Loopholes that lead to hacking even when 2FA is enabled

Cybersecurity is like a game of whack-a-mole. As soon as the good guys put a stop to one type of attack, another pops up. Usernames and passwords were once good enough to keep an account secure. But before long, cybercriminals figured out how to get around this. Often they’ll use “brute force attacks”, bombarding a user’s account with various password and login combinations in a bid to guess the correct one. Hackers have been known to trick mobile phone carriers into transferring a victim’s phone number to their own phone.…

Read More

Former Uber Security Chief Charged Over Covering Up 2016 Data Breach

The federal prosecutors in the United States have charged Uber’s former chief security officer, Joe Sullivan, for covering up a massive data breach that the ride-hailing company suffered in 2016. According to the press release published by the U.S. Department of Justice, Sullivan “took deliberate steps to conceal, deflect, and mislead the Federal Trade Commission about the breach” that also involved paying hackers $100,000 ransom to keep the incident secret. “A criminal complaint was filed today in federal court charging Joseph Sullivan with obstruction of justice and misprision of a…

Read More

Uber ex-security boss accused of covering up hack attack

Uber’s former chief security officer Joseph Sullivan has been charged with obstruction of justice in the US. The 52-year-old is accused of trying to cover up a data breach in 2016 that exposed the details of 57 million Uber drivers and passengers. The company has previously admitted to paying a group of hackers a $100,000 (£75,000) ransom to delete the data they had stolen. Mr Sullivan was fired in 2017 when the data breach was revealed. The charges filed by the US Department of Justice said Mr Sullivan had taken…

Read More

Indian hackers give befitting reply to Pakistan’s agenda on Ram temple, Kashmir; hack over 80 Pakistani websites

On August 15, when the country was celebrating the 74th anniversary of independence and Prime Minister Narendra Modi was warning Pakistan and China to not engage in anti-India activities, a group of Indian hackers were busy in giving a befitting reply to Pakistan’s agenda on Ram temple and Kashmir. On August 15, when the country was celebrating the 74th anniversary of independence and Prime Minister Narendra Modi was warning Pakistan and China to not engage in anti-India activities, a group of Indian hackers were busy in giving a befitting reply…

Read More

New Mobile Internet Protocol Vulnerabilities Let Hackers Target 4G/5G Users

High impact vulnerabilities in modern communication protocol used by mobile network operators (MNOs) can be exploited to intercept user data and carry out impersonation, fraud, and denial of service (DoS) attacks, cautions a newly published research. The findings are part of a new Vulnerabilities in LTE and 5G Networks 2020 report published by London-based cybersecurity firm Positive Technologies last week. “This paper encompasses the results of security assessments performed during the 2018–2019 timeframe on behalf of 28 telecom operators in Europe, Asia, Africa, and South America.” Called the GPRS Tunnelling…

Read More

A Bug in Facebook Messenger for Windows

Cybersecurity researchers at Reason Labs, the threat research arm of security solutions provider Reason Cybersecurity, today disclosed details of a vulnerability they recently discovered in the Facebook Messenger application for Windows. The vulnerability, which resides in Messenger version 460.16, could allow attackers to leverage the app to potentially execute malicious files already present on a compromised system in an attempt to help malware gain persistent/extended access. Reason Labs shared its findings with Facebook in April, after which the social media company quickly patched the flaw with the release of an…

Read More

How To Hack Snapchat Account 2020

In This World Every Smartphone users have Social Media Apps Like Whatsapp, Facebook , Instagram & Snapchat. I Write Almost all Blogs on Social Hacks Like How To Hack Whatsapp Account , How To Hack Instagram Account , How To Hack Facebook Account . But Today I Show How To Hack Snapchat Account 2020. Thier Are Lots Of Ways To Hack Someone Snapchat Account 2020 But Firstly you Read What is Snapchat :- Also Read How To Hack Facebook Account What is Snapchat? Snapchat is a multimedia messaging app developed…

Read More

HTTP Status Codes Command This Malware

A new version of COMpfun remote access trojan (RAT) has been discovered in the wild that uses HTTP status codes to control compromised systems targeted in a recent campaign against diplomatic entities in Europe. The cyberespionage malware—traced to Turla APT with “medium-to-low level of confidence” based on the history of compromised victims—spread via an initial dropper that masks itself as a visa application, the Global Research and Analysis Team at Kaspersky discovered. The Turla APT, a Russian-based threat group, has a long history of carrying out espionage and watering hole…

Read More

How To Hack Facebook Account 2020

“Hack Facebook” is one of the most searched and hot topics around the Internet, like Gmail hacker. We have prepared a detailed list of how hackers can hack someone’s Facebook account easily in just a few minutes and how can we prevent the same. – How to Hack Facebook Account 2020 (New Tricks) Also Read This How To Hack Snapchat Account If you want to know how hackers can hack someone’s FB account, please go ahead and read the techniques listed below. The most successful method among all of these techniques is phishing. Phishing…

Read More

Two Zoom Zero-Days Being Sold Online For $500,000

Zoom Zero-Days Sold Online According to a Motherboard report, researchers found two zoom zero-days sold online for a hefty amount. These bugs exist in Zoom Clients for Windows and macOS. Since both the bugs are yet to receive a patch, the hackers can exploit them to compromise any target devices – Hacking News. Presently, the researchers who found the bugs sold online cannot verify the authenticity for obvious reasons. Regarding one of these vulnerabilities affecting Windows, a source told Motherboard, Exploiting this RCE allows an adversary to take control of…

Read More