One of the Smartly created Android Malware named “MouaBad.P“ found by security company Lookout, according to their research the malware can automatically make calls to those premium numbers which cost a huge amount per minute. These types of Malware already in the market, but a feature in this makes it strong-it automatically starts the call whenever your phone locks and it ends the call after phone unlocks. Now, you can imagine, it can easily create calls without any user intervention.
But, the thing is-Malware unable to delete call histories, so it can be easily detected through your call logs.
Which Android is affected?
This Malware only works with 3.1 Android version or later, for those who have android version above 3.1-there is no need to worry. (more…)
The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using “cookies” and location data to pinpoint targets for government hacking and to bolster surveillance.
The agency’s internal presentation slides, provided by former NSA contractor Edward Snowden, show that when companies follow consumers on the Internet to better serve them advertising, the technique opens the door for similar tracking by the government. The slides also suggest that the agency is using these tracking techniques to help identify targets for offensive hacking operations. (more…)
Content delivery services provider Akamai Technologies plans to buy Prolexic Technologies, a distributed denial-of-service (DDoS) mitigation specialist, for $370 million in cash.
Akamai, in Cambridge, Massachusetts, runs one of the world’s largest content delivery networks with 137,000 servers in 87 countries. Its clients span a variety of industries and include a third of the companies on the Fortune Global 500 list.
Akamai already offers security services that protect Web sites and Web applications against a variety of threats, including DDoS attacks. However, Prolexic, located in Hollywood, Florida, specializes in defending enterprise applications against application-layer and network-layer attacks. (more…)
Three hooded hackers hunch over their computer screens in the control room at Israel’s new state-of-the-art “Cyber Gym”, where IT and infrastructure company employees train to defend against cyber attacks.
The facility, a series of small buildings in the shadow of the looming Orot Rabin power station on Israel’s northern coastline, was inaugurated this month by theIsrael Electric Corp (IEC), which has experienced its fair share of cyber attacks.
“Israel, we believe, is the most-attacked country,” Cyber Gym director Ofir Hason told AFP.
“And as the most-attacked civilian company in Israel, this gives us the unique capabilities to train other companies around the world” to defend against system hacking. (more…)
From pacemakers to baby monitors, Davey Winder reveals five hacking targets from connected devices adnd the Internet of Things that you may not have considered to be a risk
The risk: Network-connected pacemakers have been found to be at risk. Infamous security researcher Barnaby Jack – who sadly died before he could demo his findings at the Black Hat conference – documented methods whereby he could remotely send an 830-volt shock to a certain pacemaker model from a distance of up to 50 feet away, enough to kill the user.
The reality: Any attacker would have to not only know the victim was a user of that particular model, but also get within 50 feet to launch the attack, so isn’t the most convenient method of murder for would-be assassins. (more…)