Posts

Showing posts with the label Online

Kali Linux 2017.2 Released with Powerful New Tools

Image
Kali Linux is a Penetration Testing Distribution based on Debian. Developed by Offensive Security. It is the world’s most capable and famous security testing platform, utilized by security experts in an extensive variety of specializations, including penetration testing, forensics, reverse engineering, and vulnerability assessment. Kali Linux 2017.2 With the new release, they have added dozens of Powerfull tools and also updates for existing tools, if you are kali lover then it’s time to Upgrade by using following Commands. First Time users can download from here . Some New Tools hurl  – a beneficial little hexadecimal and URL encoder/decoder phishery  – phishery lets you inject SSL-enabled basic auth phishing URLs into a .docx Word document ssh-audit  – an SSH server auditor that checks for encryption types, banners, compression, and more apt2  – an Automated Penetration Testing Toolkit that runs its own scans or imports results from vario...

Wannacry/ WannaCrypt Ransomware First Analysis Report

Image
CRITICAL ALERT Wannacry/ WannaCrypt Ransomware Original Issue Date:- May 13, 2017 Updated On:- May 15, 2017 Virus Type:-  Ransomware It has been reported that a new ransomware named as "Wannacry" is spreading widely. Wannacry encrypts the files on infected Windows systems. This ransomware spreads by using a vulnerability in implementations of Server Message Block (SMB) in Windows systems. This exploit is named as ETERNALBLUE. The ransomware called WannaCrypt or WannaCry encrypts the computer's hard disk drive and then spreads laterally between computers on the same LAN. The ransomware also spreads through malicious attachments to emails. In order to prevent infection, users and organizations are advised to apply patches to Windows systems as mentioned in Microsoft Security Bulletin MS17-010. https://technet.microsoft.com/library/security/MS17-010 After infecting, this Wannacry ransomware displays following screen on infected system: Source: Symante...

Ransomware Virus Also Strikes India, Systems Of Andhra Pradesh Police Hit

Image
An unprecedented global wave of cyberattacks, which affected over 45,000 computers in at least 74 countries since Friday evening, has also spread to India. NEW DELHI:   The unprecedented global wave of cyberattacks, which have affected over 45,000 computers in at least 74 countries since Friday evening, have also spread to India. Over 100 systems of the Andhra Pradesh police have been affected by the virus, called ransomware. Confirming the attack, Gulshan Rai, Director General of the Indian Computer Emergency Response Team (CERT-In), said "We held an assessment meeting today and have found that 102 systems of Andhra Police have been infected with ransomware, particularly those using the Windows operating system." Mr Rai added that it is not just the Andhra Pradesh Police system that would be affected but "while our experts are trying to debug the hacked systems, we will only know the real magnitude of the damage once offices re-open on Monday and systems are...

Google releases DIY open source Raspberry Pi 'Voice Kit' hardware

Image
Google has long been focused on artificial intelligence. Its Google Now and voice assistance projects have used AI to better the lives of users. The Google Home voice-based hardware unit brings its assistant to life, making traditional inputs and displays unnecessary. With just the power of your voice, you can interact with the device -- nothing else is needed. The search giant has decided to take artificial intelligence to the maker community with a new initiative called AIY. This initiative (found  here ) will introduce open source AI projects to the public that makers can leverage in a simple way. Today, Google announces the first-ever AIY project. Called "Voice Kit," it is designed to work with a Raspberry Pi to create a voice-based virtual assistant. Please keep in mind that the Pi itself is not included, so you must bring your own. For this project, you can use a Pi 3 Model B, Pi 2, or Pi Zero. Want a Voice Kit? Here's how to get it. Heck, you might be g...

Learning to code using bad web tutorials may be the reason for most security vulnerabilities

Image
The German cybersecurity researchers have found that many security vulnerabilities in many websites could, in fact, be due to people learning to code from popular online tutorials which are riddled with many mistakes. The Computer scientists from the Saarland University, the Technical University of Braunschweig, Technical University of Berlin, and the cybersecurity firm Trend Micro have analysed thousands of PHP programming projects on the  GitHub  and they have cross-referenced the code against a bunch of popular coding tutorials which rank at the top of Google. Most of the popular tutorials online focus on teaching the new coders how to perform a particular task, like how to create a search form in PHP or how to accept the user’s input from a HTML form /message box and output it in the JavaScript; or the tutorials on how to start using an open source database management system like  MySQL . These tutorials offer coding examples that people can copy, but more...

Insecure Apps that Open Ports Leave Millions of Smartphones at Risk of Hacking

Image
A team of researchers from the University of Michigan  discovered  that hundreds of applications in Google Play Store have a security hole that could potentially allow hackers to steal data from and even implant malware on millions of Android smartphones. The University of Michigan team says that the actual issue lies within apps that create open ports — a known problem with computers — on smartphones. So, this issue has nothing to do with your device's operating system or the handset; instead, the origin of this so-called backdoor is due to insecure coding practices by various app developers. The team used its custom tool to scan over 100,000 Android applications and found 410 potentially vulnerable applications — many of which have been downloaded between 10 and 50 Million times and at least one app comes pre-installed on Android smartphones. Here I need you to stop and first let's understand exactly what ports do and what are the related threats. Ports can be ...