Tag Archives: Cyber attack

Proposed Bill Would Legally Allow Cyber Crime Victims to Hack Back

Is it wrong to hack back in order to counter hacking attack when you have become a victim? — this has been a long time debate.

While many countries, including the United States, consider hacking back practices as illegal, many security firms and experts believe it as “a terrible idea” and officially “cautions” victims against it, even if they use it as a part of an active defense strategy.

StoneDrill Disk Wiping Malware Found Targeting European Industries

A new disk wiping malware has been uncovered targeting a petroleum company in Europe, which is quite similar to the mysterious disk wiper malware Shamoon that wiped data from 35,000 computers at Saudi Arabia’s national oil company in 2012.

Disk wiping malware has the ability to cripple any organization by permanently wiping out data from all hard drive and external storage on a targeted

Database of 1.4 Billion Records leaked from World’s Biggest Spam Networks

A database of 1.4 billion email addresses combined with real names, IP addresses, and often physical address has been exposed in what appears to be one the largest data breach of this year.

What’s worrisome? There are high chances that you, or at least someone you know, is affected by this latest data breach.
<!– adsense –>
Security researcher Chris Vickery of MacKeeper and Steve Ragan of

Unpatched Python and Java Flaws Let Hackers Bypass Firewall Using FTP Injection

This newly discovered bugs in Java and Python is a big deal today.

The two popular programming languages, Java and Python, contain similar security flaws that can be exploited to send unauthorized emails and bypass any firewall defenses.

And since both the flaws remain unpatched, hackers can take advantage to design potential cyber attack operations against critical networks and

Malware Hijacks Microphones to Spy On Ukrainian Businesses, Scientists and Media

Ukraine has once again been a target of a potential hacking attack that infected computer systems from dozens of Ukrainian businesses with highly sophisticated malware, allowing hackers to exfiltrate sensitive data and eavesdrop on their network.

Late last year, the country also suffered a power outage caused by the same group of hackers that targeted Ukraine’s power grid with the BlackEnergy

President Donald Trump's Website Hacked; Defaced By Iraqi Hacker

During the 2016 presidential election campaign, we reported about how insecure was the mail servers operated by the Trump organization that anyone with little knowledge of computers can expose almost everything about Trump and his campaign.

Now, some unknown hackers calling themselves “Pro_Mast3r” managed to deface an official website associated with President Donald Trump’s presidential

Hackers Are Using Android Malware To Spy On Israeli Military Personnel

A group of highly sophisticated state-sponsored hackers is spying on the Israeli military by hacking into the personal Android phones of individual soldiers to monitor their activities and steal data.

A newly released research by Lookout and Kaspersky suggests that more than 100 Israeli servicemen from the Israeli Defense Force (IDF) are believed to have been targeted with spyware.
<!–

This Ransomware Malware Could Poison Your Water Supply If Not Paid

Ransomware has been around for a few years, but in last two years, it has become an albatross around everyone’s neck, targeting businesses, hospitals, financial institutions and personal computers worldwide and extorting millions of dollars.

Ransomware is a type of malware that infects computers and encrypts their content with strong encryption algorithms, and then demands a ransom to decrypt

New MacOS Malware linked to Russian Hackers Can Steal Passwords & iPhone Backups

Security researchers have discovered a new Mac malware allegedly developed by APT28 Russian cyber espionage group who is believed to be responsible for 2016 presidential election hacking scandal.

A new variant of the X-Agent spyware is now targeting Apple macOS system that has previously been used in cyber attacks against Windows, iOS, Android, and Linux devices.

The malware is designed to