Support our Sponsors

uClip Clipping Path Service

Main Menu
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions

feed-image Feed Entries

KSU Student Arrested, to Face Trial over Hacking for Altering Grades PDF Print E-mail
Written by Administrator   
Wednesday, 28 September 2016 07:00

A college pupil of Kennesaw State University (KSU) who's a resident of Georgia is under arrest for apparently hacking into the computers of his institution. The student named Chase Arthur Hughes seemingly utilized the Internet connection of his girlfriend for carrying out the hack. Hughes' purpose was to alter course grade of his own and some classmates' and that he did, raising his grade to "A" from "B" and a classmate's grade to "A" from "F." It's reported the hack occurred during summer.

Seemingly, by using the usernames and passwords of faculty members, Hughes managed logging into KSU's computers. The indictment on Hughes is that he committed PC forgery and invaded into the privacy as well as trespassed in others' area of work. It's not comprehensible right now whether Hughes pulled down any data alternatively what way he got hold over the plentiful details belonging to the KSU professors.

A software program named Owl Express is used at KSU that informs professors of different classes over e-mail anytime somebody mischievously modifies the grades.

Cops in Kennesaw State started one investigation during May following reports about the hack. Actually a professor had got one e-mail that the PC system of the university sent him which stated that certain grade change was done which he didn't make. Following this notification, the professor told college authorities who subsequently informed the police. posted this, September 20, 2016.

While news about the arrest unfolded fast all over the campus, the grades' correction too was immediately done.

Lectra Lawhorne provisional CIO (chief information officer) of KSU said that whilst, as normal, professors were alerted about grade changes, extra caution had been introduced for additional detection of illegitimate access.

Now, after his arrest Hughes' trial will take place inside Georgia. His offence is threefold computer forgery, breaking into computer's privacy and PC trespassing. Crimes associated with PC privacy can lead to a maximum of $50,000 in fine else incarceration for a maximum of fifteen years.

Interestingly, student Hughes owned a business empire focusing on finance when he was admitted to KSU and stayed during 2015 autumn to 2016 summer.

Read more... - KSU Student Arrested...
Yahoo Encounters a Biggest Data Hack in History PDF Print E-mail
Written by Administrator   
Wednesday, 28 September 2016 07:00

To the previous massive data-breaches online another is the latest hack at Yahoo with no less than one-half billion A/Cs of the e-mail client impacted. The result -hackers have fled stealing precious database, including names, phone numbers, electronic mail addresses as well as hashed passwords, while several million Internauts have been put at risk.

The attack, believes Yahoo, is from some state-sponsored miscreant although it can't be clearly said as to who executed it as well as what method the culprits employed.

The e-mail client stated that most of the passwords stolen were safeguarded with encryption type common for industry. Still the company is ardently asking account-holders for making their login details up-to-date as well as be vigilant of dubious activity.

Fortunately, the attackers couldn't acquire admission into the system on which Yahoo had stored sensitive information comprising back account details, credit card data and unprotected passwords.

Verizon that has come to know about the breach stated that it learnt Yahoo was conducting one thorough probe into the incident; however, the former didn't yet get full information regarding the impact of the attack. Verizon planned to assess while the investigation was on, the company stated.

Meanwhile according to Yahoo, although encryption process has been done for the hacked passwords, yet computer security specialists state that the stubborn attacker managed unscrambling the passwords with the aid of 'cracking' software commonly available. So the software enabled the hackers to invade Yahoo A/Cs, while incase the same passwords were used on other websites then possibly the accounts on those sites as well. posted this, September 22, 2016.

One couldn't immediately say what impact occurred following Verizon's handling of the situation and discussion with Yahoo. In America, corporate houses regularly encounter big data breaches, so do prominent political groups and government agencies.

General Manager John Peterson who's also Vice-President with 'Comodo Enterprise' suggests end-users to safeguard themselves via proactively maintaining the best password hygiene. Further, incase any organization with which the end-users interact informs of a hack into their systems then those end-users should immediately reconstruct their passwords rather than wait for anything.

Read more... - Yahoo Encounters a B...
Qadars Trojan Gears Up to Attack Banks of UK PDF Print E-mail
Written by Administrator   
Tuesday, 27 September 2016 07:00

As per IBM X-Force Research, updation of Qadars Trojan was done for improving its defences, and it has been tailored for targeting 18 banks of UK. Infection campaigns that are launched in the early part of this month, has mainly targeted banks in Germany, US, and Netherlands; however researchers recently have found facts proving that banks in UK have also been added in that list.

As per the belief of security researchers, Qadars active from 2013 is probably brainchild of "Russian-speaking black hat", and is also considered as an "advance online banking Trojan" most probably originating from "single source".

Cyber criminals have started focusing on UK again with renewed action, after a time when Brazil, US and Germany are getting targeted by the malware.

X-Force Research reveals that even though most of the targets of Qadars were banks, malware's configurations during recent month's shows that online sports betting users, social networking credentials, payment & card services, and e-commerce platforms is also targeted by it. posted on September 21st, 2016, that researchers believe experienced groups of cybercrime is supporting Qadars because malware tactics of advanced banking from the very beginning has been used by the malware.

The malware further uses the social engineering to try gaining complete access of the victim's systems and then steal his/her data, including data safeguarded by the two-factor authentication systems normally used by the majority of banks. Moreover, the Trojan can also comprehensively monitor the injected devices as well as hijack text messages from the victims' phones.

As per the researchers, Rig Exploit Kit through EiTest campaign is used by Qadars for infecting users, which facilitate its infiltration with the downloader malware. Researchers added that Qadars latest version is advanced online banking Trojan coming from single source. Fraud tactics of Qadars are enabled with the help of techniques like cookie & certificate fraud, code injection, form grabbing and ATS.

Qadars can do in-session fraud by remote-controlling infected endpoint through virtual network computing, and executing a real time fake transaction when user is already logged on.

Activities of Qadars are fairly limited as well as modest, compared to the other flourishing banking Trojans like GozNym or Dridex. However, researchers consider this as a deliberate trick of malware's developers in trying to avoid detection.

Read more... - Qadars Trojan Gears ...
Sophisticated RAUM Tool Replaces Torrent Files with Malware PDF Print E-mail
Written by Administrator   
Tuesday, 27 September 2016 07:00

RAUM, one fresh and refined tool is the latest discovery in the cyber-crime world. It attacks innocent Web-surfers who surf torrent sites to download media content else popular software, by substituting them with malicious software.

InfoArmor an Internet security firm describes RAUM as being utilized for particularly turning torrents into weapons for proliferating different ransomware strains such as Cerber, CTB-Locker and CryptXXX, as well as Dridex the banker Trojan and Pony the password grabbing spyware. This task gets done via two-prong assault.

InfoArmor further reports that a very desirable target of RAUM is Internet games played on PCs and the files which activate the Mac OS and Microsoft Windows operating systems.

The security firm states that Black Team an organized crime syndicate from Eastern Europe has effectively monetized the unlawful operation by actively providing RAUM tool across underground networks through the pay-per-install scheme. One unusual infrastructure is involved which lets end-users handle fresh malicious downloads with the aid of one huge network of virtual servers that run all the time, including compromised PCs. posted this, September 21, 2016.

People who rely on torrent websites, notes TorrentFreak, for acquiring games and software and not music and video files have the greatest possibility to contract RAUM along with related malicious programs.

The above reporting insists that end-users be wary about the dangers while making access to torrent files. According to TorrentFreak, for remaining secured, it is best not reposing faith on apps that are freely-downloadable online.

InfoArmor discloses having detected 1,639,000-and-more records garnered during recent months from contaminated end-users having different credentials for accessing social media, gaming sites, online services, corporate resources as well as sent out databases from the publicly exposed criminal network.

InfoArmor, the company said, strongly suggested taking the greatest caution while accessing torrent tracker websites alternatively taking down pirated digital material, business software and operating systems.

Further, it'd be good browsing via Mozilla's Firefox and Google's Chrome web-browsers and using the freely-offered security protection from Malwarebytes the company that detects malware.

Meanwhile, the just mentioned tools for security and browsing have deactivated the Internet Protocol addresses which have been found to source RAUM.

Read more... - Sophisticated RAUM T...
Victoria Residents in Australia Target Of Hazardous USB Sticks PDF Print E-mail
Written by Administrator   
Tuesday, 27 September 2016 07:00

Victoria residents in Australia have just realized an attack being targeted on them via USB memory sticks arriving from nowhere to lie in their letterboxes. The state police of Victoria have posted an alert on its official website telling that when these USB sticks are plugged into users' computers, the victimized users will receive fake offers of media streaming facility along with experiencing other severe problems.

Unfortunately, such instances wherein tainted devices are proliferated or dumped in public places are not unknown. Cyber-criminals do the same thing for disseminating their malware alternatively other hazardous codes fast among unwitting users. It is assumed that even spying organizations make use of such techniques. What's more the sticks sent from apparently genuine places too can be pretty hazardous. Surveys conducted reveal that an enormously unexpected number of individuals just lift apparently thrown away USB sticks and even use them.

The described attacks have presently occurred solely in Pakenham a tiny, noiseless town having as small as just a little more than 30,000-sized population and situated 56 km away from Melbourne in the south-east direction. And though some miscreant has discovered an uncommon technique of spreading malware that could be banking Trojans also, the problem that individuals without pondering insert USB sticks inside their PCs isn't unprecedented. posted this, September 21, 2016.

According to one more survey conducted in April 2016, an investigator for cyber security following a TV program after Mr. Robert dropped 300 USB drives near the campus of University of Illinois Urbana-Champaign. The investigator felt perplexed when he discovered that 98 of those drives had been collected while 48% of end-users actually used them and attempted at opening the files and operating on them that were inside the drives.

Furthermore, considering that only in August an organization from Hong Kong too began selling one USB drive which short-circuited the PC into which it was plugged, it is advisable that consumers exercise greater caution while handling freshly discovered USB drives.

In the meantime, Victorian police have been asking residents to get potential clues which could aid in catching the perpetrators of the contaminated hardware.

Read more... - Victoria Residents i...
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1447
The Spamproblem is
Who's online
We have 78 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us