Skip to main content

Posts

Showing posts from November, 2017

A Massive spam Email campaign with Scarab Ransomeware

A massive malicious email campaign that stems from the world's largest spam botnet Necurs is spreading a new strain of ransomware at the rate of over 2 million emails per hour and hitting computers across the globe. The popular malspam botnet Necrus which has previously found distributing  Dridex banking trojan ,  Trickbot banking trojan ,  Locky ransomwar e, and  Jaff ransomware , has now started spreading a new version of Scarab ransomware. According to  F-Secure , Necurs botnet is the most prominent deliverer of spam emails with five to six million infected hosts online monthly and is responsible for the biggest single malware spam campaigns. Scarab ransomware is a relatively new ransomware family that was initially spotted by ID Ransomware creator  Michael Gillespie  in June this year, with its source code being based on an open source proof-of-concept ransomware called " HiddenTear ." Massive Email Campaign Spreads Scarab Ransomware According to a  blog post  pub

Use Steganography to hide your secret in real time object

Yes! your thought is correct. In this article, we going to explore the mysterious hacking technique. Concealing a file, message, image, or video within another file, message, image, or video is called  Steganography. The word steganography combines the Greek words steganos (στεγανό ς ), meaning "covered, concealed, or protected," and graphein (γράφειν) meaning "writing". " Steganography is not the encryption or encoding technique.Hiding/injecting data into the real-time data" . The concept of steganography was first introduced in 1499, but the idea itself has existed since ancient times. There are stories of a method being used in the Roman Empire whereby a slave chosen to convey a secret message had his scalp shaved clean and a message was tattooed on the skin. When the messenger’s hair grew back, he was dispatched on his mission. The receiver shaved the messenger’s scalp again and read the message. Ok!! lets play Now..... Find the concealing message from

The reason behind the UC Browser's removal from Play Store

Update: November 17, 06:20 ET, In another twist in the UC Browser tale, it appears that the “employee” who first weighed-in on the situation may not be an employee after all. A Twitter user going by the name of Mike Ross originally said that he worked for UC Browser and provided insights into why the app had been pulled from Google Play. In a statement to MobiGyaan, U C Web said he wasn’t an employee. “The reason for the removal has nothing to do with alleged data security breach or malicious promotion,” said UCWeb. “We would like to state that we have no records of anyone named ‘Mike Ross’ claiming to be working for UC Browser, as mentioned in some reports. The person claiming to be working for UC Browser is in no way associated with the firm nor represent the views of the company. The allegations of misleading and malicious promotions by the said person are completely false and baseless.”  I’ve reached out to Mike Ross regarding the matter and will update this story should I receive

Install Nagios Server Monitoring on Ubuntu

Nagios monitors your entire IT infrastructure to ensure systems, applications, services, and business processes are functioning properly. In the event of a failure, Nagios can alert technical staff of the problem, allowing them to begin remediation processes before outages affect business processes, end-users, or customers. With Nagios, you’ll never be left having to explain why an unsee n infrastructure outage hurt your organization’s bottom line. Nagios runs periodic checks on critical parameters of application, network and server resources. It can monitor, for example, memory usage, disk usage, microprocessor load, the number of currently running processes and log files. Nagios also can monitor services, such as Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Hypertext Transfer Protocol (HTTP) and other common network protocols. Active checks are initiated by Nagios, while passive checks come from external applications connected to the monitoring tool. Install

Bajaj Allianz launches first cyber insurance cover

Worried about cyberstalking, social media liability or cyber-extortion? Here is a cyber-protection product for individuals, which provides coverage for people who fall victim to threats such as cyber-attacks, cyber extortion and cyberbullying.  Bajaj Allianz General Insurance today launched Individual Cyber Safe policy for individuals covering people against financial loss, defence cost, prosecution cost, IT theft loss, restoration cost. Date: 2/6/2017 “Cyber insurance is absolutely new in India. Fundamentally, cyber threats has been steadily increasing and the cost attached to breaches and cyber attacks have also gone up tremendous,” sa y s Sasikumar Adidamu, Bajaj Allianz General Insurance’s Chief Technical Officer –Non Motor. Partnerships of Symantec and F-Secure with insurance companies show that they are willing to take-up co-liability and co-ownership in event  of cyber attacks. So IT firms and tech vendors should also take up some onus and not just point fingers at CIOs or CISOs

NMAP (Network Mapper) - A Securtiy Scanner

Nmap ("Network Mapper") is a free and open-source utility for network discovery and security auditing. Which is a simple and very powerful tool for security audit/research. Best platform for NMAP??? Windows Linux Mac     (* in Kali Linux NMAP pre-installed) NMAP is able to run in CLI as well as in GUI mode named ZENMAP.    Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts.    Nmap runs on all major computer operating systems, and official binary packages are availabl