tag:blogger.com,1999:blog-33859983007161766632024-03-10T08:15:51.259+05:30Hackers Chronicle - Online Cyber Security NewsLatest Cyber Security News, Hacking Tutorials, Linux Tutorials, Newscyb3r.gladiat0rhttp://www.blogger.com/profile/05122125366641803109noreply@blogger.comBlogger160125tag:blogger.com,1999:blog-3385998300716176663.post-80001717698126282932020-04-22T13:05:00.000+05:302020-04-22T13:05:41.789+05:30How did Coronavirus starts and what animals came into Coronavirus
How did Coronavirus starts and what animals came into Coronavirus
To find out how the deadly corona virus reached humans from animals efforts are going on.In a region of China, a bats, while hovering in the sky, released the residue of the coronavirus through its droppings which fell on the ground in the forest. A wild animal, possibly a pangolin, smelled it and through it it spread to the The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-53039254043948215112019-05-01T11:05:00.003+05:302019-05-01T11:05:43.304+05:30Facebook is Going To Start Dating Service: Secret Crush
Facebook announced at its F8 conference today a new feature to its Dating repertoire, this one apparently designed to help single minglers poach potential paramours from their Friends by adding them to an ostensibly private list of people you’re crushing on.
Here’s how this is supposed to go down: You add up to nine people to a “Secret Crush” list. After you do, those nine people will The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-9937009162341565562019-04-30T10:10:00.000+05:302019-04-30T10:10:23.642+05:30Microsoft Outlook Breach Targeting Cryptocurrency Users
Earlier this month, news broke out that hackers were not only able to access Outlook users’ email metadata as previously reported, but also email content. The breach centered around a hacker getting hold of a Microsoft customer support worker’s login credentials; from there, the hacker could dive into the content of any non-corporate Outlook, Hotmail, or MSN account, Motherboard found.Now, The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-17913699423022259682019-04-29T11:12:00.000+05:302019-04-29T11:12:26.446+05:30Multi-Stage Malware Loader Hits Europeans via Signed Malspam
Multiple malicious spam campaigns using signed emails have been observed while distributing the GootKit (aka talalpek or Xswkit) banking Trojan with the help of a multi-stage malware loader dubbed JasperLoader over the past few months.
This loader is the third one detected by Cisco Talos' research team since July 2018, with Smoke Loader (aka Dofoil) being employed by threat actors to drop The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-12056825354130315852019-04-27T10:32:00.000+05:302019-04-27T10:32:14.270+05:30Stop What You’re Doing and Google ‘Thanos’
Avengers: Endgame is smashing box office records, collecting more than $60 million yesterday alone.
And while the internet is going over Endgame, we’re just over here trying to finish out the work week so we can slide into a theater for a peek at the film. We are the kind of people who believes in first day first say but sadly we don not get any ticket as early as Sunday night. Needless to The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-72570189612309711742019-04-26T11:36:00.000+05:302019-04-26T11:43:14.424+05:30Avengers: Endgame Leaked Online in China
Marvel’s latest and perhaps the most anticipated movie ever to be released Avengers: End Game has become an object of controversy lately as hackers and cybercriminals are trying their best to benefit from the movie’s widespread, intense hype.
Last week, Marvel fans were requested to not use social media after a video made via mobile phone containing movie spoilers was posted online. Now The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-6197440725026743842019-04-25T10:24:00.000+05:302019-04-25T10:42:28.585+05:30Password Expiry rules are useless: Microsoft
Ever had to change your password for no reason? Before, it was annoying. Now, it's useless.
Microsoft has admitted that one of the great curses of our time, the password reset rule, is nonsense.
"When humans are assigned or forced to create passwords that are hard to remember, too often they'll write them down where others can see them," Microsoft's Aaron Margosis wrote in a blog The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-61420191679585519752019-04-24T13:07:00.001+05:302019-04-24T13:12:43.866+05:30Bodybuilding.com confirms Data Breach
Bodybuilding.com, the internet's biggest online store and online forum for fitness and bodybuilding enthusiasts, has disclosed last week a security breach that impacted its IT systems.
Customer data might have been exposed, the company said in a short message posted on its website. Its staff isn't sure if the attacker accessed customer data, though.
A third-party security firm was hired to The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-21987239247641962552019-04-23T13:18:00.003+05:302019-04-23T13:18:48.992+05:302 Million Wi-Fi Passwords Leaked
Wi-Fi Hotspot Finder Spills 2 Million Passwords Online
A popular hotspot finder app for Android exposed the Wi-Fi network passwords for more than two million networks.The app, downloaded by thousands of users, allowed anyone to search for Wi-Fi networks in their nearby area. The app allows the user to upload Wi-Fi network passwords from their devices to its database for others to use.That The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-50374559924699397002019-04-15T10:15:00.003+05:302019-04-15T10:15:45.018+05:30Personal Data of FBI Agents leaked
hackers leak personal data of fbi agent
Three websites belonging to the Federal Bureau of Investigation’s (FBI) National Academy Association (FBINAA) were hacked apparently by three hackers after they managed to breach their security, steal and upload data online.
Part of the uploaded content was dozens of documents containing personal information of federal agents and law enforcement cyb3r.gladiat0rhttp://www.blogger.com/profile/05122125366641803109noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-74985786663668917512018-04-06T09:30:00.000+05:302018-04-06T13:40:06.685+05:30Voting Machine firewall details and passwords leaked online
A sysadmin at a number one mechanical device vendor denote a firewall configuration file, as well as passwords, into a public Cisco support forum in 2011, gap the corporate up to attainable attack.
The config files expose a wealth of knowledge helpful to Associate in Nursing wrongdoer, as well as the name, hostname, and ASA version range. whereas there's no proof that the mechanical device The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-72178995260663401502018-04-03T10:38:00.000+05:302018-04-03T13:09:58.629+05:30Under Armour Fitness App MyFitnessPal data breached affecting 150 million users
Under Armour, Inc. last week announced that it is notifying users of MyFitnessPal - the company's food and nutrition application and website - about a massive data breach affecting 150 million users. But according to the comapny sources, Payment card data was not compromised because it is collected and processed separately.
A massive data breach on March 29 that impacted 150 The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-5479629041433541832018-03-29T10:00:00.001+05:302018-03-29T12:12:54.644+05:30Ecuador disabled Wikileaks founder Julian Assange's Internet Access
The founder of WikiLeaks has been offline for a few hours after Ecuador suspended his internet access. WikiLeaks’ founder Julian Assange can’t connect to the internet anymore.
On Wednesday, Ecuador’s government posted a statement on Twitter saying it cut Assange’s internet access for sending out messages meddling with other countries’ affairs. The message, posted in Spanish, said Assange The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-16845880314344339502018-03-28T10:00:00.001+05:302018-03-28T13:19:00.335+05:30Intel CPUs Vulnerable To New Spectre-Like Attack, BranchScope
Security researchers have discovered a new wave of attacks called BranchScope. Yet we're not done with the Meltdown and Spectre security flaws that put billions of devices at risk of attacks.
BranchScope : It's a new side-channel attack discovered by four security researchers from College of William and Mary, Carnegie Mellon University in Qatar, University of California Riverside, and The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-10807015898171452332018-03-27T11:04:00.000+05:302018-03-27T14:34:22.844+05:30Source Code of Tools used by Cambridge Analytica to hijack Facebook accounts leaked
AggregateIQ – a Canadian political advertising firm that played a role in the 2016 US election and the UK's "Vote Leave" Brexit campaign – left its applications and database credentials publicly accessible, security firm Upguard said on Monday.
There's no evidence that the exposed code or data was taken. Nor is there evidence it wasn't. It was simply left accessible to the public for an The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-12092902227724830632018-03-23T10:00:00.000+05:302018-03-23T14:05:30.320+05:30MongoDB Hacked in 13 seconds demanding for ransom
The hackers have been exploiting unprotected MongoDB for the last couple of years, based servers to steal data and hold the exposed databases for ransom. In order to raise awareness, hackers leaked 36 million records of internal data collected from several vulnerable servers.
The IT security researchers from German firm Kromtech conducted an experiment in which they purposely left a MongoDBThe Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-21376037081551704622018-03-22T10:00:00.000+05:302019-03-09T18:15:05.370+05:3018.5 Million Websites Infected With MalwareOn the internet, there are more than 1.86 billion websites. Around 1% of these -- something like 18,500,000 -- are infected with malware at a given time each week; while the average website is attacked 44 times every day.
Sitelock has published its Q4 2017 Website Security Insider analysis of malware and websites based on statistics from 6 million of its 12 million customers. All these customersThe Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-63623690662294711052018-03-21T10:00:00.000+05:302018-03-21T11:31:31.100+05:30Data Breach at Orbitz exposed 880,000 credit cards
Travel website Orbitz, a subsidiary of Expedia Inc. disclosed Tuesday a security breach that may have exposed data for thousands of customers, including information on 8,80,000 credit cards.
The Expedia-owned travel website operator said the breach affected an older website and the platform of an unnamed business partner. The information attackers “likely accessed” included people’s names, The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-64569100090486200402018-03-20T09:30:00.000+05:302018-03-20T12:59:23.593+05:30Intel processors will use hardware-based protections against Meltdown and Spectre 2
Intel has officially pushed out microcode updates with Spectre and Meltdown mitigations for all of the processors it launched in the past five years.
In addition to this, the company’s CEO announced new, redesigned processor lines that will start shipping later this year and will include hardware-based protection for Meltdown (exploiting CVE-2017-5754, a rogue cata cache load flaw) and The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-27196148320550793862018-03-19T10:30:00.000+05:302018-03-19T12:25:47.323+05:30Russia Linked hacking group Sofacy APT attacking European Government Agencies
Last week the US Government announced sanctions against five Russian entities and 19 individuals, including the FSB, the military intelligence agency GRU.
Despite the sanctions, Russian hackers continue to target entities worldwide, including US organizations.
The Russian spy agencies and the individuals are accused of trying to influence the 2016 presidential election and launching massiveThe Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-39046035680975752192018-03-18T08:00:00.000+05:302018-03-27T14:27:37.939+05:3050 Million Facebook Accounts Hijacked to help Trump Win
50 million Facebook accounts, most of them in the United States, had their data harvested in 2014 by a company looking for ways to target people with political messages. Facebook has denied this was a data breach.
A whistleblower named Christopher Wylie, who used to work at a company called Cambridge Analytica, gave a dossier of evidence including “emails, invoices, contracts and bank The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-40074332168971123422018-03-17T13:53:00.003+05:302018-03-17T13:55:45.924+05:30Details about tool used by FBI to unlock any Iphone disclosed
A series of hot debates about the backdoor access should be provided or not to law enforcement agencies to Apple devices started after the case of San Bernadino's locked iPhone. But anyhow agency found a way to unlock the iPhone by taking the help from an Israeli company named Cellebrite, which provides iPhone unlocking services to law enforcement agencies.
But recently name of new a device The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-55631365763910662962018-03-16T13:20:00.000+05:302018-03-16T13:20:27.784+05:305 Million Popular Android Phones found with pre-installed malwares
Security researchers at CheckPoint have discovered that Chinese Cyber Criminals are using a malware named as RottenSys to attack android phones all over the world; almost 5 million android devices in their botnet network.
"The Check Point Mobile Security Team has discovered a new widespread malware family targeting nearly 5 million users for fraudulent ad-revenues. They have named it ‘The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-38954852777098633642018-03-15T13:18:00.002+05:302018-03-15T13:18:50.295+05:30Hundreds of Organizations Worldwide Attacked by Qrypter Trojan
According to a security firm Forcepoint, Hundreds of organizations all around the globe have been targeted in a series of attacks that leverage the Qrypter remote access Trojan (RAT).
The malware, often mistaken for the Adwind cross-platform backdoor, has been around for a couple of years, and was developed by an underground group called ‘QUA R&D’, which offers a Malware-as-a-Service (The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0tag:blogger.com,1999:blog-3385998300716176663.post-53025799353236653592018-03-14T12:22:00.001+05:302018-03-14T12:22:43.918+05:30ISRO computers infected with Malwares, Could be Hacked
Security researchers have claimed that a malware has infected computer systems of India’s premier space research agency, Indian Space and Research Organization (ISRO).
Indian and French security experts believe that using the vulnerability, hackers could have easily taken control of ISRO’s command rocket launches.
On December 2017, the researchers detected a trojan malware, known as The Hackers Chroniclehttp://www.blogger.com/profile/15037732104847840333noreply@blogger.com0