FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Wednesday, July 31, 2019

North Korea Cyber Attacks being copied by other hacking groups in the world

Finland based Cybersecurity startup F-Secure claims that cyberattacks launched by hacking groups linked to the North Korean government are now being copied by other hacking groups across the world. While cyber-attacks on financial corporations have become an objective for hackers backed by the government-run by Kim UN Jong, organized crime groups across the world are said to be following the same traits while launching motivated attacks against the banking sector. North Korea has a history of running organized crimes around the world such as drug...

US Tech Giants follows the new standard to allow users to access health data with ease

Technology giants like Apple, Microsoft, Google, and Amazon have joined hands to provide online consumers easier access to their medical records by joining a new data model at a White House Blue Button Developers Conference recently. CARIN Blue Button API is the data model which offers a specific standard to share health data with ease which includes doctor visits, test reports, and medical procedural info. All the health insurance companies operating in the United States or those offering services from outside are reported to have joined the CARIN...

New Android ransomware uses pornographic posts to infect devices

By Uzair Amir The new Android ransomware was initially spread through Reddit and XDA-Developers' forum. This is a post from HackRead.com Read the original post: New Android ransomware uses pornographic posts to infect devices August 01, 2019 at 02:10...

Can facial recognition and artificial intelligence humanize air travel?

Facial recognition and artificial intelligence (AI) technologies can help us make the travel experience less alienating. This may seem like a very controversial statement, but let’s explore it further before we jump to any conclusions. Many of us have experienced a marathon journey through an airport, dreading the endless queues and repeated security processes, leaving us...

Our insights from the latest European Banking Authority’s paper on PSD2 readiness, advances and challenges

The PSD2 directive, a fundamental piece of payments legislation in Europe, is set to introduce security requirements for the initiation and processing of electronic payments and the protection of customers’ financial data, starting in September 2019. Since the European Banking Authority (EBA) published its first paper in June 2018 on exactly what the PSD2 legislation would...

Why You Should Consider A Security Certification (and why now is the time)

By Mike Wills, CISSP, SSCP Let’s face it: Opportunity goes to the well-prepared. And living in dangerous and dynamic times, each of us needs to be so much better prepared to face tomorrow than we were today. We’re all at risk. Everything we value, everyone we hold dear are held hostage to the badly misinformed decisions of the well-intended; are targets of opportunities to...

Latest Android Ransomware spreading through SMS messages

According to researchers from ESET which is a Slovakia based Cybersecurity company a new malware is said to be on prowl on the web and is said to be targeting those using Android smartphones. It is a kind of ransomware which encrypts files on mobile phones and is active since July 12 this year. As per the details available to our Cybersecurity Insiders, the malware is being circulated via X-rated codes embedded into posts and published on Reddit and other developer forums. It is a kind of honey trap which is being laid as attackers are seen luring...

Tuesday, July 30, 2019

Capital One Credit Card data breach affects its 100 million customers

Virginia based Financial Corporation ‘Capital One’ which specializes in auto loans and credit card service offerings has made it official that a hacker had accessed credit card details of more than 100 million of its customers and probably could have taken information regarding their social security numbers and other bank details. The recently disclosed hack of Capital One could turn into one of the largest data breaches of this year and possibly all times. FBI is said to have taken a woman named Paige A Thompson from Seattle in this regard as...

Online shopping in the UK now needs a security code to buy Online

Most of the UK’s online shopping customers from now on may face chaos while making their favorite purchases via the web as the new anti-fraud rules will make it mandatory for consumers to enter an online banking security code received via their smartphone to complete a purchase. Yes, what you have read is right! Those shopping across Britain might have to keep their mobile phone numbers updated with their banking institutions to enjoy the benefits of online shopping. If they fail to do so, they might miss a golden opportunity to shop on the web...

Capital One data breach: 106m customers affected; suspected hacker arrested

By Uzair Amir The hacker behind the breach (Paige Adele Thompson) has been arrested after they bragged about hacking Capital One. This is a post from HackRead.com Read the original post: Capital One data breach: 106m customers affected; suspected hacker arrested July 31, 2019 at 12:12...

Money 2020: the latest industry thinking on Open Banking

Money 2020, which took place in Amsterdam at the start of the month, covered a host of topics on the mind of European fintech executives – from AI’s impact on the financial services sector to the changing payment value chain. One subject took center stage at this year’s event; Open Banking. Over a year since the directive came into play – and three months until the European...

Join Us at the Identity and Access Morning Briefing – August 15, 2019

Thinking about attending the upcoming Identity and Access Morning Briefing on Thursday 15th August 2019, in Sydney, Australia? Since the Notifiable Data Breaches (NDB) started on 22 Feb 2018, the Office of the Australian Information Commissioner (OAIC) noted that there were 964 data breaches1 reported between 1 Apr 2018 and 31 March 2019, with compromised credentials...

Monday, July 29, 2019

Every business in the world faces these Cyber Threats

Every hacker launches a cyber attack with a motive to gain heavy on a financial note. And in most cases cyber crooks prove successful in proving their superiority over the target network. Security analysts suggest that attacks launched on businesses yield more to hackers and that’s obvious as data happens to be life-blood for them. Although cyber criminals are seen using numerous ways to orchestrate attacks, here are a few common methods to detail them- Phishing– This has turned into a most common form attack on firms operating around the globe...

Cyber attack news trending on Google

1.) Hackers reportedly targeted the mobile phones used by Brazilian President Jair Bolsonaro early last week and the incident was confirmed by the Brazilian Justice Ministry through a press statement yesterday. The announcement comes just after a statement released by the Brazilian police on July 25th claiming a cyber attack probe launched on the mobile phones used by Mr. Jair led to the arrest of 4 people who are accused of hacking into the digital assets of other government authorities which includes two federal judges, 2 fed police investigators...

Whistleblower says Apple contractors listen to your Siri conversions

By Uzair Amir A whistleblower is claiming that the tech giant Apple is listening to Siri recording and allegedly, the Apple Watch is also playing a big role in collecting these records. This is a post from HackRead.com Read the original post: Whistleblower says Apple contractors listen to your Siri conversions July 30, 2019 at 01:51...

More Than 10M Australians Affected by a Single Data Breach, Reveals OAIC

The Office of the Australian Information Commissioner (OAIC) found that a single data breach affected more than 10 million Australians. In its latest Notifiable Data Breaches Quarterly Statistics Report, the OAIC reveals that it received 215 notifications of data breaches under the Notifiable Data Breach Scheme between 1 January and 31 March 2019. Nearly all of those security...

Survey Results: The State of Data Security in APAC – Are Businesses Ready for Their Digital Transformation?

Asia-Pacific (APAC) organisations across various industry verticals are undergoing a digital transformation or have transformed their business in order to move into the digital economy. Some are offering multiple touchpoints for customers & employees, moving to the cloud, building new applications to connect and engage with customers and the list goes on. At the heart...

Why IaaS requires cloud security automation

Public cloud infrastructure is a significant and powerful part of an enterprise’s competitive arsenal but to protect such fast-moving environments requires such as Iaas require cloud security automation. In our cloud-driven economy, software has become the battleground of innovation, and public cloud infrastructure, or IaaS, — along with its cousins, DevOps and Continuous Delivery — offers the strategic advantage of speed.  It also brings new challenges in maintaining security and compliance requiring the application of the Shared Responsibility...

Improve security of your Linux OS with simple steps

By Waqas It’s normal to hear Linux users brag about security and sometimes tease Windows users however Linux devices are now under malware attacks as well. This is a post from HackRead.com Read the original post: Improve security of your Linux OS with simple steps July 29, 2019 at 04:03...

Sunday, July 28, 2019

Security features on Google Cloud Platform (GCP)

Google, which happens to be one of the largest tech companies in the world after Amazon has for years warding off security threats by following certain guidelines in its day to day operations. In the last weekend, the internet juggernaut decided to disclose some security features of its Google Cloud Platform to help customers show their data and services are being offered securely to help build ‘Trust’ among its patrons. Going by the disclosure it appears that the web search giant has customized most of its cloud security features as per its needs...

Trending news headlines on Google related to Cyber Attacks

1.) Bellingcat, an investigative journalism website which offers open-source intelligence and fact-finding tools has revealed that a recent cyberattack on its database has been sourced to Russian intelligence. Eliot Higgins, who happens to be the founder of the British based Bellingcat website said on last Friday that Russia backed hackers have been consistently trying to hack its database which has been probing into the incidents such as Malaysia MH17, the Skripal Nerve attack and the GRU investigations on the bombings in Syria. Higgins disclosed...

Be the leader in the new password-volution: memorized secrets

Remember when you were younger, and you wanted to do something that all your friends were doing, yet you knew your parents would never approve?  Perhaps it was skating in that home-made “Half-Pipe”, or that time you wanted to try some equally dangerous stunt? Of course, your parents disapproved, to which you probably responded with the time-honored refrain: “But everyone...

Friday, July 26, 2019

Prevent WordPress hacking using this Pen Testing guide

Welcome back to the next edition of “Hacking WordPress”. Find Part 1 if you missed it. Let me start with a PSA message. It is illegal to hack, log in to, penetrate, take over or even hack, a system or network of systems without the explicit permission of the owner. Criminal hacking is illegal and punishable under Federal Law. I am describing methods to learn more about WordPress...

WannaCry hero Marcus Hutchin aka MalwareTech won’t serve prison time

By Waqas The British cyber security researcher and WannaCry ransomware hero Marcus Hutchin was initially facing up to 10 years in a US prison. This is a post from HackRead.com Read the original post: WannaCry hero Marcus Hutchin aka MalwareTech won’t serve prison time July 27, 2019 at 05:13...

Apple acquires Intel Smartphone Modem business for 5G

In Feb this year, there were rumors that Apple is all set to acquire a business unit of Intel to strengthen its stand on 5G network transformations around the world. And as speculated, Apple Inc made an official announcement early today which states that it has acquired Intel’s Smartphone Modem business for $1 billion. If history is taken into account, Apple and Intel’s latest deal can be termed as a most high profile deal in recent times i.e in the past months. Apple has also included in its statement that approximately 2,200 of Intel employees...

Thursday, July 25, 2019

Universities need to protect their data from Cyber Attacks

As more and more Universities are falling preys to cyberattacks, security researchers say that educational universities should appropriately defend their digital assets before it’s too late. Oxford, Warwick, Greenwich and Lancaster Universities were among the many of the higher educational institutes which have fallen prey to cyber attacks in recent years, and the list might persist if these institutes do not improve their security posture says a security alert issued by UK’s National Cyber Security Center (NCSC). As research info is turning profitable...

Ransomware attack forces Louisiana Governor to declare an emergency

Ransomware attack has forced Louisiana Governor John Bel Edwards to declare emergency after three school districts in the region were hit by a ransomware attack early this week. The names of the school districts are Ouachita, Morehouse and Sabin and sources confirm that the digital files about the three schools remain encrypted and remain inaccessible to the staff and students even today i.e Friday. With the declaration of the emergency, Louisiana happens to join the list standing second in line following Colorado Department of Transportation which...

Ransomware attack on Power supply leaves Johannesburg citizens in the dark

A ransomware attack which took place on the network of Johannesburg Electricity Supplier ‘City Power’ is said to have left thousands in dark without power. The company which purchases, distributes and sells power to the city’s financial hub admitted that it became a victim of a malware attack which disrupted the network of pre-paid electric power services for residents and local companies operating in the largest city of South Africa. Details of the attack are yet to be known. But highly placed sources have confirmed that a malware blocked certain...

Wednesday, July 24, 2019

Hackers buy passwords of Deliveroo users and place fraudulent orders

Deliveroo, a London based online food delivery app is struggling to contain the number of fraudulent orders placed by hackers who purchased usernames and password credentials on the dark web for as low as £5 As each day is passing, Deliveroo account holders are sent scrambling to try to cancel the orders before the food is delivered HO% to hackers. Some orders are small like a pack of cigarettes’ from Nisa Local while most are large- £450 worth chicken dishes from KFC. A source from the British online food delivery company confirmed that her company’s...

Cyber Attack on German companies BASF, Siemens, Henkel, and Roche

German media is buzzing with news headlines that a group of companies operating in its region was targeted by a cyberattack launched by Chinese hacking group. Public Broadcaster ARD has specified in its news post that hackers targeted Hotels group Marriott, BASF, airliner Lion Air, Chemical firm Shin-Etsu, Siemens, Shampoo maker Henkel and Pharma company Roche with a malware called Winnti having the potential to access the computer network of the victims. ARD specified in its news update that the source code of Winnti was the same which was used...

New malware attack turns Elasticsearch databases into DDoS botnet

By Waqas The malware attack involves two stages including one in which existing cryptomining malware is removed and other remove configuration files. This is a post from HackRead.com Read the original post: New malware attack turns Elasticsearch databases into DDoS botnet July 24, 2019 at 11:32...

I resent my Email and my invite

Here is a short communication tip that may help you in your daily interactions.  How often have you “resent” an E-Mail?  How often have you told a person that you will “send an invite”? You may be wondering why I am bringing this up in a post usually reserved for cybersecurity.  Am I just being overly pedantic? Am I just a rigid grammarian?  One could easily...

How does legal identity strengthen a country’s institutional framework?

In our previous post we discussed why having legal identity was essential to exercising human rights. However, legal identity is also crucial to strengthening a country’s institutional framework and making sure governments can provide citizens with the best policy possible. Such questions were also raised at the ID4Africa event this week in Johannesburg. To recap, legal identity...