One of the Smartly created Android Malware named “MouaBad.P“ found by security company Lookout, according to their research the malware can automatically make calls to those premium numbers which cost a huge amount per minute. These types of Malware already in the market, but a feature in this makes it strong-it automatically starts the call whenever your phone locks and it ends the call after phone unlocks. Now, you can imagine, it can easily create calls without any user intervention.
But, the thing is-Malware unable to delete call histories, so it can be easily detected through your call logs.
Which Android is affected?
This Malware only works with 3.1 Android version or later, for those who have android version above 3.1-there is no need to worry. (more…)
Content delivery services provider Akamai Technologies plans to buy Prolexic Technologies, a distributed denial-of-service (DDoS) mitigation specialist, for $370 million in cash.
Akamai, in Cambridge, Massachusetts, runs one of the world’s largest content delivery networks with 137,000 servers in 87 countries. Its clients span a variety of industries and include a third of the companies on the Fortune Global 500 list.
Akamai already offers security services that protect Web sites and Web applications against a variety of threats, including DDoS attacks. However, Prolexic, located in Hollywood, Florida, specializes in defending enterprise applications against application-layer and network-layer attacks. (more…)
Three hooded hackers hunch over their computer screens in the control room at Israel’s new state-of-the-art “Cyber Gym”, where IT and infrastructure company employees train to defend against cyber attacks.
The facility, a series of small buildings in the shadow of the looming Orot Rabin power station on Israel’s northern coastline, was inaugurated this month by theIsrael Electric Corp (IEC), which has experienced its fair share of cyber attacks.
“Israel, we believe, is the most-attacked country,” Cyber Gym director Ofir Hason told AFP.
“And as the most-attacked civilian company in Israel, this gives us the unique capabilities to train other companies around the world” to defend against system hacking. (more…)
From pacemakers to baby monitors, Davey Winder reveals five hacking targets from connected devices adnd the Internet of Things that you may not have considered to be a risk
The risk: Network-connected pacemakers have been found to be at risk. Infamous security researcher Barnaby Jack – who sadly died before he could demo his findings at the Black Hat conference – documented methods whereby he could remotely send an 830-volt shock to a certain pacemaker model from a distance of up to 50 feet away, enough to kill the user.
The reality: Any attacker would have to not only know the victim was a user of that particular model, but also get within 50 feet to launch the attack, so isn’t the most convenient method of murder for would-be assassins. (more…)
A British 28-years old IT worker would become a millionaire, if he hadn’t trough away his drive. James Howells created a computer program to “mine” the Bitcoins’ currency, and was awarded with 7,500 BTC bounties for this job, that he has stored to electronic valet file on his laptop. Low cost of e-currency made Howells to forget about it. In 2010 he was forced to demount hard drive from the laptop as he has poured a drink on a keyboard. Needles to say, that the drive was abandoned for years. Recently, James Howells threw it away. “You know when you put something in the [trash], and in your head, say to yourself ‘that’s a bad idea’? I really did have that,” Howells told the Guardian. (more…)