Friday, June 30, 2017

Microsoft Introduced a Control Folder Access to Prevent Data From Ransomware and other Malicious Apps and Threats in Windows 10 Insider Release

Microsoft Windows OS facing Many Cyber Attacks in past few Month Especially  Wannacryand Petya caused many damages around the globe. Finally, Microsoft announced  Windows 10 Insider Preview Build 16232 for PC and including Many security  Futures within it.
New Futures including with updates helps to Prevent Browser based Attacks, Exploit Protection, Control Folder Access to Prevent from Malicious Application, unknown threats and especially Ransomware.

Friday, June 23, 2017

CIA Hacking Tool “Brutal Kangaroo” Revealed to Hack Air-Gapped Networks by using USB Thumb Drives -WikiLeaks

Wikileaks Revealed Next CIA Hacking Tool called “Brutal Kangaroo” under Vault 7 Projects that Consists of 4 Powerful Malware Components which targets closed networks by air gapjumping using thumbdrives.
WiliLeaks Vault 7 Project Revealed Few days Before CIA Cyber weapon CherryBlossom which is Specially Developed to compromise the Wireless Network Devices including wireless routers and access points.

Sunday, June 18, 2017

Hackers Steal the Credit Cards Information of Buckle, Inc by Injecting Malware in Their Payment Data Systems

One of the biggest Retailer in US Buckle, Inc under Cyber Attack in their Payment Card Data systems where hacker injects a Malware to steal the Customers Credit card data and company operates 465 stores in 44 U.S .
This Malicious Software was identified Buckle retail store location point-of-sale (POS) system.according to the forensic report, this Malware silently record the customers Credit card information including Account number, account holder’s name, and expiration date.

Friday, June 16, 2017

Wikileaks Revealed New CIA Wireless Hacking Tool “Cherry Blossom” Compromise Your Wireless Network Devices using MITM Attack

Wikileaks Revealed another CIA Cyber weapon called “CherryBlossom” which is Specially Developed to compromise the Wireless Network Devices including wireless routers and access points (APs) by helping of Stanford Research Institute (SRI International).
Wikileaks Vault 7 leads earlier Released Hacking tool was Pandemic, that has the ability to Replaced Target files where remote users use SMB to Download.
CherryBlossom” is capable of performing exploits in software and Monitoring the Internet Activities in the Targeting Victims such as commonly used WIFI Devices in private and public places including small and medium-sized companies as well as enterprise offices.

Sunday, June 11, 2017

All that You Should Know about Bitcoins and its Exchange – A Detailed Overview

Bitcoin is a pure peer-to-peer form of electronic money that would permit the online payments to be sent directly from one party to another without going through a financial organization.

These transactions are validated by network nodes and published in a public shared record called a blockchain.

The blockchain is a distributed database that records bitcoin transactions, maintenance of the blockchain is performed by a network of communicating nodes running bitcoin software system.

SambaCry Vulnerability used by Hackers to attack Linux Servers and Mine’s Cryptocurrency

Linux Machine’s are Hijacked by unknown Vulnerability by using SambaCry Flow and it has cryptocurrency mining utility. This Vulnerability Exploit by using unauthorized Write Permission in Network Drive in Linux Machines.
The Legitimate Text File writes by the attacker which Consists of 8 Random symbols in Samba.Suddenly attacker deletes the file Once Attempt has been successfully done.

Thursday, June 8, 2017

Linux malware that Targets Raspberry Pi for Mining Cryptocurrency

Attackers distributing malicious Trojan that infects only Raspberry Pi Minicomputers. These Trojans have a compressed and encrypted application to generate cryptocurrency.

Named as Linux.MulDrop.1, Linux.ProxyM.

Both of the malicious Trojans are examined by Dr.Web Security researchers.

Linux.MulDrop.14

Distribution started in late of may. Once the malware executed it will change the system password as below and then unpack the cryptocurrency miner.

Tuesday, June 6, 2017

TOP 10 Deep Web Search Engines which Gives Deep information that you Can’t get it in Google and Bing

When we need to search something ,then Google or Bing  will the  first thing hit in mind suddenly. But Google and Bing will not give all the Hidden information which is served under the Deep web.
Google have ability to track your each and every move in the Internet while you are searching via Google .if  you don’t want google to collect your personal informations and your online activities  you should maintain your Anonymity in online.

Read More at GBHackers On Security

Monday, June 5, 2017

Windows Registry Analysis – Tracking Everything You Do on the System

The purpose of this article is to provide you with a depth understanding of the Registry and Wealth of information it holds.Today most administrators and forensic analysts, the registry probably looks like the entrance to a dark.
Besides Configuration information,  the Windows Registry holds information regarding recently accessed files and considerable information about user activities.