Friday, 9 June 2017

First Android-Rooting Trojan With Code Injection Ability Found On Google Play Store

The Hacker News Daily Updates
Newsletter
cover

Cyber Defense Magazine - 2017 Predictions

Secure your IT world and keep pace with an ever changing cyber security landscape.

Download Now Sponsored
LATEST NEWS Jun 9, 2017

First-Ever Data Stealing Malware Found Using Intel AMT Tool to Bypass Firewall

It's not hard for a well-funded state-sponsored hacking group to break into corporate networks and compromise systems with malware, but what's challenging for them is to keep that backdoor and its communication undetectable from a firewall and other network monitoring applications. However, a ...

Read More
Twitter Facebook LinkedIn

22 Apple Distributors Arrested for Selling Customers' Data in $7.4 Million

Image Source: South China Morning Post Chinese authorities have announced the arrest of around 22 distributors working as Apple distributors as part of a $7 million operation, who stole customers' personal information from an internal Apple database and illegally sold it to Chinese black market ...

Read More
Twitter Facebook LinkedIn

First Android-Rooting Trojan With Code Injection Ability Found On Google Play Store

A new Android-rooting malware with an ability to disable device' security settings in an effort to perform malicious tasks in the background has been detected on the official Play Store. What's interesting? The app was smart enough to fool Google security mechanism by first pretending itself to be ...

Read More
Twitter Facebook LinkedIn

Hard-coded Passwords Make Hacking Foscam 'IP Cameras' Much Easier

Security researchers have discovered over a dozen of vulnerabilities in tens of thousands of web-connected cameras that can not be protected just by changing their default credentials. Vulnerabilities found in two models of IP cameras from China-based manufacturer Foscam allow attackers to take ...

Read More
Twitter Facebook LinkedIn

Beware! This Microsoft PowerPoint Hack Installs Malware Without Requiring Macros

"Disable macros and always be extra careful when you manually enable it while opening Microsoft Office Word documents." You might have heard of above-mentioned security warning multiple times on the Internet as hackers usually leverage this decade old macros-based hacking technique to hack ...

Read More
Twitter Facebook LinkedIn
cover

Cyber Defense Magazine - 2017 Predictions

Secure your IT world and keep pace with an ever changing cyber security landscape.

Download Now Sponsored

This email was sent to balvistudio4.raaj@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

No comments:

Post a Comment