Samsung launched the Galaxy S10 lineup of smartphones at an event in February. The devices that were announced include the Galaxy S10+, Galaxy S10, Galaxy S10 5G and Galaxy S10e. While the latter used a physical, side mounted fingerprint sensor for unlocking the device, the former three have a new technology onboard. They use an ultrasonic fingerprint scanner made by chipmaker Qualcomm and are the first devices in the world to do so. While Samsung claimed the technology is secure than most fingerprint sensors in the market, fresh reports say otherwise. A user who goes by the name ‘darkshark’ on multimedia sharing website Imgur revealed the ultrasonic fingerprint scanners [...]
Technical Researchers from Purdue University and the University of Iowa have exposed vulnerabilities in the data infrastructure of 4G and 5G networks, which lets attackers track down the location of any mobile phone on a given network. Furthermore, they can also snoop in on users during a phone call. With the advent of 5G not very far away, an exposed liability of this sort can be serious.
About The AttacksWhen 5G was announced, reports said that the new network would be more secure than the previous iteration. Instead, the researchers unveiled three different kinds of attacks which hackers can use to breach a network which is running on 4G or the upcoming 5G technology. [...]
Update: The video has been recovered by YouTube and is now live on the video streaming platform.
Luis Fonsi’s song, Despacito became the most-watched video ever on YouTube. Now, after falling victim to a cybercrime, the official video of Despacito has been deleted from YouTube while several accounts of other artists have also been compromised.
At first, the thumbnail for the video was altered. The original image was replaced with a group of masked men holding guns and the description was changed by a group of hackers calling themselves Prosox and Kuro’ish. The hackers also wrote “Free Palestine” in the description of many videos. The image of the [...]
The Indian government has continued its effort in curbing the danger that some apps on the internet might possess. The Indian intelligence agencies have listed about 42 mobile applications that have the potential to carry out a cyber-attack against the country. The agencies have reportedly issued a warning to the Indian Army and paramilitary against their usage.
As per reliable inputs, a number of Android/IOS apps developed by Chinese developers or having Chinese links are reportedly either spyware or other malicious ware. Use of these apps by our force personnel can be detrimental to data security having implications on the force and national security.
Army personnel [...]
Only yesterday (29th November), the news broke out of a major security flaw that allowed anyone to gain root access to a Mac device running MacOS High Sierra.
Apple issued a statement:
Security is a top priority for every Apple product, and regrettably we stumbled with this release of macOS.
When our security engineers became aware of the issue Tuesday afternoon, we immediately began working on an update that closes the security hole. This morning, as of 8:00 a.m., the update is available for download, and starting later today it will be automatically installed on all systems running the latest version (10.13.1) of macOS High Sierra.
We greatly regret this [...]
OnePlus cannot seem to catch a break. A few days after it was revealed that OnePlus left an application that allowed backdoor entry to OnePlus devices, a new application has been found recording sensitive data and storing it unencrypted inside the phone. This app is reportedly called OnePlusLogKit and, like its name suggests, logs an extensive amount of user data.
The same researcher who exposed the EngineerMode app a few days ago has made the new revelation as well. The researcher wrote in a post that all of the user data stored by this app is unencrypted, and also added that this data could also likely be sent to China. The researcher, who goes by the moniker of Elliot [...]
New reports suggest that our fingerprints are not as unique and safe for security, as we might have otherwise believed. This makes almost all Android smartphones in the future susceptible to getting hacked. Studies by FireEye researchers Tao Wei and Yulong Zhang have outlined new ways to attack an Android device to extract the user’s fingerprint.
As of now, this threat is said to be confined to Android devices like Samsung, Huawei and HTC devices. The research shows four outlines for these hacks, and one them called the “fingerprint sensor spying attack”, is said to be able to “remotely harvest fingerprints on a large scale,” says [...]
Hackers from the Anonymous India group took down the Telecom Regulatory Authority of India (Trai) website in an attempt to stand against the violation of Net Neutrality in the country. The website may be back online for the time being, but the group remains active on their twitter voicing out their reasons. The DDOS attack was done to the website to stand against the releasing of Email IDs by the organization, claims Anonymous India group.
Although TRAI took to the media outlets and said that the website was down due to technical glitches. However the hacktivist group has asserted claim over the DDOS [...]
Adobe announced on Thursday that it has been the target of a major security breach in which sensitive and personal data about millions of its customers have been put at risk.
Brad Arkin, senior director of security for Adobe products and services, explained in a post that the attack concerns both customer information and illegal access to source codes for “numerous Adobe products.” As the hackers have obtained access to a large swath of Adobe customer IDs and encrypted passwords.
Brad specified that removed sensitive information about approximately 2.9 million Adobe [...]
Police have foiled a plot to steal millions of pounds after a gang allegedly took control of a bank’s computer remotely.
Scotland Yard described the cyber-attack on a Santander branch in Surrey Quays shopping centre, south-east London, as the most sophisticated case of its kind that police had encountered.
The hackers were hoping to use highly sensitive information displayed on the computer to access accounts and drain money from them, but the Hollywood-style cyber heist was foiled.
The men allegedly fitted a computer within the branch in [...]
Khalil the hacker who broke into Mark Zuckerberg’s Facebook Timeline to expose a security lapse will be awarded nearly $12,058(increasing amount) from a campaign started on GoFundMe. The campaign was started by Beyond Trust Chief Technology Officer Marc Maiffret, who is doing his best to make sure Shreateh doesn’t walk away from this experience empty-handed.
The campaign has raised $12,058 for Khalil Shreateh, of Palestine, who claims he was forced to hack into Zuckerberg’s page to bring attention to the security vulnerability because Facebook had ignored his earlier warnings.
The bug that Khalil found allowed him to post on the Timelines of people who [...]
Apple today restored the Developer Center – the place where it stores all of its resources and information for third-party app creators. A message on the website read :
We are pleased to let you know that all our developer program services are now online. Your patience during this time was sincerely appreciated.
We understand that the downtime was significant and apologize for any issues it may have caused in your app development. To help offset this disruption, we are extending the membership of all developer teams by one month. If you need any further assistance, please contact us.