Hackers Could Decrypt GSM Phone Calls
MOST MOBILE CALLS around the world are made over the Global System for Mobile Communications standard; in the US, GSM underpins any call made over AT&T or T-Mobile networks. But at the DefCon security conference in Las Vegas on Saturday, researchers from BlackBerry are presenting an attack that can intercept GSM calls as they’re transmitted over the air and then decrypt them to listen back to what was said.Read More
Baldr – Information Stealing Malware
Baldr is the name of a new family of information-stealing malware. Its authors first introduced it to cybercriminal circles in January, and about a month later, Microsoft’s security team reported that they have seen it in the wild. Bill Gates’ specialists said that the stealer is ‘highly obfuscated’ which usually suggests that someone has put a fair amount of effort into creating something powerful. Read More
Quasar RAT
Quasar Remote Access Trojan is a .NET framework open-source remote access trojan family used in cyber-criminal and cyber-espionage campaigns to target Windows operating system devices. It is often delivered via malicious attachments in phishing and spear-phishing emails.Read More
Categories
- Branding (2)
- Business (14)
- Cryptography (25)
- cryptojacking (22)
- Cyber Attack (84)
- Cyber Security (256)
- Defense Military (12)
- Design (2)
- General-Security (25)
- HTTP Headers (3)
- MalWare (39)
- Malware (11)
- Management (8)
- Microsoft Windows (5)
- Mobile Security (19)
- Mock Up (2)
- Uncategorized (49)
- Web Security (23)
- Why website (4)
Recent Posts
- HOW TO HACK WORDPRESS ADMIN PASSWORD USING WPSCAN October 26,2020
- Sans tool October 26,2020
- Why Reinfections Happen with a WAF December 19,2019
- NIST Cybersecurity Framework December 19,2019
- What is the Cost of Cybercrimes & Attacks December 19,2019