SUCEFUL – A new Malware capable of copying data from ATM cards

A new kind of malware named SUCEFUL capable of stealing information from ATM cards and capable of retaining them in the ATM machines has been detected by FireEye Labs. The malware has been uploaded on VirusTotal and the researchers at FireEyes Labs traced it as Backdoor.ATM.Suceful. It seems that the name of the virus is […]
Share Button
Continue reading →

Blue Termite – An APT with sophisticated Cyber Espionage campaign targeting Japan

An Advanced Persistent Threat termed Blue Termite has targeted several Japanese companies since November 2013. Antivirus major Kaspersky Lab started working on the APT in the month of October 2014. Although the instance is not unprecedented, it is the first time that an APT has targeted Japanese companies that have their Client to Server (C2S) […]
Share Button
Continue reading →

Stagefright Security patch leaves more than 950 million Android devices vulnerable hacked by a text- CVE-2015-3824

Stagefright Security patch leaves more than 950 million devices vulnerable hacked by a text The Stagefright vulnerability allows attacker to hack a phone with a text. Wiki (CVE-2015-3824) The patch issued by Google for Stagefright doesn’t fix the vulnerability leaving more than 95% of the Android devices vulnerable. The Android devices running version 2.2 to […]
Share Button
Continue reading →

Chevrolet Corvette can be hacked by using a text message via tracking dongle( insurance dongle)

  Researchers from University of California, San Diego have demonstrated to hack Corvette by sending specially crafted SMS messages to a tracking dongle plugged to the car’s OBD-II (On-Board Diagnostics port). In a youtube video ( below) demonstrating the exploit, the researchers operated the windshield wipers,  applied and deactivated the brakes at lower speeds. ( Dongle is a […]
Share Button
Continue reading →

Android serialization vulnerability (CVE-2015-3825) gives super user status to a underprivileged user

IBM researchers have identified that more than 55% of Android users appeared to have impacted with Android serialization vulnerability – CVE-2015-3825.  This basically means Android versions 4.3 and newer are vulnerable to this vulnerability. An advanced attackers could exploit this vulnerability to give a malicious app with no or least privileges the ability to become a super […]
Share Button
Continue reading →

Android’s Certifi-Gate remote access securit vulnerability exploited in the wild – Checkpoint

Last week Check Point discovered Certifi-Gate-based vulnerability which could take complete control of Android devices. This serious security vulnerability has made millions of Android devices vulnerable and are open in the wild.The mRTS plugin allows malicious applications to gain  privileged access rights, even if your device is not rooted . The vulnerability is in the authorization […]
Share Button
Continue reading →

Android Bug can trap your phone to Endless Reboot – CVE-2015-3823

Android McAfee Researchers from McAfee have discovered a new vulnerability that can allow an attacker to perform DoS attack on Android media-server program. When the malicious app is set to restart, this can trap the Android device in a loop making the device unusable. This can drain all the battery as well. This affects Android 4.0.1 Jelly […]
Share Button
Continue reading →

Remote Code Execution vulnerability on Google store allows Hackers to remotely install malware apps on your Android Device

Researchers from Metaspolit have discovered a major flow on devices running Android 4.3 (Jelly Bean) & prior versions that no longer receive official security updates from Android security team for WebView. Webview is one of core component for Google store. Attackers can easily install the malware app and perform malicious actions. Due to a lack […]
Share Button
Continue reading →

Adware found in Google play Apps infects Milions of Android Users

Malware on Android is not new anymore but this time adware has taken over Google play with approx 10 million  downloads. Avast researchers have identified three apps that might have millions of downloads. The  apps identified are “Durak card game app”, “IQ Test” app and “Russian History” app from three different developers performing the same […]
Share Button
Continue reading →

24 Million Home Routers Expose ISPs to Massive DNS-Based DDoS amplification attacks.

Researchers from nominum identified a massive set of of  DNS-based DDoS amplification attacks have significantly increased in the recent months, targeting vulnerable home routers globally. ( A DNS amplification attack is a reflection-based distributed denial of service (DDos) attack )                   Home routers are the easiest vector of attack because […]
Share Button
Continue reading →