Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

BLOG
NSA has a Most Skillfully Developed Hackers’ Team PDF Print E-mail
Written by Administrator   
Friday, 26 August 2016 07:00


According to a report from The Intercept, a secret agency of USA namely NSA (National Security Agency) is claimed to have eavesdropped on Pakistan's highest civil-military office with the aid of malware. An obscure online group going by the handle Shadow Brokers asserts having stolen a repository of Internet robbery tools from Equation Group a hackers' arm of NSA. Members of Shadow Brokers uploaded few of these tools on offer without charging any price; however, declared that the remaining tools would be sold off to the highest bidder hoping to be valued at over one-half billion dollars.

It's presumed that Equation Group is a contractor that provides service to the NSA. To describe it differently it would be USA's very own hackers' team. Cyber Security Company Kaspersky Lab based in Moscow analyzed Equation Group as an extremely skilled hacking group equipped with resources and sophisticated techniques.

Equation Group's malware server named FOXACID finds mention in leaks by Edward Snowden who once served as contractor to NSA. The NSA when wants to hack into any target uses the method of SECONDDATE to divert that target's Web-browser onto FOXACID. Other methods of NSA's hacks are exploiting security flaws within popular e-mail providers via the dispatch of spam else malevolent web-links which divert onto the server.

The Intercept acquired another document, a newsletter of a critical source operations section of NSA that explains the way NSA used other software besides SECONDDATE for repeatedly diverting Pakistan-based targets onto FOXACID so that the target PCs could be infected and compromised. SECONDDATE malware genuinely exists so confirms The Intercept based on a data exposure that Snowden made. Businessinsider.in posted this, August 21, 2016.

It is irrespective of whether Equation Group is part of NSA, the fact remains that very advanced hacking capabilities can get developed inside United States intelligence agencies.

If Equation Group is adept at finding security flaws, it'll be no surprise for other nation state's high-profile hackers doing the same. As it stands ordinary people dangerously ignore security measures when online while incorrigibly slackens in deploying security updates/patches so essential for fixing software vulnerabilities unveiled from time-to-time.

Read more... - NSA has a Most Skill...
 
Photos on Facebook Lead to Hacking of Facial Recognition System PDF Print E-mail
Written by Administrator   
Friday, 26 August 2016 07:00


Most tech firms depend on the technology of facial recognition to verify their users. But the researcher's team from North Carolina University in security conference of Usenix that has recently taken place in Austin disclosed that the technology of facial recognition is not quite ideal in the sense that it is commonly believed, and it can also be exploited.

When it was further investigated, the researcher's team disclosed that the profile pictures of Facebook are responsible for the exploitation. During the conference, research team also displayed the technique by which attackers are able to compromise systems that use the facial recognition as their key verification technique. They created the 3-dimensional facial models, and have effectively used that to deceive all the 4 systems of facial recognition. These models are mainly created with the help of photos which are available openly. The pictures are displayed through mobile virtual technology in trying to trick the technology of facial recognition.

UNC team collected 20 volunteers to experiment via proficient photographs, picture web indexes, as well as freely available resources on the informal communities such as Linkedln, Facebook, and Google+ and built 3D models of their faces. Later on, these were tweaked to have various facial animations, and eyes are also adjusted to show that they are looking at camera.

All five systems that were tested - Mobius, 1D, KeyLemon, BioID, and TrueKey - are available in the iTunes Store and Google Play Store. Although Google has warned before that similar software "is less secure than a PIN, pattern, or password," because "someone who looks similar to you could unlock your phone," it could be much easier than believed before.

Hackread.com posted on August 22nd, 2016, stating that the lone solution is embedding of hardware and sensors, and adoption of preventive measures by going beyond webcams and mobile cameras.

Team member True Price said: "some vendors -- most notably Microsoft with its Windows Hello software -- already have commercial solutions that leverage alternative hardware. However, there is always a cost-benefit to adding hardware, and hardware vendors will need to decide whether there is enough demand from and benefit for consumers to add specialized components like IR cameras or structured light projectors".

Read more... - Photos on Facebook L...
 
WikiLeaks’ E-mail Dump Found with 3,000 Plus Malware-Tainted Attachments PDF Print E-mail
Written by Administrator   
Friday, 26 August 2016 07:00


Assistant Professor Dr. Vesselin Bontchev with National Laboratory of Computer Virology under Bulgarian Academy of Sciences discovered that WikiLeaks was broadcasting 3,277 malware-laced files when he was going through the leaked e-mail bunch, which AKP the governing political party of Turkey wrote and which anybody could access online with just one click of the mouse.

Bontchev, who describes the leaked bunch mediocre spam, phishing or scam e-mails, says that indeed it is wholly feasible that there are far many items posted on WikiLeaks that contain malware than the latest e-mail dump. This e-mail dump has been the point of focus for Bontchev who with the aid of VirusTotal examined whether any file was malware-rigged else completely untainted.

Moreover, it can't be ruled out that certain e-mail dumps on WikiLeaks comprised highly personalized messages written for specific persons and contained viruses which no anti-malware software could currently detect. Grahamcluley.in posted this dated August 22, 2016.

A related opinion from malware promoters on GitHub is that WikiLeaks' hosting of malware numbers is not at all exhaustive, however, in case those number of malware samples are listed then certainly VirusTotal has malware indexed them.

Dr. Bontchev elaborated that the first time he found malicious software inside the WikiLeaks-exposed AKP e-mail bunch, he didn't examine if spam mails that were replicas of the AKP e-mails contained malicious attachments. Besides, in case the same malware-rigged attachments were included within more than one e-mail then he listed those attachments just once and accordingly counted them to be 323 in all.

Meanwhile, before Bontchev, others also blamed WikiLeaks of hosting malicious software else risking individuals via non-redaction of critical private details contained within the classified document leaks. Even former employee of WikiLeaks, Edward Snowden described WikiLeaks' shirking of even an ordinary correction an incorrect stand.

Conclusively, Bontchev requests WikiLeaks to scan its documents for viruses prior to publishing them, which does not mean that researchers won't otherwise read them followed with perhaps reporting about the exposures. Performing the scan will at least segregate the malware even if mediocre for, that's the basic WikiLeaks' readers are entitled to.

Read more... - WikiLeaks’ E-mail ...
 
Rex Linux Trojan Can Launch DDoS Attacks, Block Websites and Earn Cryptocurrency PDF Print E-mail
Written by Administrator   
Wednesday, 24 August 2016 11:00


Linux is known as secured operating systems; however things are changing because cyber criminals are preparing themselves with latest tools. This is the reason recently; researchers of Doctor Web discovered the Linux Trojan, which can turn the infected Linux device as well as websites into P2P botnets.

Normally, malware is aimed to infect the devices in trying to steal personal and financial data; however "Linux.Rex.1" malware can perform the DDoS attacks from infected device, send the malicious messages, as well as distribute itself to the others networks.

The present version of malware is still written in the Go, and it has much more abilities than it had in May. Moreover, the criminals who are behind the malware are using it for threatening other webmasters with the DDoS attacks, unless the ransom payment was paid in Bitcoin.

As the device gets infected, malware sets it up as bot and then takes instruction of unidentified cybercriminals by using the C&C (Command And Control) servers. After that, the malware distributes itself into other networks by using same infected device because of which it was labeled by Dr. Web as P2P (Peer-to-Peer) botnet.

Hackread.com posted on August 21st, 2016, stating that the botnet is a private computers network that is infected with the malicious software and is controlled as group without the knowledge of the owner, e.g. for sending spam.

Additionally, Linux.Rex.1 further contains a special module within, enabling it to run scans on infected network for the websites which are based on Magento, JetSpeed, Drupal, as well as WordPress CMS. Dr. Web further observed that websites based on Drupal are particular target for this malware because it has capability to perform the vulnerability scan and hacking websites by using SQL injection. Once hacked, malware makes a replica of the website and then distributes itself on additional networks.

As of today, versatile Rex Linux trojan is extremely profitable malware version, permitting criminals in earning money through Bitcoin mining, renting the DDoS attacks, DDoS extortion, spam distribution, as well as website defacements (in case that weak Drupal ransomware actually fools anybody, which we doubt).

For detection, it looks that the antivirus engines of VirusTotal do not recognize trojan as threat.

Read more... - Rex Linux Trojan Can...
 
Android Trojan Marcher Disguises to Capture Login Credentials from Gmail, Skype, WhatsApp, Facebook, Instagram PDF Print E-mail
Written by Administrator   
Wednesday, 24 August 2016 07:00


Trojan Marcher for Android phones in its recent update looks like phony login screen that targets Web-surfers to steal their credentials when they access Facebook, Gmail, WhatsApp, Instagram, Skype or other applications.

Marcher malware's first appearance on the cell phones was during 2013 when if a Web-surfer accessed Google's Play Store, the Trojan displayed one fake screen on the upper portion of the Google application. Web-surfers were told on this phony screen to provide their credit card particulars that if done the Trojan would send those particulars to its remote command-and-control (C&C) server.

Marcher's creators with its new update are concentrating attacks on widely used Android applications rather than online banking apps.

Subsequently during 2014, Marcher was upgraded with the capability for phishing banking credentials off end-users who had accounts in financial institutions chiefly within United States, Turkey and Australia. Zscaler the mobile security company identified an updated Marcher which showed that the malware had included more names of high-profile targets into its attack list.

Specifically security company Zscaler for worldwide cloud-based information, of late, found Marcher the Trojan virus for Android phones in a new version which had listed many more application names to be attacked. The Trojan unlike before when it targeted Internet banking applications for stealing account credentials this time round focuses on popular Android applications for the same purpose. Newsmaritime.com posted this, August 20, 2016.

Like it happens with the majority of malicious programs nowadays, they send the data they steal onto a remote server, which attackers control. Earlier such data was dispatched written within clear-text through HTTP protocol, but the latest Marcher version transmits the stolen data in encrypted form through certain SSL-protected medium.

Trojan Marcher also proliferates disguised as a firmware security upgrade for Android, says Zscaler. Besides, Marcher is spreading through spam mails and SMS too as well as disguised as Flash Player updates of Adobe.

Experts recommend against downloading apps that are not from Google's Play Store no matter whether the Store itself is malware ridden because there are less possibilities of becoming contaminated with tainted Play Store applications than those outside of Play Store.

Read more... - Android Trojan March...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1436
Polls
The Spamproblem is
 
Who's online
We have 57 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us