The ITAR (International Traffic in Arms Regulations) legislation details what measures businesses and individuals must take to comply with ITAR requirements and specifies severe penalties, both civil and criminal, for non-compliance. The reach…
MalwareTech Arrested Because Creating Kronos Banking Trojan
MalwareTech — the security researcher who stopped the WannaCry ransomware outbreak — was arrested in Las Vegas on accusations of creating the Kronos banking trojan together with another person.
The arrest — first reported by Motherboard — took place…
FBI Arrests Researcher Who Found ‘Kill-Switch’ to Stop Wannacry Ransomware
The 22-year-old British security researcher who gained fame for discovering the “kill switch” that stopped the outbreak of the WannaCry ransomware—has been reportedly arrested in the United States after attending the Def Con hacking conference in Las…
WannaCry Inspires Banking Trojan to Add Self-Spreading Ability
Although the wave of WannaCry and Petya ransomware has now been slowed down, money-motivated hackers and cyber criminals have taken lessons from the global outbreaks to make their malware more powerful.
Security researchers have now discovered at le…
Dangerous Mobile Banking Trojan Gets ‘Keylogger’ to Steal Everything
Cyber criminals are becoming more adept, innovative, and stealthy with each passing day. They have now shifted from traditional to more clandestine techniques that come with limitless attack vectors and are harder to detect.
Security researche…
HBO Hacked – Upcoming Game of Thrones Episodes and Data Leaked
If you are a fan of Game of Thrones here is a shocking news for you – Home Box Office (HBO), has joined the list of media giant who suffered data breaches. In HBO’s case, hackers have leaked unreleased and upcoming episodes and scripts of groundbreak…
Apple has removed all major VPN apps from Chinese App Store
China is well known for its online censorship and surveillance tactics, but earlier today news broke that Apple has removed all virtual private network (VPN) apps from App Store in China. This means Apple users in China can not avail online anonymit…
3 New CIA-developed Hacking Tools For MacOS & Linux Exposed
WikiLeaks has just published a new set of classified documents linked to another CIA project, dubbed ‘Imperial,’ which reveals details of at least three CIA-developed hacking tools and implants designed to target computers running Apple Mac OS X and…
Hackers can take over Car Wash, trap you and smash your vehicle
It is understandable to receive Internet of Things (IoT) related warnings like vulnerable public WiFi or charging spots that can be hacked but a drive-through car wash? Well, it turns out Internet connected car washes or smart car washes can be hacke…
How Hackers Cash Out Thousands of Bitcoins Received in Ransomware Attacks
Digital currencies have emerged as a favourite tool for hackers and cyber criminals, as digital currency transactions are nearly anonymous, allowing cyber criminals to use it in underground markets for illegal trading, and to receive thousands of dol…