الأربعاء، 30 سبتمبر 2015

Google Play Store increases Android APK Size Limit from 50MB to 100MB





Google is doubling the maximum APK file size on the Play Store from 50 MB to 100 MB.


That means...

Android app developers can now build higher quality Apps and Games that users love.

Of course, for an end user it may affect the overall app performance and installation time, as well as mobile data connectivity.


Google Wants Developers to Create Richer Apps



By

KILLER! Unpatched WinRAR Vulnerability Puts 500 Million Users At Risk





Beware Windows Users!



A new dangerous unpatched Zero-day Vulnerability has been detected in the latest version of WinRAR affects over millions of users worldwide.



According to Mohammad Reza Espargham, a security researcher at Vulnerability-Lab, the stable version of WinRAR 5.21 for Windows computers is vulnerable to Remote Code Execution (RCE) flaw.



WinRAR is one of

New Botnet Hunts for Linux — Launching 20 DDoS Attacks/Day at 150Gbps





A network of compromised Linux servers has grown so powerful that it can blow large websites off the Internet by launching crippling Distributed Denial-of-service (DDoS) attacks of over 150 gigabits per second (Gbps).



The distributed denial-of-service network, dubbed XOR DDoS Botnet, targets over 20 websites per day, according to an advisory published by content delivery firm Akamai

Microsoft Chooses Ubuntu Linux for their Cloud-based Azure HDInsight Big Data Solution





Earlier this month, Microsoft surprised us all with the announcement that they built a Linux kernel-based operating system, Azure Cloud Switch (ACS), for developing software products for Network Devices.



Now, Microsoft just announced that they have selected Ubuntu as the operating system for their Cloud-based Big Data services.




Yes, Microsoft needs Linux.




To expand

الثلاثاء، 29 سبتمبر 2015

Breaking: Edward Snowden Joins Twitter & Only Follows ‘NSA’





Whistleblower Edward Snowden just joined Twitter, and his first tweet seems to be directed at the US National Security Agency (NSA).



Yes, the world's most popular whistleblower and data privacy advocate has finally joined Twitter just two hours ago, and his first tweet came, “Can you hear me now?”



Snowden has gained more than 260,000 followers in just less than two hours, but he is

Microsoft Responds To Windows 10 Spying Concerns, But It will Still Collect Your Data





After a number of controversial data mining features and privacy invasions within Microsoft's newest operating system, Microsoft finally broke the ice, almost two months since the launch of Windows 10.



Microsoft has finally responded to the growing privacy concerns around its new operating system to regain the trust of the users who are concerned about their online privacy related to

Pirate Bay co-founder Gottfrid Svartholm, aka Anakata, Released from Prison





Gottfrid Svartholm Warg, the co-founder of the notorious file-sharing website The Pirate Bay, has been released from a Sweden prison following three years behind bars for hacking and copyright offenses.



Yes, Svartholm Warg, also known as Anakata, is a free man again.



Svartholm was convicted on both Swedish copyright offences and Danish hacking conspiracy connected to The Pirate Bay.

الاثنين، 28 سبتمبر 2015

I Support Digital India, But I haven't Changed My Facebook Profile Picture. Here's Why...






DIGITAL INDIA – A Flagship Programme of the Government of India with a vision to transform India into a digitally empowered society as well as a knowledge economy.



Yes, I am a proud Indian, and I support Digital India too, but I am absolutely not supporting Facebook's Internet.org Project.



Yesterday, Facebook's CEO Mark Zuckerberg and Indian Prime Minister Narendra Modi met at

Quantum Teleportation — Scientists Teleported Quantum Data over 60 Miles





We are just one step closer to creating a Harry Potter or ‘Star Trek’-style Transporter.



However, When we talk about Teleportation, we don't typically mean Teleporting any matter from one place to another as in the Science-fiction Movies.



Rather, Teleportation involves capturing the essential information about something — its "quantum state", to recreate it exactly someplace else.



Apple's Biggest Hack Ever: 4000 Malicious iOS Store Apps Linked to CIA?





The First major cyber attack on Apple's App Store has now been linked to CIA (Central Intelligence Agency).



Last week, Researchers disclosed some 39 iOS apps on Apple's App Store infected by 'XCodeGhost Malware'. The Bad News is that the infection has now increased exponentially with the discovery of more than 4,000 infected apps.



The XCodeGhost malware was distributed through

الأربعاء، 23 سبتمبر 2015

5.6 Million Federal Employees' Fingerprints Stolen in OPM Hack





The OPM Data Breach (Office of Personnel Management) is getting even worse than we thought.



We already know more than 21 Million current and former federal employees had their personal and highly sensitive private information hijacked in a massive data breach that affected Defense Department's OPM.



But, now it has been revealed that the hackers have made off a lot more than just names,

Adobe Releases 23 Security Updates for Flash Player





Adobe has released an important security bulletin that addresses a total of 23 Critical vulnerabilities in Adobe Flash Player.



The security fixes for Windows, Linux and Mac users address "critical [flaws] that could potentially allow [attackers] to take control of the affected system," the company warned in an advisory on Monday.



Out of 23 critical flaws, 18 address issues that would

الثلاثاء، 22 سبتمبر 2015

Here's How to Get Facebook New 'Dislike Button' to Your Profile





You may call this a misleading headline. Right?


Yes, it's True. And I apologize for this. But…



...before someone else tricks you to visit any malicious link with intent to hijack your Computer or to Hack Facebook Profile, I just tricked you to visit this 'WARNING' article about Facebook Scam of the Dislike button.




Facebook Scam: Get Facebook Dislike Button

Facebook users are being

Here's What Facebook 'Dislike or Empathy Button' Would Look Like





A Facebook Dislike button is one of the most frequently requested features from users for years.



Earlier in the last week, Facebook finally confirmed its plans to add a Dislike or Empathy to your Facebook Profile and News Feed.



If you are thinking that Facebook Dislike is going to be a thumbs-down button, then you are dead wrong.




Why Not Thumbs-Down? Because:




… The Dislike

My Government Doesn't Understand How Encryption and Cyber Security Work





Almost every day or every second day, When I come across various announcements in Newspaper, TV News Channels, and Press releases that...



...Indian Government and related Policy-making organizations are going to set up their so-called "CyberSecurity Task Forces" or drafted a "National Cyber Security Policies," with an aim to boost cyber security in India…



The first thing that comes to

Deleting WhatsApp Messages Before 90 Days Could Land you in Jail





While the Indian people continue to struggle for Net Neutrality, a new problem surrounded them with the release of the latest policy for ‘National Encryption Policy’ by the Indian Government.



If you delete your WhatsApp Messages or Emails that you receive or send before 90 days, it might be a crime and you can End-up In Jail.



If the new National Encryption Policy

iOS 9 Hack: How to Access Private Photos and Contacts Without a Passcode





Setting a passcode on your iPhone is the first line of defense to help prevent other people from accessing your device.



However, it's pretty easy for anyone to access your personal photographs and contacts from your iPhone running iOS 9 in just 30 seconds or less, even with a passcode and/or Touch ID enabled.


Just yesterday, the Security firm Zerodium announced a Huge Bug Bounty of 1

الاثنين، 21 سبتمبر 2015

'Bitcoin is Now Officially a Commodity' — US Regulator Declared





Bitcoins are making their way, in Bits and Pieces.



In a recent report The Hacker News (THN) had mentioned about banks adopting the Blockchain Technology from Bitcoins; to create a safe and secure distributed ledger.



Now, last week U.S. Commodity Future Trading Commission (CFTC), has added Bitcoins and other virtual currencies to the commodities basket which previously includes Gold,

WIN $1 Million Bounty For Hacking the New iOS 9 iPhone





Good news for Hackers and Bug hunters!



You can now WIN 1 Million Dollars for finding zero-day hacks for iPhones and iPads.



Yes, $1,000,000.00 Reward



This Huge Bug Bounty is offered by the new Security firm Zerodium, a startup of the infamous French-based Security firm "VUPEN", who is well known for buying and selling zero-day vulnerabilities.



Zerodium, which

Warning! Popular Apple Store Apps Infected with Data-Theft Malware





Unlike Google Play Store, Apple App Store is well known for not allowing any malformed apps to enter its Apple ecosystem because of its tight security checks.



But, not anymore.



Hundreds of malicious apps managed to get hosted on Apple's official App store and subsequently downloaded by several hundred Million iPad and iPhone owners. Out of them, Palo Alto Networks published a list of

Aw, Snap! This 16-Character String Can Crash Your Google Chrome





Remember when it took only 13 characters to crash Chrome browser instantly? This time, it takes 16-character simple URL string of text to crash Google Chrome instantly.



Yes, you can crash the latest version of Chrome browser with just a simple tiny URL.



To do this, all you need to do is follow one of these tricks:



Type a 16-character link and hit enter
Click on a 16-character link

السبت، 19 سبتمبر 2015

With Its First Android app, Apple tried to Kill Android Community, But Failed Badly!





Are you a Die Hard Android Fan?



If you are also one of those millions Android fans, for whom the brand has turned into an insane religious devotion, then Apple has something that could give you second thoughts.




Apple is losing control, wants you to ditch your Android!



Few days ago, Apple made its debut on Google Play Store with its First App, called “Move to iOS”,

AVG Antivirus Plans to Collect & Sell Your Personal Data to Advertisers





We at The Hacker News are big fans of Security Software – The first thing we install while setting our Computers and Devices.

Thanks to Free Security Software that protects Internet users without paying for their security.



But, Remember: Nothing comes for FREE



"Free" is just a relative term, as one of the world's most popular anti-virus companies is now admitting.



When a 'Hacker News' Reader Tricked Me into visiting this Amazing Site (Don't Click at Work)





My usual bed routine is to check comments under my articles before I go to sleep. The same I was doing last night, but something weird happened to me.



Someone posted a mysterious short link without any text below one of my articles on our official 'The Hacker News' Facebook Page, and with the curiosity to check that link I visited that website. And what I saw…



One by one

Is This Security-Focused Linux Kernel Really UnHackable?





Can you name which Operating System is most Secure?




...Windows, Mac, Linux or any particular Linux Distribution?



Yes, we get that! It’s not an easy thing to pick.



Besides Windows, Even the so-called ultra-secure Linux Distros were found to be vulnerable to various critical flaws in past years.



Because, almost all Linux Distros use the same Kernel, and the most number of cyber

Google to Disable Weak SSLv3 and RC4 Protocols to Boost Internet Security

It is finally time to say GoodBye to the old and insecure Web security protocols.
Citing the long history of weaknesses in the Secure Sockets Layer (SSL) 3.0 cryptographic protocol and the RC4 Cipher Suite, Google plans to disable support for both SSLv3 as well as RC4 stream cipher in its front-end servers.
While announcing on its official blog, the Search Engine giant said the

الجمعة، 18 سبتمبر 2015

D-Link Accidentally Publishes Its Private Code-Signing Keys on the Internet





It's not every time malware creators have to steal or buy a valid code-signing certificate to sign their malware – Sometimes the manufacturers unknowingly provide themselves.



This is what exactly done by a Taiwan-based networking equipment manufacturer D-Link, which accidently published its Private code signing keys inside the company's open source firmware packages.



Thousands of Hacked WordPress Sites Abused to Infect Millions of Visitors





A Large number of WordPress websites were compromised in last two weeks with a new malware campaign spotted in the wild.



WordPress, a Free and Open source content management system (CMS) and blogging tool, has been once again targeted by hackers at large scale.



Researchers at Sucuri Labs have detected a “Malware Campaign” with an aim of getting access to as many devices they can by

Microsoft has Built its own Linux Operating System





Sit Tight on your seats, because you're gonna get a Shock.




Microsoft has developed an Operating System powered by LINUX.




Close your mouth first. It’s True!



Microsoft has built its own Linux-based operating system called Azure Cloud Switch (ACS) and believe me, under Satya Nadella, Microsoft has become more open than ever.



According to the announcement made

Beware Coffee Lovers! StarBucks Exposed you to 3 Critical Vulnerabilities





Ever registered on StarBucks website? Change your passwords now!



If you are one of those Millions Starbucks customers who have registered their accounts and credit card details on StarBucks website, then your banking details are vulnerable to hackers.



An Independent Security Researcher, Mohamed M. Fouad from Egypt, has found three critical vulnerabilities on StarBucks website that could

Researchers to Develop Long-Lasting Solid-State Batteries



Whenever you go to Buy any Electronic Gadget — Phone, Tablet, Laptop, Watch — the most important specification isn’t its processor speed or its camera quality. It’s how long the device’s battery backup is.



Imagine easy access to such batteries that provide more battery power after charging it once, do not give up in less time and have a life of many years.





To achieve this, the

New Bug in Bugzilla Software Could Expose Zero-Day Vulnerabilities





A Critical vulnerability discovered in Mozilla's popular Bugzilla bug-tracking software, used by hundreds of thousands of prominent software organizations, could potentially expose details of their non-public security vulnerabilities to the Hackers.



So it’s time for developers and organizations that use Bugzilla open source bug tracking system to upgrade to the latest patched versions –

الخميس، 17 سبتمبر 2015

For Better Privacy & Security, Change these iOS 9 Settings Immediately





iOS 9 is out, and it's time to update your iPhone or iPad to the latest version of Apple's mobile operating system.



The new iOS is better, faster, and more efficient than its predecessors, with a number of new features and improvements including enhanced multitasking for iPad, Proactive Assistant Siri, new Low Power mode, Transit directions in Maps and many more.



You need to download

World's 9 Biggest Banks to adopt Bitcoin's Blockchain Technology





The Existing Infrastructure used by Financial institutions like Banks is Archaic, Slow, and Costly, with hardly any innovation in the past three decades.



Nine of the World’s renowned Banks, including JPMorgan, Royal Bank of Scotland, Goldman Sachs and Barclays, are collaborating with New York-based financial tech firm R3 to create a new framework based on Bitcoin’s Blockchain.



Yes, they

​SYNful Knock: Backdoor Malware Found in Cisco Routers





Mandiant, a FireEye sister concern has been involved in researches related to cyber defense.



In their recent findings, a backdoor malware named SYNful Knock identified as the one compromising the principles of Cisco routers with features such as...



...Having an everlasting effect, i.e. Serious Persistence.



What?- The malicious program is implanted in the router

How to Detect IE Zero-day Exploit Used to Deploy Korplug Malware





Recently, Microsoft issued an Emergency patch for a zero-day vulnerability in Internet Explorer that is being exploited to deploy Korplug malware on vulnerable PCs.



Korplug, a known variant of PlugX, is a Trojan that creates a backdoor used for information stealing on infected computers.



In one of the most publicized cases, an evangelical church in Hong Kong was compromised to deliver

الأربعاء، 16 سبتمبر 2015

AirDrop Bug in Apple iOS and OSX allows Hackers to Install Malware Silently





With the launch of iOS 9, Apple gave us an ultimate reason to upgrade our Apple devices to its new operating system.



The latest iOS 9 includes a security update for a nasty bug that could be exploited to take full control of your iPhone or Macs, forcing most of the Apple users to download the latest update.



Australian security researcher Mark Dowd has disclosed a serious vulnerability

This Computer Chip Self-Destructs in 10 Seconds (On Command) to keep Secrets Safe





The Secret Messages are often designed to be destroyed without a trace.



In Spy thriller movie “Mission Impossible”, every time Tom Cruise receives a secret message, the last words state - “This Tape message will self-destruct in 5 seconds”...and BOOM!



There’s a sudden explosion, and smoke comes out of the device; containing sensitive information few seconds ago.



This Self-destructing

Hacker Finds a Simple Way to Bypass Android 5.x Lock Screen [Steps & Video]





A Security researcher and hacker, named John Gordon, has found an easy way to bypass the security of locked smartphones running Android 5.0 and 5.1 (Build LMY48M).



Many of us use various security locks on our devices like Pattern lock, PIN lock and Password lock in order to protect the privacy of our devices.



However, a vulnerability could now allow anyone to take your Android

Let's Encrypt Project issues its First Free SSL/TLS Certificate







Last fall the non-profit foundation EFF (Electronic Frontier Foundation) launched an initiative called Let's Encrypt that aimed at providing Free Digital Cryptographic Certificates (TLS) to any website that needs them.



Today, Let's Encrypt – a free automated Open-source Certificate Authority (CA) – has signed its first certificate, hitting what it calls a major milestone to encrypt all

Facebook to Add a 'Dislike' Button, Mark Zuckerberg Confirms





When a pet dies, or your friend's family member passed away, clicking the 'Like' button to express your sympathy doesn't feel comfortable.



Here a user feels a need of something to express their sadness, disagreement, anger, or something other than 'Like': Facebook should have an empathetic "Dislike" button - or something similar.



Is Facebook really thinking about adding a dislike button

الاثنين، 14 سبتمبر 2015

THN Weekly Roundup — 15 Most Popular Cyber Security and Hacking News Stories





We are once again here with our weekly round up based on last week’s top cyber security threats and challenges.



I recommend you to read the entire thing (just click ‘Read More’ because there’s some valuable advice in there as well).



Here’s the list:


1. Reminder! If You have not yet, Turn Off Windows 10 Keylogger Now



Microsoft is very powerful in tracking every single word you type

السبت، 12 سبتمبر 2015

These Top 30 Ashley Madison Passwords are just as Terrible as You'd Think





Yes, you heard it correct!



First the Password Cracking Team 'CynoSure Prime' cracked more than 11 Million Ashley Madison’s passwords in just 10 days (quite an achievement, though), now a member of the team shares the same list of passwords with few calculations.




The calculations are...

...What passwords are mostly used and by how many users? Terrible?



Out of 11

Apple Boosts iOS 9 Security with improved Two-Factor Authentication





Apple iOS 9, codenamed Monarch, will be available to the world on September 16th.



While most of the upgrades on iOS 9 focus on making devices:



Faster
Smarter
Secure
and more efficient.


Today we are going to discuss the improved Two-Factor Authentication (2FA) pumped within the new iOS operating system.



WHAT'S NEW AND HOW IT WORKS



Apple has strengthened the foundation of iOS 9

LockerPin Ransomware Resets PIN and Permanently Locks Your SmartPhones





Your device's lock screen PIN is believed to keep your phone's contents safe from others, but sadly not from a new piece of ransomware that is capable of hijacking safety of your Android devices.



A group of security researchers has uncovered what is believed to be the first real example of malware that is capable to reset the PIN code on a device and permanently lock the owner out of their

Here's How to Stop Windows 7 or 8 from Downloading Windows 10 Automatically





Yesterday we reported you that Microsoft is auto-downloading Windows 10 installation files — between 3.5GB and 6GB — onto users' PCs even if they have not opted into the upgrade.



Microsoft plans to deploy Windows 10 on over 1 Billion devices worldwide, and this auto-downloading Windows 10 could be one of its many strategies to achieve its goal.



The company has dropped and saved a hidden

الجمعة، 11 سبتمبر 2015

Microsoft is Auto-Downloading Windows 10 to PCs, Even If You Don't Want it







Microsoft wholeheartedly wants you to upgrade to Windows 10. So much that even if you have not opted-in for Windows 10 upgrade, you will get it the other way.



Surprised?



If you have Windows Update enabled on your PCs running Windows 7 or Windows 8.1, you’ll notice a large file — between 3.5GB and 6GB — mysteriously been downloaded to your computer in the background.



The huge file

Android Stagefright Exploit Code Released





Zimperium Mobile Security Labs (zLabs) have been working hard to make Android operating system more safe and secure to use.



Zimperium team has publicly released the CVE-2015-1538 Stagefright Exploit, demonstrating the process of Remote Code Execution (RCE) by an attacker.



The released exploit is a python code creating an MP4 exploiting the ‘stsc’ vulnerability dubbed Stagefright.


Now, today Samsung has again taken the technology a step further with the launch of 12GB LPDDR4 (low power, double data rate 4) DRAM Chip that will offer 6GB RAM for the

Techie Police Officer Builds a Sniffing Tool to Track Stolen Devices (based on War-Driving)





Ever wonder, How can you Track your Stolen Smartphone, Laptop or any Smart Device?



...With IMEI Number?

...Or IP address?

...Or may be some special types of equipment?



Well, Not required, because now it is possible to track stolen devices just by scanning their MAC addresses.



Yes, Just MAC addresses, which is assigned to each device on a unique basis by the IEEE, but crooks can

Microsoft Releases 12 Security Updates (5 Critical and 7 Important Patches)





With the release of 12 Security Bulletins, Microsoft addresses a total of 56 vulnerabilities in its different products. The bulletins include five critical updates, out of which two address vulnerabilities in all versions of Windows.



The September Patch Tuesday update (released on second Tuesday of each month) makes a total of 105 Security Bulletins being released this year; which is more

200 Million WhatsApp Users Vulnerable to vCard Vulnerability





WhatsApp recently claimed to have hit 900 Million monthly active users, but a dangerous security flaw in the web version of the popular instant messaging app puts up to 200 Million of its users at risk.



Yes, the web-based extension of WhatsApp is vulnerable to an exploit that could allow hackers to trick users into downloading malware on their computers in a new and more sophisticated way.

الثلاثاء، 8 سبتمبر 2015

Contactless Fingerprint Scanner That Can Capture Your Prints from Meters Away

Until today, there existed such Fingerprint Biometric Readers that required your touch to authenticate yourself as an authorized person.
However, the latest research shows that the future of fingerprint scanners lies in a "no-touch" activity by an individual for gaining access.
Recently, NIST (National Institute of Standards and Technology) has funded a number of startup and companies to develop

Reminder! If You Haven't yet, Turn Off Windows 10 Keylogger Now





Do you know? Microsoft has the power to track every single word you type or say to its digital assistant Cortana while using its newest operating system, Windows 10.



Last fall, we reported about a 'keylogger' that Microsoft openly put into its Windows 10 Technical Preview saying the company 'may collect voice information' as well as 'typed characters.'



It was thought that the company

This Creepy App Captures Users' Private Moment Photos and Blackmails for Money





How difficult is for hackers to take over your personal photographs?



They just need to trick you to download an app, or may be a Porn app.



Yes, if you are one of those who can't resist watching porn then you could be an easy target for hackers who are distributing ransomware via malicious pornography app to run you out of your money.



A pornography application for Android called

These Top 7 Brutal Cyber Attacks Prove 'No One is Immune to Hacking' — Part I





If you believe that your organization is not at real risk of cyber attack, then you are absolutely wrong.

Incidents of massive data breaches, advanced cyber attacks coming from China, groups like Syrian Electronic Army, Hacking Point of Sale machines at retailers such as Target have splashed across the news in the last one year.

Whether a Government Agency or Private Company, Small or a

These Top 7 Brutal Cyber Attacks Prove 'No One is Immune to Hacking' — Part II





In Part I of this two-part series from The Hacker News, the First Four list of Top Brutal Cyber Attacks shows that whoever you are, Security can never be perfect.



As attackers employ innovative hacking techniques and zero-day exploits, the demand for increased threat protection grows.



In this article, I have listed another three cyber attacks, as following:



#5 Car Hacking



Driving

الاثنين، 7 سبتمبر 2015

Warning! Seagate Wireless Hard Drives Have a Secret Backdoor for Hackers





Several of Seagate's 3rd generation Wireless Hard drives have a secret backdoor for hackers that puts users' data at risk.



A Recent study done by the security researchers at Tangible Security firm disclosed an “undocumented Telnet services” with a hard-coded password in Seagate Wireless Hard Drives.



The secret Telnet Vulnerability (CVE-2015-2874) with an inbuilt user account (default

After 5 Years, Now Google Ready to Comply with China's Censorship Laws for Business





Google is planning to introduce a trimmed down special version of Google Play Store and Android Wear to The Mainland China.



But wait, if I’m not wrong…



Google had ended ties with China five years ago. Then what made Google to re-establish itself in China once again? Business??



Recent reports by Amir Efrati at The Information state that Google has massive plans to re-establish itself

Ashley Madison's Company Secretly Running Online Escort Services — Leaked Documents Reveal





Yes, you heard right.



Ashley Madison’s parent company Avid Life Media was secretly running an Online Escort Service, recently leaked documents revealed.



Avid Life Media was allegedly actively recruiting escorts for a separate online "dating" website, aiming at "sugar daddies".



Ashley Madison with tagline 'Life is short. Have an affair' made headlines over a month ago

China Police Arrest 15,000 Suspects for Alleged Cyber Crimes





China Police has arrested nearly 15,000 people on suspicion of cyber crimes as part of an operation dubbed "Cleaning the Internet," according to reports.



According to the Chinese Ministry of Public Security (MPS), the suspects have been arrested for their involvement in cyber crimes that "jeopardized Internet security."



In July, China launched a six-month campaign codenamed "Cleaning

How to Remove KeyRaider Malware that Hacked Over 225,000 iOS Devices





Jailbreaking your device may have got you the best of apps but after reading this you will know what a high price you could have to pay for the jailbreak.



Read on…



A malware named ‘KeyRaider’ has supposedly stolen user credentials of approximately 225K iPhone users. It has been given this name as it raids victims’ username and passwords, private keys and certificates.



Figures say

THN Weekly Roundup — Top 14 Must-Read Cyber Security Stories





We found a high concern for cybersecurity tactics and an increased awareness of the challenges that it brings.



This week, we shared lots of stories with our readers, and to help them in identifying the biggest malware threats to their online safety.



We are here with the outline of our last week stories, just in case you missed any of them (ICYMI).



We recommend you read the entire

السبت، 5 سبتمبر 2015

Apple to build Fuel Cell Battery that Could Power iPhones and Macbooks for Weeks





Nothing could be scarier than that little battery icon in our smart hits the red. All our focus shifts towards searching the nearest charging outlet – and it happens all too often.



Yes, the short battery life is the worst thing about our smartphones. It forces us to always carry chargers and battery banks, as well as continually chase plugs walls.



But don't worry; Apple is looking to

الجمعة، 4 سبتمبر 2015

Twitter Open Sources 'Diffy' that Automatically Catches Potential Bugs in Code





After, Facebook open sourced Thrift Technology (an internally used tool by Facebook) in 2007, rival entity Twitter brings Diffy, an internal Twitter service to the world.



Yesterday, Twitter introduced "Diffy," an open source tool, acting as a helping hand for the software developers to catch bugs, test and compare results without writing much code.



Diffy plays a vital part in Twitter's

How to Fix Chrome Massive Memory Usage? Simply Try 'Chrome 45' for Faster Performance





Rejoice Chrome users!



Google has made major improvements to its Chrome web browser that would once again make it one of the least memory eater browsers in the market.



Although Chrome is used by hundreds of millions of people worldwide due to its simplicity and power, most people aren't happy with it because it uses too much memory and power.



Google has now solved these problems. The

Caution! Hackers Can Easily Hijack Popular Baby Monitors to Watch Your Kids





Several video baby monitors from six different manufacturers were under scrutiny for in-depth security testing, and the outcome was negative.



Yes, they lacked in serving basic security through their devices.



At the High Technology Crime Investigation Association (HTCIA) conference on September 2, 2015, a critical security research was made public by Rapid7 after following a disclosure

Meet World's Fastest Wi-Fi Router (Looks Like an Alien)





In above picture, Have you noticed those numerous crazy spikes?



The Device looks like an Alien artifact, which is actually the World's fastest wireless Wi-Fi router for the Game of Thrones generation.



Unveiled at IFA 2015, Asus has launched its uniquely designed RT-AC5300 Wi-Fi router, which they said would offer the fastest connection speed ever.



Asus RT-AC5300 Wi-Fi

New Rules Require FBI to Get Warrant for Spying With ‘Stingrays’ Cell Phone Trackers





Remember StingRays?



The controversial cell phone spying tool, known as "Stingrays" or "IMSI catchers," has been used by authorities to track criminal suspects most of the times without obtaining court orders.



But now, the Federal law agencies will have to be more transparent about their use of Stingrays to spy on cell phones. Thanks to the new policy announced Thursday by the US

الخميس، 3 سبتمبر 2015

Popular Belkin Wi-Fi Routers vulnerable to Hackers





US-CERT has outlined about Wireless routers developed by Belkin supposedly containing several vulnerabilities.



CERT in their Vulnerability Note VU#201168 (Vulnerability ID) said, that Belkin’s N600 DB Wireless Dual-Band N+ Router, model F9K1102 v2 with firmware version 2.10.17 and very likely earlier versions are packed with multiple and critical vulnerabilities.



The targeted router is

26 Android Phone Models Shipped with Pre-Installed Spyware





Bought a brand new Android Smartphone? Don't expect it to be a clean slate.



A new report claims that some rogue retailers are selling brand-new Android smartphones loaded with pre-installed software.



Security firm G Data has uncovered more than two dozens of Android smartphones from popular smartphone manufacturers — including Xiaomi, Huawei and Lenovo — that have pre-installed spyware

Using Android 'AppLock' to Protect Your Privacy? — It's Useless






Widely popular Android AppLock application by DoMobile Ltd. is claimed to be vulnerable to Hackers.



AppLock Android app enables users to apply a security layer to their devices, which locks and hides the SMS, Gallery, Gmail, Facebook, Calls and any app installed on the device.



Few of its features are:



Protecting apps either in a PIN number form or a pattern lock

Critical OS X Flaw Grants Mac Keychain Access to Malware





Back in July, a security researcher disclosed a zero-day vulnerability in Mac OS X that allowed attackers to obtain unrestricted root user privileges with the help of code that even fits in a tweet.



The same vulnerability has now been upgraded to again infect Mac OS X machines even after Apple fixed the issue last month.



The privilege-escalation bug was once used to circumvent security

الأربعاء، 2 سبتمبر 2015

FBI’s Cyber Task Force Identifies Stealthy FF-RATs used in Cyber Attack





In both April and June this year, a series of cyber attacks was conducted against the United States Office of Personnel Management (OPM).



These attacks resulted in 21 million current and former Federal government employees’ information being stolen.



After months of investigation, the FBI’s Cyber Task Force identified several Remote Access Tools (RATs) that were used to carry out the

الثلاثاء، 1 سبتمبر 2015

Just Like Windows 10, Windows 7 and 8 Also Spy on You – Here’s How to Stop Them

No plan to install Windows 10 due to Microsoft's controversial data mining and privacy invasions within the operating system?
Well, Windows 7 and Windows 8 OS users should also be worried as Windows 10 spying is now headed their way too…
Microsoft has been caught installing latest updates onto Windows 7 and Windows 8 computers that effectively introduce the same data collecting and user behavior