Skip to main content

Posts

Showing posts from 2019
How To Hackers Compromise your  Instagram Account Hackers gain targets high profile or social media influences Instagram accounts with phishing links and gain access to the accounts before the influences even know what’s happening.Based on the Trend Micro’s report the hackers target the Instagram profiles that have followers between 15,000 and 70,000 were hacked and targets range from famous actors and singers to owners of startup businesses like photo shoot equipment rentals. The attack starts from the Phishing Email which is appears to be from Instagram asking the victim to verify the account to get the Verified badge on the Instagram profile.If the victim clicks on the Verify Account button then it go to the victim to the phishing page that asks for the following user details such as date of birth, email, and credentials. "Once you submitted your credentials, a badge notification appears, but for only four seconds. This is a trick to give users the impressio...
Vulnerability In Xiaomi Electric Scooters Allows Attackers to Access The Machine Electric scooters have proved to be a comfortable form of travel for few over short distances. Security researchers have highlighted other problem. As founded, Xiaomi electric scooters bear serious vulnerabilities. Exploiting the vulnerability could allow an attacker to remotely hack the scooters and execute commands, such as sudden breaks. A researcher Rani Idan from Zimperium has found a serious vulnerability in Xiaomi electric scooters. As per his findings, the vulnerability could allow an attacker to take access of the machine. A successful remote access could then result in sudden breaking or acceleration. “According  our research, we determined the password is not being used properly as part of the authentication process with the scooter and that all commands can be executed without the password.” Precisely, the scooters doesn't  track of the authentication state as...
Some Malicious Applications In Microsoft Store Eight crypto jacking applications found on the Microsoft Store they abuses victim’s CPU cycle to mine Moreno without user knowledge. Symantec detected the malicious applications on Microsoft Store disguised as the applications for computer and battery optimization tutorial, internet search, web browsers, and video viewing and download. These malicious applications got listed for top free applications list on the Microsoft Store, As soon as the applications are downloaded and launched they use to fetch the coin-mining JavaScript by triggering the Google Tag Manager. Malicious Applications Names Below 1) Fast-Search Lite 2) Battery Optimizer 3) VPN Browser Plus 4) Downloader for YouTube Videos 5) Clean Master plus 6) FastTube  7) Findoo Browser 2019 8) Findoo Mobile & Desktop Search Google Tag Manager created by Google to track and analyze the HTML and JavaScript tags used ...

Chrome API Update Remove ADS Blocker With Other Extension

Chrome API Update Remove ADS Blocker With Other Extension Google has announced making some changes in their Chrome API that threatens user privacy. As per its planned API update, it will restrict ad blockers. In fact, the upcoming Chrome API update will not only limit ad blockers, but may also kill numerous other plugins and extensions.previous year, Google publicly shared its plan regarding some changes in the Chrome API. This Chrome API update plan revealed changes in Chrome Extensions platform that would kill ad blockers. Precisely, the changes referred to restricting various extensions’ abilities. According to Google, the changes aim at providing better security, privacy, and performance. “In Manifest V3, we will strive to limit the blocking version of web Request, potentially removing blocking options from most activity.  Content blockers should instead use demonstrativeness.The latest demonstrativeness API will be used as the primary content-blocking API in exten...

Web Applications And Mobile Applications Compromised Your Privacy Policy Of Your Personal Information

A privacy approach is a declaration that reveals many of the processes a party collects, uses, reveal, and manages a customer or client’s information. period of time we install applications in mobile or sign up for social network and dating websites etc.We never read the privacy approach, fairly we Click " I AGREE" and Install Applications. Let me read out many Interesting facts about Mobile Applications to Dating websites privacy policy that user forgets to read.  Required Privacy approach issue, latest Facebook admitted that Cambridge Analytica may have got 37 Million More Facebook Users information through with previous 50 Million pretentious Facebook users.   Location Information that permits us to regularly control your location,  counting your location relative to and within third-party retailer locations, so its suggested to turn off your locations if applications are not in the range.gather of device usage of information, operating system detail...

Dangerous Mobile apps

Dangerous Mobile apps The Following Applications Are chinese applications which are use your personal informations or data and sell it or miss use of your personal informations.Follow the applications list. 1. Weibo 2. WeChat 3. SHAREit 4. UC News 5. UC Browser 6. BeautyPlus 7. NewsDog 8. VivaVideo-QU Video Inc 9. Parallel Space 10. APUS Browser 11. Perfect Corp 12. Virus Cleaner (High Security Lab) 13. CM Browser 14. Mi Community 15. CacheClear DU apps studio 16. DU Battery Saver 17. DU Cleaner 18. DU Privacy 19. 360 Security 20. DU Browser 21. Clean Master - Cheetah Mobile 22. Baidu Translate 23. Baidu Map 24. Wonder Camera 25. ES File Explorer 26. Photo Wonder 27. QQ International 28. QQ Music 29. QQ Mail 30. QQ Player 31. QQ NewsFeed 32. WeSync 33. QQ Security Center 34. SelfieCity 35. Mail Master 36. Mi Video call-Xiaomi 37. QQ launcher This type of applications extrct your informations or miss use of your informations. When you install...
" New Android Trojan Steals Photos, Contacts, Recording Of SMS and Phone Calls "                                                                       Android Tojan Recently Discovered two new  Android RAT  Compromising Victims Mobile and steals various sensitive informations such as  Photos, Contacts, SMS and it can also record the user’s phone call conversations. Both types have the same functionality in terms of stealing the sensitive data from victims and the researchers named this as  KevDroid . One Types of this  Android RAT  using the Android exploit (CVE-2015-3636) to gain the root access from the compromised victims mobile/cell phones. Researchers believe that  EST Security discovered an Android malware that there could be a link betwe...

Keep Eyes Open

Take Care About Pre-Installed Malware In Mobile Devices. The latest study states that a forthcoming mobile device may come with " pre-installed mobile malware"  along with the malicious code in it. Pre-installed malware means that the mobile device already installed with malicious code in the system level that cannot be removed easily. There are two types of pre-installed malware that is based on the location of the app which is one of the important aspects of the apps.   1 ./system/app/:– The apps which is posted in this location something that you are  repeatedly using such as, camera, FM, video player and photo viewers. 2. /system/priv-app/:– This is very important app location and most of the important apps such as settings and system UI, which contain the functionality for the back/home buttons on Android devices reside in it.   Mobile Malware  Researchers analyzed the code of this malware and confirmed that the known pre-ins...
Skimming code steal credit card information of payment from E-commerce websites Many of E-commerce sites infected with the malicious skimming code that steals the customer payment card information from checkout pages. The malicious code found inserted with the number of e-commerce websites providing various services such as ticketing, touring, flight booking services and shopping cart sites.As stated in the researcher analysis report, 250 and many more e-commerce sites found injected with the malicious skimming codes. With further analysis, researchers observed that e-commerce websites are not directly compromised. The skimming codes are injected complete the third-party JavaScript library provided by the French online advertising company Adverline. This grant the website that embedded with third-party libraries to load the skimming code.Unequal other online skimmer groups that directly compromise their target’s shopping cart platforms, Magic art Groups 5 and 12 at...

How to secure your personal information and financial information

"How to secure your personal information and financial information"   "One of the largest fears when it comes to our precious finances is that they might be taken from us when we least expect it. This fear has rapidly moved from having physical cash stolen to having our entire digital information footprint snatched from us. But, while this is a very real worry, there are ways to help possible cyber crime to protect our user information when conducting business online." 1) Password Encryption Technic. One of the easiest ways of protecting your user information when doing business online – yet also one of the most overlooked – is proper password encryption. Using one password across the board has been shown to increase the likelihood of cyber crime, while a strong password should also feature encryption as well as a strong combination of characters. If you are conducting financial business online, make sure that the site you use – whether it be ...