Hacker Profile – Kevin Mitnick

Kevin Mitnick

Kevin Mitnick – When the term “computer hacker” is thrown around, most people think of Kevin Mitnick. Back in the 1970s, 1980s, and 1990s, Kevin Mitnick was the hacker. Mitnick used a combination of social engineering and lower-level operating system research to pull off all sorts of outrageous stunts, although the overall harm caused by him is debatable, especially when compared to today’s world of APT attacks and ransomware. For More About Kevin Mitnick Click Here Kevin Mitnick and his exploits have been written about in several books, have been…

Read More

New Unpatched Bluetooth Flaw Lets Hackers Easily Target Nearby Devices

Bluetooth SIG—an organization that oversees the development of Bluetooth standards—today issued a statement informing users and vendors of a newly reported unpatched vulnerability that potentially affects hundreds of millions of devices worldwide. Discovered independently by two separate teams of academic researchers, the flaw resides in the Cross-Transport Key Derivation (CTKD) of devices supporting both — Basic Rate/Enhanced Data Rate (BR/EDR) and Bluetooth Low Energy (BLE) standard. Cross-Transport Key Derivation (CTKD) is a Bluetooth component responsible for negotiating the authenticate keys when pairing two Bluetooth devices together, also known as “dual-mode”…

Read More

Russian, Chinese and Iranian hackers all targeting 2020 election, Microsoft says

Russian, Chinese and Iranian hackers have all attempted to hack people and organizations involved in the 2020 US presidential election, Microsoft said on Thursday. Thursday’s disclosure sheds new light on efforts by Chinese and Iranian hackers to break into US political campaigns and suggests that Russian hacking efforts have continued apace. “The activity we are announcing today makes clear that foreign activity groups have stepped up their efforts targeting the 2020 election,” Microsoft said in a post on its website. Top US cybersecurity officials acknowledged that Microsoft detected attempts to…

Read More

What is Internet?

The Internet has gained popularity and emerged as an important and efficient means of commuication. The idea of introducing the Internet was to allow millions of people to share information and ideas, sounds, video clips using their computers across the world. The Internet is a world wide network of networked computers those are able to exchange information with each other. It consist of thousands of separately administered network of various sizes and types. What is Internet? Internet Stands for International Network, which began in 1950’s by Vint Cerf known as…

Read More

30 MILLION FACEBOOK ACCOUNTS WERE HACKED: CHECK IF YOU’RE ONE OF THEM

Late last month Facebook announced its worst-ever security breach that allowed an unknown group of hackers to steal secret access tokens for millions of accounts by taking advantage of a flaw in the ‘View As’ feature. At the time of the initial disclosure, Facebook estimated that the number of users affected by the breach could have been around 50 million, though a new update published today by the social media giant downgraded this number to 30 million. Out of those 30 million accounts, hackers successfully accessed personal information from 29 million Facebook…

Read More

Service NSW confirms 180,000 customers’ personal details exposed in cyber security breach

More than 180,000 New South Wales residents are believed to have been caught up in a major cyber security breach after a state government department was compromised earlier this year. Key points: Service NSW began investigating the breach in May after staff emails were compromised in April NSW Police are investigating who accessed the sensitive information Opposition MP Sophie Cotsis criticised the Government for taking months to inform customers Service NSW on Monday morning confirmed the large number of people likely impacted in the breach which was first reported publicly…

Read More

Get Upto $250 Free Courses From Ec-Council

Enumeration

Dear Friends,   Register For Free Pass To Get This Courses https://upvir.al/ref/IQ46710828/ Thank you for registering for our upcoming live webinar event – The Next Big Thing in Cybersecurity Training – hosted by EC-Council, the world’s leader in Cybersecurity education and certifications.Event Details: When: September 16, 2020, 9:30 AM (EST)Where: Stay tuned for updates on the event link!  What to Expect: Learn more about current cybersecurity innovations to help professionals advance their careers, or build organizational cultures that digitally secure businesses from within. Topics to include: New age ethical hacking, building human…

Read More

Loopholes that lead to hacking even when 2FA is enabled

Cybersecurity is like a game of whack-a-mole. As soon as the good guys put a stop to one type of attack, another pops up. Usernames and passwords were once good enough to keep an account secure. But before long, cybercriminals figured out how to get around this. Often they’ll use “brute force attacks”, bombarding a user’s account with various password and login combinations in a bid to guess the correct one. Hackers have been known to trick mobile phone carriers into transferring a victim’s phone number to their own phone.…

Read More

Evilnum hackers targeting financial firms with a new Python-based RAT

An adversary known for targeting the fintech sector at least since 2018 has switched up its tactics to include a new Python-based remote access Trojan (RAT) that can steal passwords, documents, browser cookies, email credentials, and other sensitive information. In an analysis published by Cybereason researchers yesterday, the Evilnum group has not only tweaked its infection chain but has also deployed a Python RAT called “PyVil RAT,” which possesses abilities to gather information, take screenshots, capture keystrokes data, open an SSH shell and deploy new tools. “Since the first reports…

Read More