 3 separate websites featuring file-sharing facility. Moreover, a YouTube movie too was posted. Lately, of the 3 web-links to the file-sharing sites, two along with the YouTube movie were disabled, while just one was active.

The YouTube movie posted May 18 showed an individual with his face behind a Guy Fawkes mask that Anonymous group branded, asserting he hacked servers of many hospitals in Turkey, stole patient records as also accessed targeted databases to erase information from them.

According to the individual, he was avenging since the latest cyber-assaults launched on US hospitals. During that period, these were propagated as from Turkish hackers, although wasn't ever supported with strong proof.

The huge amount of data exposure carries information from thirty three hospitals; however, Hurriyet a Turkish daily reported that the health ministry acknowledged to having merely a few problems from cyber-assaults against hospices within the Diyarbakir southeast city of Turkey.

Government in Turkey substantiated the series of cyber-assaults striking the region's hospitals but tried devaluing the range of damage. The ministry telling Hurriyet substantiated that 33 hospitals had been affected due to a cyber-assault while acknowledged work on the computers had been completely stopped due to the incident.

This isn't the sole case of Turkey being attacked with large hacks during recent months. In April 2016, one unidentified hacker exposed 50m Turkish voters' private records, while in February, data seized from servers of Turkish police was leaked when a hacker known as ROR[RG] launched an attack. Softpedia.com posted this, May 19, 2016.

Earlier last year during December, Anonymous executed an overwhelming DDoS assaults on the NIC.tr registrar of Turkey, thus bringing to halt all .tr sites. Each of the mentioned assaults began immediately when Turkey halted one Russian aircraft getting into its airspace.

And whilst the hacker's assertions don't clearly indicate full legitimacy, particularly with respect to the leakage's magnitude, there has been backlashes to the hack from Anonymous associated A/Cs as well as Internet security commentators.

Read more... - Hacker Exposes Healt...
 
Hacker Robs Bank, Converts the Money into BTC, Donates to Anti-ISIS Forces PDF Print E-mail
Written by Administrator   
Thursday, 26 May 2016 13:00


After Hamza Bendelladj the hacker arrested and imprisoned for breaking into banks to steal money and donating huge sums to Palestinian charitable organizations, another hacker with good intentions recently attacked and donated stolen funds to groups operating against ISIS forces.

This second computer attacker is skilled at his job and has carried out high-profile hacks similar as those by Gamma Group and Hacking Team. Within his most recent attack, this hacker calling himself Phineas Fisher completed a heist of about EUR 10,000 (around 8,000 pounds) Bitcoin.

The story goes like this. Rojava, one geographical area consisting of 3 cantons within Syria's northern region, lies between Turkey's border and ISIS territories. People living here, fed up with the continual Syrian war fueled with religion, have formed an autonomous region that propagates equality of sex and religious freedom.

Rojava earned international fame after Al Jazeera and the New York Times published editorials portraying literal utopia within ISIS' backyard the place of Muslims and Christians co-living while women live fearless as well as even fight side by side with men to oust ISIS.

Plunging into Rojava's cause, Phineas Fisher on 5th May 2016 declared that he contributed virtual money for a fertilizer infrastructure scheme. The amount was 25 Bitcoin valuing around $11,300 at current price.

The region has been going through hard times for keeping afloat albeit because of its fight against Daesh or ISIS along with Turkey that's aggressive towards it, it desperately requires money on an urgent basis. Hackread.com posted this dated May 19, 2016.

Fisher even advocated other hacktivists/hackers on Reddit to uphold Rojava's cause. He suggested them to rob banks alternatively establish ATM skimming attacks followed with giving the stolen money on charity. He recommended skilled hackers to read Kaspersky's report about a cyber criminal gang called Carbanak which stole over $1bn from one hundred banks spread over thirty countries during 2013-14.

The hacker's idea of giving the Bitcoin funds on charity to Rojava was not just as a support to the region, however, as well to make its prominence in media thus lending his passion to Rojava's ideas.

Read more... - Hacker Robs Bank, Co...
 
TeslaCrypt Ransomware Project Seems to Close Down, Offers Decryption Key Free of Cost PDF Print E-mail
Written by Administrator   
Thursday, 26 May 2016 13:00


The creators of the infamous TeslaCrypt ransomware have announced that they have closed down their operation and released a master decryption key and also offered apology for causing chaos for years.

A security researcher of Slovakia-based security firm ESET made this revelation, who contacted the creators of TeslaCrypt through a 'support channel' on the dark web normally reserved for victims of the Trojan malware to make payments to regain access to their locked files of their computer.

A researcher of Slovakian antivirus firm ESET asked a question prompted by that note, who had found that TeslaCrypt operations looked to be closing down in current weeks.

ESET has created a decryptor tool, which is available with detailed instructions for downloading from the ESET website by using the master key. There is another TeslaCrypt decoder with an easier-to-use interface being posted on the website of Bleeping Computer.

Abrams says that operators of TeslaCrypt have gradually switched over to the CryptXXX ransomware instead. It seems that operators of TeslaCrypt are not actually "sorry", but they have simply found a better ransomware strain.

TeslaCrypt has been broken many times during the past due to which TeslaDecoder application of BloodyDolly exists. So switching over to CryptXXX might have been a bad idea because Kaspersky had also broken the ransomware twice. It cracked CryptXXX 2.0 and CryptXXX 1.0 only few days after crooks released it.

TeslaCrypt first appeared in the beginning of 2015, and it was unique in the way that it targeted gamers by encrypting data like saving files and custom maps in addition to the usual range of documents, photos and many more. It would look for total 185 various file extensions to encrypt. Softpedia.com posted on 19th May, 2016, stating that the only way to recover your files was to pay the ransom amount or start using backups of your data.

During the past months, some white hats have also hacked the distribution networks of different ransomware strains, such as Locky, empty files, distributing antivirus software or warning messages in lieu of ransomware.

Read more... - TeslaCrypt Ransomwar...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1403
Polls
The Spamproblem is
 
Who's online
We have 81 guests and 1 member online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us