Saturday, December 31, 2016

Clash of Clans banned in Iran for promoting violence and tribal conflict


Earlier this week The Ministry of Justice in Iran blocked Clash of Clans because psychologists in the country believe the game promotes violence and what they are describing as ‘tribal conflict’.

They also state that, among other findings, that the game negatively affects family life for youth, who psychologists believe are addicted to playing. I reported earlier this year that close to two-thirds of mobile gamers in Iran played the game.

Read More at GBHackers On Security

Clash of Clans banned in Iran for promoting violence and tribal conflict

Cyber Security Firm Checkpoint Software Found Two New Ransomware Families And Built Their Decryptors


Attacks are more successful when effective countermeasures are not in place.  Security firms are consistently developing and releasing anti-ransomware applications and decryption tools in response to the threat.
Checkpoint found that ransomware attacks are surging, with their Global Threat Index showing that the number of ransomware attacks using Locky and Cryptowall increased by 10%. Read More at GBHackers On Security

Cyber Security Firm Checkpoint Software Found Two New Ransomware Families And Built Their Decryptors

Top 5 hackers Groups that made the Invisible Internet as a Background


Internet surfaced as the new and boundless battleground in 2016. The previous year has seen a standout among the most wrecking cyberattacks that influenced a wide assortment of worldwide divisions, including budgetary, geopolitical and innovation ranges.
The previous year saw the rise of a few beforehand obscure, world-class programmer masses, whose battles have wreaked destruction internationally and brought on widescale freeze among the tech group.

Friday, December 30, 2016

Clash of Clans banned in Iran for promoting violence and tribal conflict

Earlier this week The Ministry of Justice in Iran blocked Clash of Clans because psychologists in the country believe the game promotes violence and what they are describing as ‘tribal conflict’.

They also state that, among other findings, that the game negatively affects family life for youth, who psychologists believe are addicted to playing.

 I reported earlier this year that close to two-thirds of mobile gamers in Iran played the game.

Readmore at GBhackers On Security

Clash of Clans banned in Iran for promoting violence and tribal conflict

These were the biggest Cyber Attacks of the year 2016

This was the year when many historical hacks came back to bite millions just as they were least expecting it.This year many cyber attacks took place which caused almost 3,000 publicly data breaches, exposing more than 2.2 billion records. And the year isn’t even over yet.
Let’s take a look back at some of the biggest — and most dangerous — hacks and leaks so far.

For more click :GBHackers

BHIM Mobile payment App Launched – Your Thumb Is Your Bank

Prime Minister Narendra Modi on Friday launched BHIM App for Android and IOS at Digi Dhan Mela held in NewDelhi to Encourage Digital transactions in India.
Moneycontrol was the first one to test app on a oneplus phone, after setting the passcode, the interface did not move forward. Though it worked fine in Mi4i device.

Read More at GBHackers on Security

BHIM Mobile payment App Launched – Your Thumb Is Your Bank

Thursday, December 29, 2016

Snapdeal to home-deliver Reliance Jio SIM cards

Still awaiting to get hold of a Jio SIM card? Snapdeal has an offer for you. The e-commerce site will now home-deliver Reliance Jio SIM cards. The offer is valid for select customers.
Snapdeal, in a statement, revealed the company will choose their premium customer base and send out an e-mail to them for the offer. Users who get the mail from Snapdeal can click on the given link to enter their details and set up time at which they want the SIM to be delivered to them.

Read More at GBHackers On Security

Snapdeal to home-deliver Reliance Jio SIM cards


Switcher – Android Malware Seize Routers’s DNS Settings

Switcher – Android Malware Seize Routers’s DNS Settings: A new Android Trojan was identified by malware researchers at Kaspersky Lab’s.
This trojan is bit special instead of attacking the user, it attacks the wireless router that user is connected to and execute a DNS Robbery attack.

Malware AndroidOS Switcher, carry out a brute force attack on the router’s admin panel if the attacks succeeded then the malware can change the IP address of the DNS servers in the router.

Read more at GBHackers On Security

Switcher – Android Malware Seize Routers’s DNS Settings

Wednesday, December 28, 2016

Encrypt and password protect your Gmail message in a click

Email Encryption is the process of Encoding messages or information in such a way that only authorized parties can able to access it.
In an encryption scheme, the intended information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted.

Read more at GBHackers On Security

Encrypt and password protect your Gmail message in a click

Pakistani Cyber Attackers Hacked Thiruvananthapuram airport Website

Pakistani Cyber Attackers Hacked Thiruvananthapuram airport Website www.trivandrumairport.com.
Cyber security officials who were investigating the matter have managed to restore the site briefly after it was hacked by a group called the Kashmir Cheetah.

A message on the website read, ‘Mess with the Best’ read a message from a group called the Pakistan Cyber Attackers. The message on the websites read, “Website stamped by Kashmiri Cheetah.”

Read more at GBHackers On Security

Pakistani Cyber Attackers Hacked Thiruvananthapuram airport Website

Avatar-style Giant robot takes first steps in South Korea

A giant South Korean-built manned robot that walks like a human has taken its first baby steps.
Designed by a veteran of science fiction blockbusters, the four-metre-tall (13-foot), 1.5 ton Method-2 towers over a room on the outskirts of Seoul.

The hulking human-like creation bears a striking resemblance to the military robots starring in the movie “Avatar”.

Read More at GBHackers On Security

Avatar-style Giant robot takes first steps in South Korea

Growth in Artificial intelligence Makes It Easy to Fake Images and Video

Growth in Artificial intelligence Makes It Easy to Fake Images, Audio, and Video, AI researchers have been successfully in creating 3D face models from still 2D images.
Generating sound effects from the silent video, and even mapping the facial expressions of actors onto other people in videos.

Smile Vector a Twitter bot that can make any celebrity smile. It scrapes the web for pictures of faces, and then it morphs their expressions using a deep-learning-powered neural network.

Read more at GBHackers on Security

Growth in Artificial intelligence Makes It Easy to Fake Images and Video

Tuesday, December 27, 2016

Ukrainian Artillery Tracked Using Android Malware implant By Russian Hackers

A hacking group from Russia used a malware implant on Android devices to track and target Ukrainian artillery units from late 2014 through 2016, according to a new report released Thursday.
The malware was able to retrieve communications and some locational data from infected devices, intelligence that would have likely been used to strike against the artillery in support of pro-Russian separatists fighting in eastern Ukraine, the report from cyber security firm CrowdStrike found. Read more on : GBHackers on Security

Monday, December 26, 2016

Hacked Sony account spreads false news – “RIP @britneyspears”

Britney Jean Spears (born December 2, 1981) is an American singer, dancer and actress. Born in McComb, Mississippi, and raised in Kentwood, Louisiana, she performed acting roles in stage productions and television shows as a child before signing with Jive Records in 1997.
Today a hacked Sony account spreads false news –  “RIP @britneyspears”  Readmore GBHackers On Security

Evolution of TLS1.3 – Enhanced security and speed

Evolution of TLS1.3 – Enhanced security and speed: As 2016 comes to close and we are preparing for a new year, it’s time to implement TLS 1.3.The biggest practical development in cryptography for 2016 is Transport Layer Security version 1.3. TLS is the most important and widely used cryptographic protocol and it is the backbone of secure Internet communication. Read More on GBHackers

Evolution of TLS1.3 – Enhanced security and speed

Sunday, December 25, 2016

Operating Systems can be detected using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, which used to find the Availability of a host on an Internet Protocol (IP) network.
Ping operates by sending Internet Control Message Protocol (ICMP) Echo Request packets to the target host and waiting for an ICMP Echo Reply. Read more on GBHackers.

Operating Systems can be detected using Ping Command


New Aadhaar Payment App launch for Digital Payments : Here’s how it works

The government has been working on an ‘Aadhaar Payment App‘ to do away with plastic card and point of sales machines (POS) that seem to have done little in times of demonetization.December keeping in mind a faster adoption of a cashless society and to eradicate fee payments charged by card companies, making it an affordable digital payment solution for merchants in rural areas. Read more on GBHackers

New Aadhaar Payment App launch for Digital Payments : Here’s how it works 

Friday, December 23, 2016

Performing an Idle Zombie Scan Nmap

Idle Zombie Scan Nmap: Nmap is a TCP port Scan method used to send a spoofed source address to a computer to find out what services are available and offers blind scanning of a remote host.

This is accomplished by impersonating another computer.No packet is send from own IP address, instead another host used called as Zombie.READ MORE ON GBHACKERS


Performing an Idle Zombie Scan Nmap

DDoS attack prevention method on your enterprise’s systems – A Detailed Report

A distributed denial-of-service (DDoS) attack aims to exhaust the resources of a network, application or service so that genuine users cannot gain access.
There are different types of DDoS attacks, but in general a DDoS assault is launched simultaneously from multiple different hosts and can affect the availability of even the largest enterprises’ internet services and resources. Read more on GBHackers

No more ransom adds immense power to globe against Ransomware Battle


We are at the end of 2016, hope everyone aware of Ransomware and it’s impact on business.One reason that ransomware is so effective is that the cybersecurity field is not entirely prepared for its resurgence.
Attacks are more successful when effective countermeasures are not in place.  Security firms are consistently developing and releasing anti-ransomware applications and decryption tools in response to the threat.Read More on GBHackers

No more ransom adds immense power to globe against Ransomware Battle

WhatsApp group admin can’t be held liable for member’s post: Delhi HC

The Delhi High Court has ruled out the all administrators of WhatsApp groups can’t be held or made liable for defamatory statements by any other member of the group.
In a significant ruling, Justice Rajiv Sahai Endlaw, while dismissing a defamation case, said, “I am unable to understand as to how the administrator of a group can be held liable for defamation, even if any, by the statements made by a member of the group.”
Read more on GBHackers 

WhatsApp group admin can’t be held liable for member’s post: Delhi HC

Global Leading Cyber Security Firm “Comodo Threat Research Labs” warned Be aware from “Airtel broadband Malware”

Cyber Security firm Comodo Threat Research Labs Discovered new Airtel Broadband Malware which mainly Spreading via Email Attachment with fake invoice with the subject of “Re:”  pretending to come from unknown sender of “airtelbroadband.in (or random senders)”  with a malicious zip attachment having “.JS” inside which works as Trojan downloader.

Comodo Researcher’s Said ,This malware has send to the victims by spoofed and masked send email address like Catalina@airtelbroadband.in. Mainly Attackers use email addresses and subjects that will scare or entice a user to read the email and open the attachment. Read more on gbhackers .

Global Leading Cyber Security Firm “Comodo Threat Research Labs” warned Be aware from “Airtel broadband Malware”

Facebook Open Source Review For Year 2016: Christine Abernathy


As we about bid farewell to year 2016 and start a fresh year 2017 ahead, Facebook has published its Facebook Open Source 2016 year in review.
In 2016, Facebook has launched 77 new projects, and contributors have made over 60,000 commits. With nearly 400 projects and more than 500,000 followers across its entire portfolio, Facebook is committed to maintaining the stability and quality of our projects, and to supporting the communities that have grown around them. To read more 

Facebook Open Source Review For Year 2016: Christine Abernathy

DDOS a website anonymously by using kali linux

DDOS tools are capable of putting heavy loads on HTTP servers and bring them to their knees by exhausting it’s resources.
 type of attack where Multiple compromised systems attacking a single target, which denies access to the service of target system’s legitimate user’s.
In this tutorial we are to discuss about the carried in performing DDOS attack from Kali Linux. TO read more.

DDOS a website anonymously by using kali linux

New Linux/Rakos, malware threatening devices and servers under SSH scan

New linux Malware, dubbed Linux/Rakos is threatening devices and servers.The malware is written in the Go language and the binary is usually compressed with the standard  UPX tool.

Linux/Rakos performed via brute force attempts at SSH logins, in a similar way to that in which many Linux worms operate, including Linux/Moose (which spread by attacking Telnet logins) For more details .

The new Linux/Rakos, malware threatening devices and servers under SSH scan



WordPress Plugin copy-me vulnerable to CSRF

WordPress Plugin copy-me vulnerable to CSRF, which allows unauthenticated attacker to copy posts.
WordPress is web software you can use to create a beautiful website, blog, or app. We like to say that WordPress is both free and priceless at the same time.


Version 4.7 of WordPress, named “Vaughan” in honor of legendary jazz vocalist Sarah “Sassy” Vaughan, is available for download or update in your WordPress dashboard. New features in 4.7 help you get your site set up the way you want it. For more details.

WordPress Plugin copy-me vulnerable to CSRF


According to researchers at White Ops who uncovered the ad fraud, cyber crime group has been earning as much as $3 million to $5 million daily by generating up to 300 million fraudulent video-ad impressions per day.For more details

Cyber Criminal’s Earn $5 Million Daily By Fraudulent Video Ad “Methbot”- A Shocking Report