Android android banking trojan Android Malware Android Vulnerability Mobile Security Security Strandhogg Vulnerability

New Unpatched Strandhogg Android Vulnerability Actively Exploited in the Wild

Cybersecurity researchers have discovered a new unpatched vulnerability in the Android operating system that dozens of malicious mobile apps are already exploiting in the wild to steal users’ banking and other login credentials and spy on their activities. Dubbed Strandhogg, the vulnerability resides in the multitasking feature of Android that can be exploited by a […]

Cyber Security Data Transfer Project Facebook Photo Albums google photos app secure data storage secure data transfer Security Social media Technology News

New Facebook Tool Let Users Transfer Their Photos and Videos to Google

Facebook has finally started implementing the open source data portability framework as the first phase of ‘Data Transfer Project,’ an initiative the company launched last year in collaboration with Google, Apple, Microsoft, and Twitter. Facebook today announced a new feature that will allow its users to transfer their Facebook photos and videos to their Google […]

Cyber Crime Cyber Criminal Cyber Security Europol hacking tool Imminent Monitor RAT remote access tool Remote Access Trojan Remote administration software Security

Europol Shuts Down ‘Imminent Monitor’ RAT Operations With 13 Arrests

In a coordinated International law enforcement operation, Europol today announced to shut down the global organized cybercrime network behind Imminent Monitor RAT, yet another hacking tool that allows cybercriminals to gain complete control over a victim’s computer remotely. The operation targeted both buyers and sellers of the IM-RAT (Imminent Monitor Remote Access Trojan), which was […]

Security Tips & Tricks

Virtual Private Networks

Overview You may find yourself needing to use public Wi-Fi for Internet access when you are away from home, such as when you are at your local restaurant or coffee shop, or when you are traveling at a hotel or airport. But how secure are these public networks and who is watching or recording what […]

Adobe Cyber Security data breach hacking news Magento Magento Hacking Magento Security magento themes Magento Vulnerability Security

Magento Marketplace Suffers Data Breach Exposing Users’ Account Info

If you have ever registered an account with the official Magento marketplace to bought or sold any extension, plugin, or e-commerce website theme, you must change your password immediately. Adobe—the company owning Magento e-commerce platform—today disclosed a new data breach incident that exposed account information of Magento marketplace users to an unknown group of hackers […]

Cyber Security cyber security jobs salary cybersecurity salary cybersecurity survey information security jobs network security salary online survey software Security

The Hacker News 2020 Cybersecurity Salary Survey – Call for Participation

For the first time, The Hacker News launches a comprehensive Cybersecurity Salary Survey aimed to provide insights into the payment standards of security positions, enabling security professionals to benchmark their salaries against their peers, as well as get clear insights into the leading roles, certifications, geo- and industry- components that factor a cybersecurity position payroll. […]

cyber security software download Kali Linux hacking tool download Kali Linux Kali Undercover Mode Penetration testing tools Security vulnerability assessment tools

Latest Kali Linux OS Added Windows-Style Undercover Theme for Hackers

You can relate this: While working on my laptop, I usually prefer sitting at a corner in the room from where no one should be able to easily stare at my screen, and if you’re a hacker, you must have more reasons to be paranoid. Let’s go undercover: If you’re in love with the Kali […]

Android Cyber Security data collection Facebook hacking news Privacy Privacy Breach Security Twitter

Malicious Android SDKs Caught Accessing Facebook and Twitter Users Data

Two third-party software development kits integrated by over hundreds of thousands of Android apps have been caught holding unauthorized access to users’ data associated with their connected social media accounts. In a blog post published yesterday, Twitter revealed that an SDK developed by OneAudience contains a privacy-violating component which may have passed some of its […]

Cyber Security hacking news remote code execution Security server security virtual network computing VNC protocol vnc viewer Vulnerability

Dozens of Severe Flaws Found in 4 Popular Open Source VNC Software

Four popular open-source VNC remote desktop applications have been found vulnerable to a total of 37 security vulnerabilities, many of which went unnoticed for the last 20 years and most severe could allow remote attackers to compromise a targeted system. VNC (virtual network computing) is an open source graphical desktop sharing protocol based on RFB […]