Large botnet causing increasing traffic on TOR Network

Recently Roger from posted a question regarding increased traffic on TOR network. After NSA’s surveillance the first suspect was assuming internet users have started using tor network to surf anonymously. However the exponential increased intraffic showed its something more than just the users. The suspect was it must be a botnet. Even Arma posted saying […]
Share Button
Continue reading →

Android Trojan Obad.a Trojan spreading via mobile botnets discovered

According to Securelist.com, Obad.a infects in two steps along with another mobile Trojan named as TrojanSMS.AndroidOS.Opfake.a.  This Trojan was noted as one of the most sophisticated Trojan by Kaspersky this May. The infection starts when a legitimate user gets a text message with following text. “MMS message has been delivered, download from www.otkroi.com”. When a […]
Share Button
Continue reading →

New Banking Trojan on the wild – Hesperbot discovered by ESET

ESET researchers have spotted a new malware spreading campaign targeting online banking users in Turkey, the Czech Republic, Portugal and the United Kingdom.  It uses phishing campaigns related to trustworthy organizations to infect user machines. Based on Esset analysis, the new banking Trojan Hesperbot with functionality similar to the most notorious Zeus & Spyeye. However […]
Share Button
Continue reading →

Indian Government restricts using foreign providers like Google’s Gmail for its employees

After the NSA espionage of US on foreign governments, Indian government is enforcing all its employees to use in house services to main the integrity and confidentiality of data. A senior official in ministry of communications & information technology sent an official notification to approx. 500,000 of its employees to restrict services like Gmail for […]
Share Button
Continue reading →

Security enthusiast age 21 from India found a vulnerability that allowed anyone to delete any photo on Facebook – Earns $12,500 bounty

Facebook security is challenged again to check how weak their security team is and how low they pay for bug hunters.  An engineer student Arul Kumar 21 from India discovered a security vulnerability on Facebook which can delete anyone’s pictures. Arul is a security enthusiast who submitted the code with proof of concept yesterday. The […]
Share Button
Continue reading →

Cisco Secure Access Control Server Remote Command Execution Vulnerability affecting Windows

A critical vulnerability has been discovered in Cisco Secure ACS which allows a remote attacker to gain complete control of a vulnerable device. The successful exploitation of the vulnerability may allow an unauthenticated, remote attacker to execute arbitrary commands and take full control of the operating system that hosts the Cisco Secure Access Control Server […]
Share Button
Continue reading →

Uni-IDM ( IDSpace ) – a new anti-phishing technology tool used for Identity Management

Researchers from London’s Royal Holloway University designed a tool to fight against phishing using a tool called Uni-IDM(IDSpace). This identity management tool has been introduced to improve security and usability for user authentication. At this point in time, password based authentication has been used all over the world for authentication. As per the university research […]
Share Button
Continue reading →

ExecScent a new cyber security tool to sniff malware traffic by identifying network behavior

Researchers from Georgia Institute of Tech developed a prototype tool called ExecScent  to identify Malware traffic connecting to command and control center.  Based on the reports ExecScent discovers hundreds of infected hosts which was not known earlier.  The tool uses intelligence to identify bad traffic over the good traffic. If this tool works and is […]
Share Button
Continue reading →

Google Cloud Messaging Service being exploited by Android Malware

A Researcher at Kaspersky Lab published an article about the malicious Andoird Apps using Google Cloud Platform Messaging Service and leverage it as CnC (Control & Command Server) to carry out attacks. Kaspersky Researchers found 1,000,000 different OpFake installers disguised mostly games. The app sends several commands from both the GCM and its own C&C, […]
Share Button
Continue reading →

Zmap – open-source network scanner could scan the globe in 45 minutes making the internet look tiny

Security researchers from University of Michigan have come up with an amazing tool to scan the internet.  As per the reports, the scanner can scan the entire web in 45 minutes which sounds almost a miracle.  Often security testers used nmap for their scan which took a long time scanning their targets but this research […]
Share Button
Continue reading →