Cable Haunt Vulnerability Threats Millions of Modems with Broadcom Chips

Danish researchers have published a report on the Cable Haunt vulnerability that threats millions of cable modem with Broadcom chips. According to experts, the problem threatens more than 200 million cable modems only in Europe. Moreover, it is impossible to determine the exact number of vulnerable devices, because the vulnerability was found in the reference… Continue reading Cable Haunt Vulnerability Threats Millions of Modems with Broadcom Chips

Researcher remotely hacked iPhone using only one vulnerability

Researcher in a few minutes remotely hacked iPhone using only Apple ID and exploiting only the CVE-2019-8641 vulnerability, due to which he gained access to the user’s accounts and passwords on the device and activated the camera. Vulnerabilities in software that could compromise a system without user intervention (for example, without clicking on a malicious… Continue reading Researcher remotely hacked iPhone using only one vulnerability

Researchers hacked TikTok app via SMS

Check Point experts found many issues in one of the world’s most popular applications, TikTok. Recently researchers hacked TikTok app using sms. TikTok is available in more than 150 markets, is used in 75 languages worldwide and has more than 1 billion users. In October 2019, TikTok was called one of the most downloaded applications… Continue reading Researchers hacked TikTok app via SMS

US Homeland Security warns of possible cyberattacks by Iran

Homeland Security USA issued a warning about possible acts of terrorism and cyberattacks by Iran in response to the assassination of General Kassem Suleimani, the head of the Quds special forces of the Islamic Revolutionary Guards Corps, after the US air strike on the Iraqi capital of Baghdad on January 3. Iran is at least… Continue reading US Homeland Security warns of possible cyberattacks by Iran

Shitcoin Wallet for Google Chrome steals cryptocurrency passwords and keys

One of the extensions for Google Chrome, Shitcoin Wallet injects a special JavaScript code into web pages. Using this code, attackers steal passwords and private keys from cryptocurrency wallets and services. The first problematic addon appeared on December 9th. The extension received the identifier ckkgmccefffnbbalkmbbgebbojjogffn. Shitcoin Wallet developers claim that the extension allows users to… Continue reading Shitcoin Wallet for Google Chrome steals cryptocurrency passwords and keys

My Digital Life forum community has found an illegal way to extend support for Windows 7

The community of the My Digital Life online forum has found an illegal way to extend support for Windows 7: bypass Microsoft’s restrictions and allow the installation of Windows 7 Extended Security Updates on all systems, not just on those that paid for it. Very soon, on January 14, 2020, support for Windows 7 will… Continue reading My Digital Life forum community has found an illegal way to extend support for Windows 7

Emotet topped the rating of the most common threats in 2022

Any.Run, interactive service for automated malware analysis has compiled a list of the ten most common threats downloaded to this platform. The Trojan Emotet topped this 2019 threat rating. The top includes malware designed to steal all types of confidential information, bank details, and remote access tools to control a hacked host. No.1 Emotet –… Continue reading Emotet topped the rating of the most common threats in 2022

ToTok messenger turned out to be a tool for total tracking

The New York Times reported that the ToTok messenger turned out to be a tracking tool. The application allowed the UAE authorities to track conversations, movements and other data of users who installed it on their devices. ToTok is believed to be an easy and secure way to chat via video or text messages with… Continue reading ToTok messenger turned out to be a tool for total tracking

Perfect encryption system presented by team of scientists from three countries

An international team of scientists from the University of St. Andrews (Scotland), the King Abdullah University of Science and Technology (Saudi Arabia) and the Center for Alternative Scientific Processes (USA) created and presented the perfect encryption system, which is absolutely impossible to crack. Scientists claim that they have developed a cryptographic system that cannot be… Continue reading Perfect encryption system presented by team of scientists from three countries

MyKingz botnet uses Taylor Swift photo to infect target machines

Sophos researchers noticed that the MyKingz botnet, also known as Smominru, DarkCloud, and Hexmen, now uses steganography to infect targeted machines. For these purposes, the criminals chose a JPG file – a photo of the pop singer Taylor Swift. Experts first discovered the MyKingz botnet at the end of 2017. Since then, it has become… Continue reading MyKingz botnet uses Taylor Swift photo to infect target machines