Google Removes 21 Malicious Android Apps from Play Store

Google has stepped in to remove several Android applications from the official Play Store following the disclosure that the apps in question were found to serve intrusive ads. The findings were reported by the Czech cybersecurity firm Avast on Monday, which said the 21 malicious apps (list here) were downloaded nearly eight million times from Google’s app marketplace. The apps masqueraded as harmless gaming apps and came packed with HiddenAds malware, a notorious Trojan known for its capabilities to serve intrusive ads outside of the app. The group behind the…

Read More

Floridian Arrested for Hacking Home Camera System

A woman from Florida has been arrested after allegedly hacking into the home camera system of a family member as part of an extortion attempt. Agents with the Florida Department of Law Enforcement arrested Jennifer Lenell Small on October 26 and charged the 44-year-old with a third-degree felony cybercrime.  Agents say that Small accessed the home camera system of a male family member as part of an extortion attempt that involved a contested will. Her alleged victim was a former employee of her husband’s construction company.  “Small gained access to the camera…

Read More

WastedLocker Ransomware hits Boyne Resorts online systems

Boyne Resorts suffered a ransomware attack by the WastedLocker operation that impacted the company-wide reservation systems. Boyne Resorts owns and operates lakeside resorts, mountains, ski areas, golf resorts and attractions spanning from British Columbia to Maine. Many of these properties are situated on well-known ski mountains, including Big Sky, Montana, Sugarloaf, Montana, Maine, Tennessee and Utah. Initially, the ransomware breached the corporate offices and then moved laterally, targeting the IT systems of the resorts they operate. The company was forced to shut down portions of its network to prevent the…

Read More

What Is Identity Theft?

What Is Identity Theft? – Identity theft is the illegal use of someone else’s means of identification. Identity theft is a serious problem that many consumers face today. In the United States, some state legislatures have imposed laws restricting employees from filling in their SSN (Social Security number) during the recruitment process. Companies also need to have proper information about identity theft so that they do not endanger their antifraud initiatives. Securing personal information in the workplace and at home, and looking over credit card reports, are a few ways…

Read More

Windows GravityRAT Malware Now Also Targets macOS and Android Devices

A Windows-based remote access Trojan believed to be designed by Pakistani hacker groups to infiltrate computers and steal users’ data has resurfaced after a two-year span with retooled capabilities to target Android and macOS devices. According to cybersecurity firm Kaspersky, the malware — dubbed “GravityRAT” — now masquerades as legitimate Android and macOS apps to capture device data, contact lists, e-mail addresses, and call and text logs and transmit them to an attacker-controlled server. First documented by the Indian Computer Emergency Response Team (CERT-In) in August 2017 and subsequently by…

Read More

New Chrome 0-day Under Active Attacks – Update Your Browser Now

Attention readers, if you are using Google Chrome browser on your Windows, Mac, or Linux computers, you need to update your web browsing software immediately to the latest version Google released earlier today. Google released Chrome version 86.0.4240.111 today to patch several security high-severity issues, including a zero-day vulnerability that has been exploited in the wild by attackers to hijack targeted computers. Tracked as CVE-2020-15999, the actively exploited vulnerability is a type of memory-corruption flaw called heap buffer overflow in Freetype, a popular open source software development library for rendering…

Read More

What Is Security Engineering?

What Is Security Engineering? – Security engineering is about building systems to remain dependable in the face of malice, error, or mischance. As a discipline, it focuses on the tools, processes, and methods needed to design, implement, and test complete systems, and to adapt existing systems as their environment evolves. Security engineering requires cross-disciplinary expertise, ranging from cryptography and computer security through hardware tamper resistance and formal methods to a knowledge of applied psychology, organizational and audit methods and the law. System engineering skills, from business process analysis through software…

Read More

U.S. Charges Six Russian Intelligence Officers With Hacking

WASHINGTON—Federal prosecutors unsealed charges against six Russian intelligence officers accused of engaging in some of the most destructive cyberattacks of recent years, including operations that knocked out Ukraine’s energy grid, exposed emails from the French president’s party and damaged global systems in the costly 2017 NotPetya attack. The prolific hacking unit within Russia’s military intelligence service, known as the GRU, has previously been linked by U.S. authorities to the cyber interference operations during the 2016 election, and one of the accused has already been indicted by the U.S. in connection…

Read More

Twitter Hackers #Anonymous wey support #EndSARS claim hacking all Nigeria goment official Twitter account

Hackers say dem don take over all Nigeria goment official Twitter account to support #EndSARS Di hackers wey call demsef Anonymous on Friday hack di Twitter account of di National Broadcasting Commission wia dem post dia claim. Dem do dis in support for di ongoing #EndSARS protests against police brutality for Nigeria, according to wetin BBC find out. Protests dey don dey happun for more than a week across Nigeria to demand for police reforms and end to police brutality inside di west African kontri. Di hackers collective Anonymous Wednesday…

Read More

How To Hack Twitter Account 2020

How To Hack Twitter Account 2020 – Twitter tops the most popular Internet resources for online communication and information sharing for a long time. If you have a young kid, then you understand the constant worry about what they’re up to on social media. “Hack Twitter” is one of the most searched and hot topics around the Internet, like Gmail hacker. We have prepared a detailed list of how hackers can hack someone’s Twitter account easily in just a few minutes and how can we prevent the same. Also Read This How…

Read More