Hackers Hacked into Linux Mint Website

Have you downloaded Linux Mint on February 20th? If yes, then you have been infected. Linux Mint is one of the best and popular Linux distros nowadays, but if you have downloaded and installed operating system recently then you might have done using malicious ISO image. Some unknown hackers had managed to hack into Linux …

Continue reading

GNU C Library Flaw Puts Linux Apps and Machines at Risk

A critical vulnerability has been discovered in the GNU C library (glibc) which left almost all Linux machines, electronic devices and thousands of apps vulnerable to hackers. This vulnerability was discovered by researchers at Red Hat and Google, and has been patched. What is GNU C library? GNU C library is a collection of open …

Continue reading

Malware Targeting Android Users Through Text Messages

A new Android-based malware has been discovered that can wipe mobile device and read personal messages. This malware is named as Mazar bot and delivered via SMS which gain root access to devices and installs software. It was discovered by Heimdal security researchers who analyzed text message that was sent to random  numbers. How Mazar …

Continue reading

Are You Affected by Sparkle Vulnerability?

A new bug has been found in the framework – Sparkle, used by plethora of Mac apps, left them open to Man-in-the-Middle (MitM) attacks. The Sparkle vulnerability was discovered by Radek, a security researcher, and was reported by Ars reporter. What is Sparkle? Sparkle is an open source project which is used by third-party OS …

Continue reading

Russian Hackers Moved Ruble-Dollar Exchange Rate Using Malware

A Russian hacking group named as METEL, cracked into Kazan-based Energobank and altered the ruble-dollar exchange rate for 14 minutes. This breach caused the currency exchange rate to fluctuate between 55 and 56 rubles per dollar, and this resulted in increment of Ruble’s value. How they did this? According to Moscow-based security firm, hired to …

Continue reading

Emergency Java Patch by Oracle to Fix Critical Flaw

Oracle has delivered an out-of-box emergency patch for Java to fix during-installation flaw on Windows platforms. The vulnerability coded as CVE-2016-0603 could allow attackers to trick users to visit malicious website and download files on the user’s system before installing Java 6, 7 or 8. More about Java Exploit An attacker tricks the unskilled user …

Continue reading

Hacker Hijacks Dridex Banking Trojan to Serve Free Antivirus

An unknown person- possibly a white hat hacker, gained access to Dridex Trojan servers and replaced malicious links with Avira Antivirus installers. But, Avira’s researchers say that they have no idea who did this. “The content behind the malware download URL has been replaced. It’s now providing an original, up-to-date Avira web installer instead of …

Continue reading

Beware Netizens! New Virus on Prowl on Social Sites

Cybersecurity experts have alerted Indian internet users from online virus called ‘dorkbot’. This virus perpetrates itself through social sites and steals personal information of a user. Recently, it has been seen affecting operating systems running on Windows. This malware belongs to the family of worms which have backdoor functionality and spreads through various vectors, including …

Continue reading

Beware iPhone Users!

People are circulating a link i.e., crashsafari.com, on Facebook, Twitter and other social media platforms, which has potential to crash iPad, Macs or iPhone completely. If you click on this link, it will crash the Safari application and your Apple device will restart. This link is being spread via Twitter using a URL shortener, and users …

Continue reading

OpenSSL Flaw Allows Hackers to Decrypt HTTPS Traffic

OpenSSL Foundation has released a patch for the high severity vulnerability in its cryptographic library. This flaw allows attackers to obtain the key used to decrypt HTTPS-based communications and other TLS (Transport Layer Security) channels. It is open-source library which is used in applications to secure data transfers. Most of the websites use it to …

Continue reading