Bashbug Casualty Hackers Exploit Shellshock To Breach Yahoo Lycos And Winzip Servers

Yahoo, Lycos and Winzip hacked through Shellshock vulnerabilityJonathan HallWhat is #BashBug aka ShellshockWinZipYahoo and Lycos Jonathan Hall The blog report was filed by Jonathan Hall who was once a self-confessed black hat hacker. Now he has turned into a full time dedicated white hat researcher cum, engineer cum consultant. He stated that ever since the revelation of the existence of the Shellshock bug, he has been researching the possibilities of its exploitation but gave up after a while and started concentrating on hackers who might be using the vulnerability to exploit it in the wild....

December 12, 2022 · 6 min · 1068 words · Kathy Gustafson

Best Ways To Backup Your Android Smartphone And Iphone Techworm

Here’s a few reasons to consider a cloud storage as your primary backup option. Anywhere Access The reason smartphones have gained so much popularity has its capability to let the user use it on the go. With the boom of 3G & 4G technologies, we have been accustomed to having access to any information at any time we please. So why not have access to our backups the same way ?...

December 12, 2022 · 4 min · 822 words · Lisbeth Zweier

Bitcoin Jumps Above The 20 000 Mark For The First Time

This year Bitcoin has gained more than 170% as larger investors seek it for its purported inflation-resistant qualities. Further, there are also other reasons that can help increase the cryptocurrency prices even higher. These factors include growing institutional demand, increasing perception among investors that Bitcoin is a digital store of value and an alternative to gold, stronger network fundamentals, potential for quick gains, and expectations that the cryptocurrency will become a mainstream payment method “In December 2017, data suggested that retail and mainstream investors were behind the Bitcoin rally....

December 12, 2022 · 2 min · 396 words · Jesse Hargrave

Bittorrent Client Utorrent To Soon Start Charging Users For Torrent Downloads

uTorrent is a client for loading .torrent files and BitTorrent software, which is used to download and share large files, music and movies online. When the client first launched, the software was extremely small, clean and easy to use. However, as the popularity of BitTorrent technology increased, the list of uTorrent users also began to increase. With currently over 170 million users on its books, the uTorrent team had to create a revenue model that would keep the development of the client running....

December 12, 2022 · 2 min · 398 words · Tiffany Griffin

Black Hat And Def Con Security Conferences Go Virtual Due To Covid 19

Sadly, due to the pandemic, these two conferences will no longer be in-person and have been moved to an all-virtual event. Earlier, the Black Hat and Def Con conferences were scheduled to take place in Las Vegas back to back in the first two weeks of August 2020, with Black Hat from August 1 to August 6, and with DEF CON from August 7 to August 9. What Are Black Hat And DEF CON Security Conferences?...

December 12, 2022 · 2 min · 366 words · Brian Good

Blackberry Announces Dtek50 Android Smartphone The Worlds Most Secure Phone Techworm

The DTEK50, or ‘the world’s most secure Android smartphone’ as Blackberry claims to be features a 5.2-inch FHD 1920 x 1080 scratch-resistant display, 3GB of RAM, and 16GB of internal storage (added microSD card support). It will sport Snapdragon 617 SoC 8 Cortex-A53 processing cores running at a speed of 1.5GHz that would provide adequate processing power. It will also be powered by a 2,610mAh battery with support for Quick Charge 2....

December 12, 2022 · 2 min · 283 words · Scott Nixon

Brave Browser Leaves Behind History Even After Clearing It

Brave browser has been caught by a user leaving traces of history, as reported by a user on Github, and later someone posted it on Reddit. What is the issue at hand? When a user clears his/her history from the Brave browser, it seems to leave some traces behind the Top Visited sites. What is the issue at hand?How to Fix the Issue? Not their First Rodeo with Controversies....

December 12, 2022 · 2 min · 345 words · Carl Ives

Bulgarian Hacker Accused Of Stealing Thousands Of Dollars From Bill Gates Arrested In Philippines

Presidential Anti-Organized Crime Commission Executive Director Reginald Villasanta said they coordinated with the Philippine National Police Criminal Investigation and Detection Group for the arrest of Konstantin Simeonov Kavrakov. Villasanta said that they nabbed the suspect at the PS Bank branch at the corner of Scout Reyes Street in Barangay Paligsahan, Q.C. He was trying to withdraw money using counterfeit ATM cards around 9 p.ml. Following arrest, they recovered nine pPS Bank Quezon Avenue ATM branch receipts and P76,570 in different denominations that the suspect withdrew from the bank’s ATM....

December 12, 2022 · 2 min · 232 words · Collette Nelson

Cache Query Load Injection On Google Israel Founded By Mauritania Attacker Team Anonghost Techworm

the exploit was found here: https://groups.google.co.il/groups?hl=iw&q=FuCk-Israhell-ANONGHOST-Was-Here%2F Mirror: https://www.aljyyosh.org/mirror.php?id=72659 At the time of writing the Article the exploit was still Persesting, and visible. Also Read: Twitter home of exploits, exploits founded by AnonGhost

December 12, 2022 · 1 min · 32 words · Nora Brown

Canadian Border Police Arrests A Man For Refusing To Give His Apple Iphone Pass Code

Alain Philippon who is Quebec resident, believes his cell phone is personal. So when Canadian border agents wanted to search it, he says no. What happens next? Well, he gets arrested. Alain Philippon who is a Canadian national had arrived at Halifax Stanfield International Airport in Canada from Dominican Republic and was stopped by border agents. The border agents wanted to access his smartphone, Philippon refused to give them the passcode and he was promptly arrested....

December 12, 2022 · 2 min · 404 words · Eva Lecky

China Reveals Its Secret Cyber Army And Special Units To Raise Cyber War

Officially, China has always maintained that it does not sponsor or support any form of hacking. These denials however came to naught when a latest update in top security military document mentions the existence of such cyber warfare units in China. The updated The Science of Military Strategy which is a top level military document and an authoritative analysis of China’s military thinking, includes references to China’s cyber-warfare units. The Science of Military Strategy which was first published in Chinese in 2001 and translated into English in 2007 has been giving meaningful insights into the workings of the largest army in the world....

December 12, 2022 · 2 min · 258 words · Stephanie Alley

Chinese Hackers Gains Access To Data On U S Federal Employees Techworm

One senior official said that the attack was traced back to china, however it is still not clear if it was planned by the Chinese government.Cyber Espionage is not new while China can point to the Snowden documents revealing the U.S. spying on Huawei. in may, the Justice Department charged five members of a Chinese military group for carrying economical cyber espionage against US businesses.

December 12, 2022 · 1 min · 65 words · Richard Infante

Cosmicstrand Malware Found In Asus Gigabyte Motherboards

For the unversed, UEFI (Unified Extensible Firmware Interface) firmware is tasked with booting up Windows computers, including the loading of the operating system, even before any security measures of the system. As a result, malware that has been placed in the UEFI firmware image is particularly hard to detect which makes it difficult to remove it by performing a clean reinstall of the operating system or even by replacing the storage drive....

December 12, 2022 · 3 min · 598 words · Virginia Hernandez

Critical Vulnerability In Tor Puts Users Anonymity At Risk

An estimated 2.5 million people—including journalists, political activists, terrorists and even consumers who don’t want to share their browsing histories with Facebook or other commercial entities—use Tor daily. And that is why the network is of keen interest not only to “repressive” regimes like Russia and Iran but to governments a lot closer to home, including our own. Not to put too fine a point on this, but one person’s activist could be another person’s terrorist, but I digress....

December 12, 2022 · 6 min · 1162 words · Peter Hood

Developers Turn To Crimeware And Release Droidjack Rat After Their Android App Failed

Developers turn to crimeware and release DroidJack RAT after their Android App failed to take offLegitimate rootsIndian Roots TracedCapabilitiesOther Cases Legitimate roots Researchers at Symantec have been monitoring the evolution of the threat, which was first released in April 2013 on Google Play as Sandroid, a legitimate application for controlling PCs from an Android smartphone. But the App apparently did not catch the fancy of Android users and faded into obscurity....

December 12, 2022 · 4 min · 674 words · Thomas Smith

Elon Musk S New Company Neuralink Wants To Connect Our Brains To Computers Techworm

Tesla and SpaceX founder Elon Musk has launched a new neuroscience company called “Neuralink Corp.”, which seeks to merge computers with human brains, the Wall Street Journal reported, citing people familiar with the matter. The ultimate goal to use this technology is to enhance memory function and provide more direct interaction between human and computer interfaces or give humans added artificial intelligence. The new company is focusing on what Musk calls “neural lace” technology, wherein tiny electrodes would be implanted into the brain which in turn would manage functions like memory, with the eventual possibility of uploading and downloading thoughts....

December 12, 2022 · 2 min · 327 words · George Ahr

Facebook Launches Watch Party To All Groups Around The World

Facebook had been testing the ‘Watch Party’ feature for almost six months now and the company has plans to release the feature sometime in the future, which could see it compete against Google’s YouTube in the video streaming sector. “Watch Party is a new way for people to watch videos on Facebook together in real time. Once a Watch Party is started, participants can watch videos, live or recorded, and interact with one another around them in the same moment....

December 12, 2022 · 2 min · 365 words · Olga Day

Facebook Messenger May Have Public Chat Room Features Soon Techworm

TechCrunch has found mentions of public chats within Messenger’s code, which includes a logo and a description of the service. The hidden code reads, “Rooms are for public conversations about topics and interests. Each room has a link that can be shared so anyone on Messenger can join the conversation.” TechCrunch also reported that some of its readers were able to launch a chat room with both friends and strangers, with an admin screen showing some features currently unavailable on regular group messages....

December 12, 2022 · 2 min · 226 words · Tiffany Mcnamara

Facebook S Co Founder Chris Hughes Calls For Break Up Of The Company

In an opinion piece in The New York Times on Thursday, Hughes, who co-founded Facebook along with his Harvard roommate Mark Zuckerberg some 15 years ago, called Zuckerberg’s power “unprecedented and un-American.” “Mark is a good, kind person,” Hughes says, “but his focus on growth “led him to sacrifice security and civility for clicks”. He also commented on Zuckerberg’s power within the company as the majority of the Facebook shares owned by him meant that there’s no internal check on his power....

December 12, 2022 · 3 min · 527 words · Francisca Cornwell

Fcc Net Neutrality Rules Total 400 Pages To Bring Fairness To The Internet

Two weeks after the FCC voted to approve them in a historic, polarized vote at the commission they finally published the rules. You can expect that the ISPs (Internet Service Providers) will now go through the publication with a fine-tooth comb, probing the rules for legal weaknesses they can take to court to exploit what they can. The crux of the rules of the FCC’s net neutrality order seeks to prevent Internet providers from blocking Web traffic, slowing it down or setting up paid fast lanes for customers that pay more and not disadvantage customers that don’t pay as much....

December 12, 2022 · 1 min · 191 words · Franklin Schmidt