Warning! Your iPhone Can Get Hacked Just by Opening a JPEG Image, PDF or...

What's worse than knowing that innocent looking JPEGs, PDFs and font files can hijack your iPhone, iPad, and iPod. Yes, attackers can take over your vulnerable Apple's iOS device remotely – all...

New Drammer Android Hack lets Apps take Full control (root) of your Phone

Earlier last year, security researchers from Google's Project Zero outlined a way to hijack the computersrunning Linux by abusing a design flaw in the memory and gaining higher kernel privileges on...

MBRFilter — Open Source Tool to Protect Against ‘Master Boot Record’ Malware

Ransomware threat has risen exponentially so much that ransomware authors have started abusing the MBR in their attacks to lock down your entire computer instead of just encrypting your important files...

Beware — Someone is dropping Malware-infected USB Sticks into People’s Letterbox

Hey! Wait! Wait! Wait! Don't plug in that USB stick into your laptop. It could infect your computer with malware and viruses. Australia's Victoria Police Force has issued a warning regarding unmarked USB...

Warning! This Cross-Platform Malware Can Hack Windows, Linux and OS X Computers

Unlike specially crafted malware specifically developed to take advantage of Windows operating system platform, cyber attackers have started creating cross-platform malware for wider exploitation. Due to the rise in popularity of Mac...

Russian Lawmaker’s Son Convicted of Stealing 2.9 Million Credit Card Numbers

The son of a prominent Russian lawmaker has been found guilty in the United States of running a hacking scheme that stole and sold 2.9 million US credit card numbers using...

Someone is Spying on Researchers Behind VeraCrypt Security Audit

After TrueCrypt mysteriously discontinued itself, VeraCrypt became the most popular open source disk encryption software used by activists, journalists, and privacy conscious people. Due to the huge popularity of VeraCrypt, security researchers...

Internet Traffic Hijacking Linux Flaw Affects 80% of Android Devices.

An estimated 80 percent of Android smartphones and tablets running Android 4.4 KitKat and higher are vulnerable to a recently disclosed Linux kernel flaw that allows hackers to terminate connections, spy...

Linux.Lady – The New Linux Malware Can Convert Linux Based PCs Into Crypto-Currency Miners.

  Researchers have discovered a new malaware – Linux.Lady which converts Linux based PCs into Crypto-Currency miners. According to the Russia-based antivirus software retailer Dr. Web the malware is designed with Google’s Go...

Linux TCP Flaw allows Hackers to Hijack Internet Traffic and Inject Malware Remotely.

If you are using the Internet, there are the possibilities that you are open to attack. The Transmission Control Protocol (TCP) implementation in all Linux systems deployed since 2012 (version 3.6 and...

Oops! Microsoft Accidentally Leaks Backdoor Keys to Bypass UEFI Secure Boot.

Microsoft has accidentally leaked the Secret keys that allow hackers to unlock devices protected by UEFI (Unified Extensible Firmware Interface) Secure Boot feature. What's even worse? It will be impossible for Microsoft to...

Microsoft Releases 9 Security Updates to Patch 34 Vulnerabilities.

A security bulletin, MS16-102, patches a single vulnerability (CVE-2016-3319) that could allow an attacker to control your computer just by getting you to view specially-crafted PDF content in your web browser. Users...

First-Ever Ransomware For Smart Thermostat is Here — It’s Hot!

Internet of Things (IoT) is the latest buzz in the world of technology, but they are much easier to hack than you think. Until now we have heard many scary stories of hacking...

Warning! Over 900 Million Android Phones Vulnerable to New ‘QuadRooter’ Attack

Android has Fallen! Yet another set of Android security vulnerabilities has been discovered in Qualcomm chipsets that affect more than 900 Million Android smartphones and tablets worldwide. What's even worse: Most of...

New Botnet Hunts for Linux — Launching 20 DDoS Attacks/Day at 150Gbps.

A network of compromised Linux servers has grown so powerful that it can blow large websites off the Internet by launching crippling Distributed Denial-of-service (DDoS) attacks of over 150 gigabits per second (Gbps). The distributed denial-of-service network,...

Nemesis Bootkit — A New Stealthy Payment Card Malware

Another day, another stunning Malware – this time targeting banks, payment card processors, and other financial services. Security researchers have uncovered a sophisticated payment card malware that executes before the operating system boots, making...
New Tech Targets Enterprise Ransomware.

New Tech Targets Enterprise Ransomware.

SentinelOne last week introduced an addition to its behavioral solution designed to address the problem of ransomware scrambling files on a computer. Ransomware has been a scourge not only for consumers, but for...

This 20-year-old Student Has Written 100 Malware Programs in Two Years

Security firm Trend Micro has identified a 20-year-old Brazilian college student responsible for developing and distributing over 100 Banking Trojans selling each for around US$300. Known online as 'Lordfenix', 'Hacker's Son' and 'Filho de Hacker',...

Adware android Apps Found in Google Play with Millions of Downloads

With the rise in mobile market, last year we have seen sharp growth in malicious 'adware' — the most prevalent mobile threat in the world. And now, security researchers have once...

Xiaomi Mi4 Smartphone Pre-loaded with malware custom android ROM

  Once again the very popular and the world's third largest smartphone distributor Xiaomi, which had previously been criticized for secretly stealing users information from the device without the user's permissions, has...

Startup Stories

Home Services Startup UrbanClap Raises $21 million

Amazon.com, the global ecommerce giant, is investing another $306 million in its Indian arm Amazon Seller Services Pvt., Ltd., as a continuation of its...

Inshorts