News wrap on trending cyber-attacks;  Empinel, Samsung Gear S3,Banks,

April 7, 2017

Cyber crime is only likely to increase, despite the best efforts of government agencies and cyber security experts. Its growth is being driven by the expanding number of services available online and the increasing sophistication of cyber criminals who are engaged in a cat-and-mouse game with security experts. With the right level of preparation and specialist external assistance, it is possible to control damages, and recover from a cyber breach and its consequences.

An Indian developer is playing around with an open source ransomware builder, which in the long run may end up causing serious problems for innocent users. This developer, who goes by the nickname of Empinel and claims to be based in Mumbai, has forked the open source code of the EDA2 project, and with the help of another user, has removed the backdoor hidden in EDA2’s original code.

Read More

The software that powers the Samsung Gear S3 Frontier has been likened to a “hackers’ dream”, following the shocking revelation from Israeli researcher Amihai Neiderman that the Tizen operating system was “the worst code” he had seen. Samsung Gear S3 Frontier owners might be feeling a little nervous this morning, following a keynote address by Israeli researcher Amihai Neiderman. Mr Neiderman has skewered Samsung‘s TizenOS, which powers the Gear S3 Frontier and a slew of other smart devices – including televisions and smartphones.

Read More

The traditional model of hacking a bank isn’t so different from the old-fashioned method of robbing one. Thieves get in, get the goods, and get out. But one enterprising group of hackers targeting a Brazilian bank seems to have taken a more comprehensive and devious approach: One weekend afternoon, they rerouted all of the bank’s online customers to perfectly reconstructed fakes of the bank’s properties, where the marks obediently handed over their account information.

Read More

With a newly developed toolsuite that can analyze Android apps and detect whether two or more of them can collude with each other to acquire information that they would otherwise not be capable of obtaining, a group of researchers has shed some light on an existing capability that could easily become a big problem in the future.

Read More

Pin It

Comments (0)
» Blog, Uncategorized » News wrap on trending cyber-attacks;...
On April 7, 2017
By

Leave a Reply

Your email address will not be published. Required fields are marked *

« »