Thursday, April 25, 2024
-Advertisement-
Reimagining Public Sector Analytics
Reimagining Public Sector Analytics

SEARCHED FOR: Ankush Johar

Meme Hack Explained: Hackers use Memes on Twitter to secretly send commands to malware

A new strain of malware has been discovered that takes its instructions from code hidden in memes posted to Twitter and takes screenshots of the infected system, reported researchers at cybersecurity firm Trend Micro.

Facebook bug exposed 6.8 million user’s private photos to app developers

On Friday, the social media firm admitted that it had mistakenly exposed private photos of millions of users without their permission to app developers.

macOS Mojave: Researcher claims to have found new vulnerability

A security researcher has claimed to have found a new vulnerability in the latest version of macOS Mojave.

Mega chrome extension replaced with cryptocurrency-stealing malware

The attacks happened on September 4, 2018, when MEGA Chrome extension was updated to version 3.39.4 on the Google Chrome Web Store.
- Advertisement -

Fortnite V-bucks YouTube scams affect tens of thousands of users with malware

Web-based game-streaming platform Rainway, reported that tens of thousands of Fortnite players that have infected their systems with a piece of malware

Third-party apps can read email of Gmail users just as they can read SMS and call logs

According to a report in Wall Street Journal, Google allows third-party app developers to scan through Gmail accounts.

Chinese Android Malware: Steals chats data from Whatsapp, Facebook Messenger, Skype

Cyber Security researchers have discovered a new strain of Chinese Android Trojan that is customised to steal chats, shared videos, pictures and audio files.

What is GitHub DDoS Attack; here’s all you need to know

Recently, Github was hit by one of the largest DDoS attack ever recorded in history. The DDoS attack lasted only for nine minutes, but the servers were flooded with data volumes reaching almost 2Tbps.
- Advertisement -

Malicious Facebook password stealing apps found on Google Play Store

Hackers did not use any advanced ways to hack into victim’s system. Instead, the hackers used basic social engineering techniques that include sending posts on Facebook groups and WhatsApp messages

Aadhaar face authentication via images captured from a 5MP camera: Will it work?

UIDAI has added an extra layer of security for Aadhaar holders by introducing facial authentication in “fusion” with fingerprints and Iris.
-Advertisement-