menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Hacking News

Hacking News

source image

Hackersking

2d

read

342

img
dot

Image Credit: Hackersking

WhatsApp to Stop Working on Older Android Phones in January 2025

  • WhatsApp will stop supporting older Android devices starting January 2025.
  • This decision aims to enhance performance, introduce new features, and ensure robust security.
  • Affected devices include Samsung Galaxy S3, HTC Desire 500, and Sony Xperia M.
  • Users are advised to upgrade their devices or software to continue enjoying WhatsApp's features.

Read Full Article

like

20 Likes

source image

Hackingblogs

2d

read

199

img
dot

Image Credit: Hackingblogs

The Famous Lockbit Ransomware’s Developer Rostislav Panev Was Arrested UK NCA

  • The UK National Crime Agency has arrested Rostislav Panev, the developer of the LockBit ransomware.
  • LockBit is a powerful ransomware that gained popularity among cybercriminals in 2021.
  • Rostislav Panev, a dual citizen of Israel and Russia, is accused of building and maintaining the LockBit ransomware infrastructure.
  • Along with Panev, seven other members of the LockBit group have been charged.

Read Full Article

like

11 Likes

source image

Hackernoon

2d

read

365

img
dot

Image Credit: Hackernoon

Code Smell 284 - Encrypted Functions

  • Avoid obfuscated functions in your code.
  • Cryptic code makes your code unreadable and untrustworthy.
  • Using clear names and avoiding obfuscation can improve readability and trust in the code.
  • Manually reviewing code and using linters can help identify obfuscated functions.

Read Full Article

like

22 Likes

source image

Securityaffairs

2d

read

122

img
dot

Image Credit: Securityaffairs

Security Affairs newsletter Round 503 by Pierluigi Paganini – INTERNATIONAL EDITION

  • BadBox rapidly grows, 190,000 Android devices infected
  • Romanian national sentenced to 20 years for NetWalker ransomware attacks
  • Sophos fixes critical vulnerabilities in its Firewall product
  • U.S. CISA adds BeyondTrust software flaw to its Known Exploited Vulnerabilities catalog

Read Full Article

like

7 Likes

source image

Hackersking

3d

read

178

img
dot

Image Credit: Hackersking

4 Ways to Use Social Media to Propel Your Career Forward

  • Social media has become a powerful tool for professional growth and career advancement.
  • Build and showcase your personal brand by optimizing profiles, sharing thoughtful content, and engaging with others.
  • Expand your professional network by joining groups, following industry leaders, and reaching out through direct messages.
  • Utilize social media for job hunting by keeping profiles updated, using relevant hashtags, and showcasing your work.
  • Stay informed about industry insights by following relevant accounts, participating in webinars, and using content aggregation tools.

Read Full Article

like

10 Likes

source image

Medium

3d

read

51

img
dot

How to Protect Your Privacy When Using Social Media Platforms

  • Change security settings to limit profile visibility and post perception
  • Be cautious of the information you share including sensitive data and location information
  • Use strong and unique passwords for your accounts and enable two-factor authentication
  • Be wary of third-party applications and sites that request access to your personal information
  • Avoid phishing tricks and suspicious links, avoid sharing sensitive information via direct message and report suspicious accounts
  • Monitor third-party tracking and advertisements and limit data sharing
  • Regularly review and manage your friends and followers list
  • Be aware of data breaches and change passwords frequently
  • Understand third-party privacy policies and data sharing practices
  • Educate yourself about platform-specific privacy risks and stay informed about privacy news
  • Protecting your privacy on social media requires constant vigilance and awareness of best practices

Read Full Article

like

3 Likes

source image

Medium

3d

read

367

img
dot

How to Protect Yourself from Identity Theft and Data Breaches

  • Fortify Your Passwords: Use long and complex passwords, enable two-factor authentication, and utilize a password manager.
  • Be Careful about Phishing Tricks: Check email links before clicking, avoid sharing sensitive information, and look for warning signs of phishing.
  • Secure Your Gadgets: Update software regularly, use antivirus software, and enable device encryption.
  • Protect Personal Data Online: Limit the sharing of sensitive information, adjust privacy settings, and avoid using public Wi-Fi without a VPN.
  • Monitor Your Financial Records: Review statements regularly, set up alerts, and consider freezing your credit.
  • Use a VPN for Online Security: Protect your IP address and secure public Wi-Fi use with a VPN.
  • Stay Informed on Cybersecurity Trends: Follow trusted resources, take online security courses, and stay updated on security breaches.
  • Be Mindful of Emails and Downloads: Scan email attachments, avoid clicking unknown links, and download from trusted sources.
  • Shred Physical Documents: Destroy sensitive papers and secure mailboxes to prevent identity theft.
  • Respond Quickly to Suspicious Activity: Contact your bank, file a fraud alert, and report to authorities if your identity has been stolen.

Read Full Article

like

22 Likes

source image

Medium

3d

read

283

img
dot

What Are the Uses of a VPN?

  • A VPN (Virtual Private Network) encrypts your web connection and ensures privacy and security for your online activities.
  • It is useful in various scenarios such as using public Wi-Fi networks to protect your data from hackers.
  • VPN allows you to access geo-restricted content and bypass internet censorship in certain countries.
  • It also safeguards your identity, enables secure remote work, facilitates safe torrenting, avoids bandwidth throttling, offers shopping and travel benefits, enhances gaming experience, and ensures safe communication.

Read Full Article

like

17 Likes

source image

Securityaffairs

3d

read

375

img
dot

Image Credit: Securityaffairs

BadBox rapidly grows, 190,000 Android devices infected

  • Experts uncovered a botnet of 190,000 Android devices infected by BadBox bot, primarily Yandex smart TVs and Hisense smartphones.
  • Bitsight researchers sinkholed a BADBOX domain and identified over 160,000 unique infected devices in 24 hours.
  • BADBOX-infected devices primarily found in Russia, China, India, Belarus, Brazil, and Ukraine, are sending telemetry to a C2 server.
  • The BadBox malware conducts ad fraud, creates email and messaging accounts for spreading disinformation, and can download additional payloads.

Read Full Article

like

22 Likes

source image

Livebitcoinnews

3d

read

160

img
dot

Image Credit: Livebitcoinnews

Cryptopia Liquidators Distribute $400 Million to Victims of 2019 Hack

  • Cryptopia liquidators distribute $400M to victims of 2019 hack.
  • Over 10,000 verified account holders have received cryptocurrency distributions.
  • Liquidators aim to return 100% of holdings to users.
  • Ongoing distributions planned for verified users in the New Year.

Read Full Article

like

9 Likes

source image

NullTX

3d

read

269

img
dot

Image Credit: NullTX

Web3 Cyber Attacks Surge In 2024: $2.3 Billion Lost Across 165 Incidents

  • The year 2024 witnessed a surge in cyber attacks targeting the Web3 ecosystem, resulting in $2.3 billion in losses across 165 incidents.
  • Ethereum was the most targeted blockchain, experiencing over $1.2 billion in losses.
  • The primary attack types included access control breaches, smart contract exploits, and address poisoning scams.
  • Notable incidents in 2024 involved the WazirX Hack, DMM Exchange Breach, Radiant Capital Attack, and BingX Exploit.

Read Full Article

like

16 Likes

source image

Securityaffairs

3d

read

36

img
dot

Image Credit: Securityaffairs

Romanian national was sentenced to 20 years in prison for his role in NetWalker ransomware attacks

  • Romanian national Daniel Christian Hulea, 30, was sentenced to 20 years in prison for his role in NetWalker ransomware attacks, pleading guilty to fraud charges in June.
  • Hulea admitted to extorting 1,595 bitcoin (~$21.5M) in ransom payments from organizations worldwide, including healthcare during COVID-19.
  • Romanian authorities arrested Hulea in July 2023 and extradited him to the U.S. under the U.S.-Romania extradition treaty.
  • The NetWalker ransomware group has targeted various victims, including K-Electric, Dirección Nacional de Migraciones, and the University of California San Francisco.

Read Full Article

like

2 Likes

source image

Hackersking

3d

read

84

img
dot

Image Credit: Hackersking

How Generative AI Is Powering a New Era of Cybersecurity

  • Generative AI is revolutionizing cybersecurity by enhancing threat detection, automating responses, and fortifying defenses.
  • Key applications of generative AI in cybersecurity include threat detection and analysis, simulating cyberattacks, automating incident response, and developing adaptive security measures.
  • Challenges and risks of generative AI in cybersecurity include the potential misuse by cybercriminals and concerns about data privacy and false positives/negatives.
  • The future of generative AI in cybersecurity may include AI collaboration, personalized security, and predictive defense.

Read Full Article

like

5 Likes

source image

Securityaffairs

4d

read

222

img
dot

Image Credit: Securityaffairs

Sophos fixed critical vulnerabilities in its Firewall product

  • Sophos has fixed three critical vulnerabilities in its Firewall product.
  • The vulnerabilities allowed for SQL injection, privileged SSH access, and remote code execution.
  • The vulnerabilities affected Sophos Firewall v21.0 GA and older versions.
  • Sophos recommends specific mitigations to address the vulnerabilities.

Read Full Article

like

13 Likes

source image

TechDigest

4d

read

366

img
dot

Image Credit: TechDigest

Hackers stole $2.2bn of crypto this year, AI can distinguish between US and Scottish whiskies

  • Hackers affiliated with North Korea have stolen $1.3bn of cryptocurrencies this year.
  • Artificial intelligence can distinguish between US and Scottish whiskies based on their molecular makeup.
  • Apple is rumored to launch AirPods Pro 3 in early 2025, deviating from its traditional release schedule.
  • Chinese wi-fi routers used in UK homes are under investigation due to potential hacking risks.

Read Full Article

like

22 Likes

For uninterrupted reading, download the app