Posts

Showing posts with the label cyber

How is a cyber attack from photos?

Image
How is a cyber attack from photos? You need to be very careful about keeping your device and your data safe from viruses, phishing, and infected Wi-Fi networks. One of the most overlooked areas of data security challenges is photography. Many people may not know that the photos on our devices can also contain malware.

The dangerous and mysterious world of hackers

Image
 The dangerous and mysterious world of hackers The war is no longer fought only in the forests, mountains, and plains as before. Now the new battlefield is cyberspace. That is why all the powers of the world are trying to strengthen their cyber power. Part of this effort is the hacking army. However, no country in the world is openly saying that we are preparing a hacking army. But different countries have been preparing and practicing it for a long time. Today we are going to tell you about the dangerous and mysterious world of hackers based in Iran, Russia, and North Korea. Russia - Hacker's Hero In the 1990s, Russian police were unaware of cybercrime. After the breakup of the Soviet Union, many Russian electrical engineers and mathematicians became unemployed. At the same time, they began to explore the world of the Internet for a living. At the time, Russia was not very sensitive about cybersecurity. Andrei Shoshnikoff, a Russian investigative journalist, said: "The hackin

Chinese hackers spreading undetectable malware for espionage

Image
Chinese hackers spreading undetectable malware for espionage Researchers at cybersecurity company Kaspersky have uncovered an Advanced Persistent Threat (APT) spying campaign that uses a rare type of malware. Kaspersky reports that the Chinese-speaking hacker group has been using rootkits called "MosaicRegressor" for two years to target NGOs and diplomatic missions for espionage campaigns. The researchers said that it would be difficult to detect and remove the malware used for spying in Asia, Africa, and Europe. This malware affects the computer's Unified Extended Firmware Interface (UEFI), which was introduced before the operating system and other programs. This means that no security software or antivirus can detect this malware. However, Kaspersky has stated that this malware is unusual but not unique. The UEFI bootkit component used to insert malicious code into the user's device is based on the vector EDK bootkit. It was created by a hacking team in 2015 and lea

Security vulnerabilities in popular antivirus software!

Image
Security vulnerabilities in popular antivirus software!  Cybersecurity researchers have revealed that popular antivirus software has security vulnerabilities. According to a report released by CyberArc Lab, such vulnerabilities have been used by cyber-attackers to increase their presence in computer systems and to infiltrate compromised systems with malware. According to the report, such vulnerabilities in antivirus products have made the system more vulnerable to file manipulation attacks. This allows the malware to easily penetrate the compromised system. This type of bug has affected many antivirus solutions. Among them are Kaspersky, McAfee, Symantec, Fortinet, Checkpoint, Trend Micro, Avira, and Microsoft Defender. Currently, all of these software bugs have been addressed by their respective manufacturers, but users are beginning to mistrust the security method. This type of bug allows the attacker to delete files from anywhere in the system. It also allows bad characters to delet

Chinese and North Korean hacker's 'transit' Nepal! Indian concern right or wrong?

Image
Chinese and North Korean hacker's 'transit' Nepal! Indian concern right or wrong? Indian media has published the news that hackers from China and North Korea have made a strong presence in Nepal and are spying on India. According to a recent report by Zee News India, Nepal's KP Oli government is becoming a hub for China's State Security Bureau, Beijing's Intelligence Army, and North Korean cyber and money laundering stage operations. In the news, it has been mentioned that the clear source of Nepal Hub has not been revealed by the 'official source'. Citing sources, North Korean hackers have been working with Chinese intelligence agencies to target the Indian system, disrupting the banking system, and stealing sensitive technology. According to the news, the hackers are trying to hack into the Indian system by injecting special computer programs like Icebug, Hidden Linux, and APT 12. It has also been mentioned that Chinese and North Korean hackers have be

Attack after temptation

Image
 Attack after temptation Knowing that her picture was circulating on a porn site, the disoriented girl approached the police. It is known that the picture was made by distorting one of his own taken a year ago. Many women like him were distorted. This is what happened in Singapore last year. In July last year, a young woman from Hyderabad approached the police on the same charge. The accused chased after him and secretly took pictures. He distorted that picture and left it on a site. The link between the two events is the same. That is, the images were distorted using an app called DipNude. The app was launched in April last year by a company in Estonia, a European country. With this app running on artificial intelligence or artificial intelligence, any ordinary picture of a human being could be turned into a nude picture. Within a couple of months, there was a storm of criticism as the app began to be abused around the world. The company acknowledges that the app was created for "

Deep nude issue

Image
Deep nude issue Why in the discussion? Cybercrime officials of India are tracking apps and websites that make naked photos of common people using Artificial Intelligence algorithms. key points: About Deep Nude: Nude photos and videos made with computer help are called Deep Nude. Cybercriminals impose naked content on video, audio, and photographs with the help of artificial intelligence software. By using artificial intelligence algorithms, imposing a person's manner of speaking, head and face movements with another person makes it difficult to tell whether these videos/photos are true or false. The veracity of these computer-generated videos/pictures can only be checked through in-depth analysis. In 2017, for the first time, a person posted an account of naked content on social media by creating an account named 'Deepfake', then the trend of creating such apps and websites increased worldwide. Prominent among the maker make makes are FaceApp and Deep Nude. Effects of deep