Malicious Version Of PuTTY Used By Hackers
May19

Malicious Version Of PuTTY Used By Hackers

Trojanized open source SSH software used to steal information Researchers at Symantec have found a Trojanized version of PuTTY online. Put is one of the most software used for SSH connections. It is used by many System Administrators, Developers, or anyone who wants to connect to a remote system through encrypted means. Symantec Security Response has encountered an unofficial, information-stealing version of the open source Secure...

Read More
Microsoft Reveals New Method For Keeping Data Private
May19

Microsoft Reveals New Method For Keeping Data Private

Verifiable Confidential Cloud Computing (VC3) Microsoft researches have found out how to lock out service providers and keep the users data safe. The technology is called Verifiable Confidential Cloud Computing.The client’s data is loaded into the secure hardware in the cloud, where the data is decrypted, processed and re-encrypted. No one else – including the people who work at the company running the cloud-based service – can...

Read More
Wayne County Sheriff’s Dept Website Defaced
May18

Wayne County Sheriff’s Dept Website Defaced

Defaced and Login Data Leaked By AnonGhost AnonGhost have just hacked and defaced the official website of Wayne Country Sheriff’s department and leaked employees login credentials. THIS MESSAGE IS ADDRESSED TO UNITED NATIONS : YOU HAVE FAILED AS EXPECTED. FOR MANY YEARS,WE HAVE WITNESSED YOUR UNJUST LAWS. YOU HAVE ABUSED HUMAN RIGHTS, CREATING WARS, FINANCIAL CRISIS, BOMBINGS,ARRESTING INNOCENT PEOPLE, ASSASSINATING, USING MEDIA...

Read More
FBI Admitted Hacking Plane While In Air
May17

FBI Admitted Hacking Plane While In Air

“Used Default IDs and Passwords” Chris Robert, the researcher told FBI that he exploited in flight entertainment system and then overwrote code on airplane’s Thrust Management Computer while in flight. Robert said he used Kali Linux to perform penetration testing of the IFE system. He used the default IDs and passwords to compromise the IFE systems, …connected to other systems on the airplane network after he...

Read More
Playstation Network Down, Lizard Squad Claiming Responsibility
May16

Playstation Network Down, Lizard Squad Claiming Responsibility

Hello Lizard Squad As i woke up this morning and welcome the weekend, and start the day with Fifa 15 on PS4, I was saddened with the pop up saying, you have to be signed in. So i tried again and two or so times again. But then I checked my tweets and there it was, Lizard Squad claiming responsibility of taking PSN down. Great, weekend sorted. But the real question is, is it the Real Lizard Squad or someone pretending to be. It’s...

Read More
Large Cooperate Organisations Risk Of Cyber Attacks by VENOM Vulnerability
May15

Large Cooperate Organisations Risk Of Cyber Attacks by VENOM Vulnerability

The vulnerability is agnostic of the host operating system Jason Geffner, CrowdStrike Senior Security Researcher, discovered a new vulnerability which potentials puts millions users at risk. The guest operating system communicates with the FDC by sending commands such as seek, read, write, format, etc. to the FDC’s input/output port. QEMU’s virtual FDC uses a fixed-size buffer for storing these commands and their associated data...

Read More
%d bloggers like this: