The personal data for some 1.3 million users of the social audio app Clubhouse has reportedly leaked online. According to Cyber News, the scraped data posted on the hacker forum can be used by cybercriminals to carry out targeted phishing or other types of social engineering attacks, and that such database can also be used by threat actors to brute-force the passwords of Clubhouse profiles. However, Clubhouse has denied the report of any data breach containing 1.3 million scraped records of its users. The company took to Twitter to clear…
Read MoreAuthor: shrinath7d
Beware of free WiFi when shopping, warns UAE authority
Authorities have issued a fresh warning to residents, cautioning them to avoid using public WiFi networks while shopping online, as it could expose shoppers to hackers. “Using public WiFi to shop online while at public places is tremendously convenient but it might not be safe. So, use a Virtual Private Network (VPN) instead or share data from your phone as a hotspot,” said the Abu Dhabi Digital Authority (ADDA) on Twitter. The ADDA also pointed out that using a public WiFi may expose them to vulnerabilities, and, “shoppers should make…
Read MoreHacking IOT Devices? an What is IOT Threats?
Hacking IOT Devices? an What is IOT Threats? – The Internet of Things (IOT) includes different technology such as embedded sensors, microprocessors and power management devices. Security Considerations changes from device to device and application to application. the greater the amount of confidential data we send across the network, the greater the risk arises of data theft, data manipulation, data tampering as well as attacks on routers and servers. Hacking IOT Devices? an What is IOT Threats? Improper security infrastructure might lead to the following unwanted scenarious: An Eavesdropper intecepts…
Read MoreBiden Needs to Respond to Russian Hacking
Biden administration officials have completed an intelligence review of alleged Russian misdeeds such as election interference and the SolarWinds hack, setting the stage for the U.S to announce retaliatory actions soon, according to three people familiar with the matter. Possible moves could involve sanctions and the expulsion of Russian intelligence officers in the U.S. under diplomatic cover, said the people, who asked not to be identified discussing private deliberations. Senior officials were expected to meet Wednesday to discuss what steps to take. One person familiar with the deliberations said the…
Read MoreNew APT27 Cyberespionage Campaign Unveiled
It’s just the fourth month of the year and we have already had a horde of cyber espionage campaigns. Now, another new one has been revealed by researchers. What’s going on? Kaspersky spotted a cyberespionage campaign targeted against government and military organizations in Vietnam via DLL side-loading. The campaign has been attributed to a threat actor related to Cycldek – a Chinese-speaking threat actor. Although this actor shares similarities with Cycldek, it is highly sophisticated as compared to the latter. It is hypothesized that the operators of Cycldek have joined…
Read MoreCyberattackers Jamming Productivity of Manufacturing Sector
While organizations in the manufacturing sector are moving toward the adoption of automation and IoT technologies, attackers are regularly aiming at them via the vastly exposed attack surface. Recently, several hacking groups have been observed carrying out targeted attacks on specific organizations, as well as opportunistic attacks targeting large masses. Targeted cyberattacks A large number of organizations in the manufacturing sector have specifically been targeted by cyberattackers in the past few weeks. Among these attacks, ransomware attacks turn out to be the most prominent threat. French electronics manufacturing services company…
Read MoreWhat Is IOT (Internet Of Things) and How IOT Works?
What Is IOT (Internet Of Things)? – The Internet of Things (IoT) is an important and emerging topic in the field of technology, economics and in society in general. It is referred to as the web of connected devices, made possible from the intersection between machine-to-machine communications and big data analytics. The IoT is a future-facing development of the internet and abilities of physical devices that are eventually narrowing the gap between the virtual world and the physical world. This section deals with some of the Important IoT concepts which…
Read MoreHalf a billion Facebook users’ information posted on hacking website, cyber experts say
The personal information of about half a billion Facebook users, including their phone numbers, have been posted to a website used by hackers, cybersecurity experts say. There are records for more than 32 million accounts in the United States, 11 million in the United Kingdom, and 6 million in India, according to Alon Gal, the CTO of cyber intelligence firm Hudson Rock.Details in some cases include full name, location, birthday, email addresses, phone number, and relationship status, he said Hudson Rock showed CNN Business the phone numbers of two our…
Read MoreDetails from 500 million Facebook users found on website for hackers
Details from more than 500 million Facebook users have been found available on a website for hackers. The information appears to be several years old but it is another example of the vast amount of information collected by Facebook and other social media sites and the limits to how secure that information is. The availability of the data set was first reported by Business Insider. According to that publication, it contains information from 106 countries including phone numbers, Facebook IDs, full names, locations, birthdates and email addresses. Facebook has been…
Read MoreWhat is Firewall? And Firewall Architecture
What is Firewall? And Firewall Architecture – Firewalls are hardware and/or software designed to prevent unauthorized access to or from a private network. They Are Placed at the junction or gateway between the two networks, which is usually a private network and a public network such as the Internet. Firewalls examine all message entering or leaving the Intranet and block those that do not meet the specified security criteria. What is Firewall? And Firewall Architecture Firewall is a software or hardware-based system located at the network gateway that protects the…
Read More