Thursday, July 19Care to be aware

Cyber News

HBO Tries To Defeat Game Of Thrones Torrent Pirate Army, Sends Warning Messages

HBO Tries To Defeat Game Of Thrones Torrent Pirate Army, Sends Warning Messages

Cyber News, In Buzz
HBO renewed their popular TV show last week for Season 7 and we aren’t much surprised to see the pirate world’s quickness in trying to grab a free copy of their favorite TV show. The first episode of the Game of Thrones Season 7 was uploaded to various platforms on the web on Sunday, the same day the episode was premiered. And the pirates across the globe spent no time in downloading the episode. But HBO isn’t blind; it can very well see all of the illegal stuff going right under its nose. Similar to what happened last year, HBO’s anti-piracy partner IP Echelon has started sending DMCA notices to the ISPs of the alleged pirates in question who are then asked to notify the concerned pirates. TorrentFreak notes in their report that according to the US copyright law, it isn’t obliga
GhostCtrl Android Malware Steals Your Private Data And Records Audio, Video

GhostCtrl Android Malware Steals Your Private Data And Records Audio, Video

0 Day Attacks, Cyber News
In late June, the Trend Micro security researchers were able to find an information stealing malware named RETADUP. As per further research, it was found that RETADUP was accompanied by an even more dangerous malware that targets Android devices. This Android malware has been named GhostCtrl as it can take control over your Android smartphone. This malware is based on the popular RAT (Remote Access Trojan) OmniRAT, which has the power to remotely control machines running Windows, Linux, and macOS. Like many other Android malware, GhostCtrl also hides behind the curtains and masquerades as popular apps like WhatsApp, MMS, Pokemon Go, etc. The main APK of the malware has backdoor functions, which are named com.android.engine to mislead the users. After connecting to Control &
Microsoft Is Giving Away Millions Of E-Books For Free, Download Them Right Now

Microsoft Is Giving Away Millions Of E-Books For Free, Download Them Right Now

Cyber News, Cyber Security, In Buzz
Ligman says it has been several years since he started giving e-books for free and the response has been quite good. This year’s giveaway includes more e-books, and he has also streamlined the list to make it easier for the users to find relevant ones and their download links. There are approximately 300 titles which are meant for various Microsoft products and services including: E-Books For Windows 10, Windows Server E-Books For PowerShell E-Books For Azure E-Books For Cloud E-Books For Microsoft Office 2013, 2016, and 365 E-Books For Power BI E-Books For Microsoft SharePoint E-Books For SQL Server E-Books For Microsoft System Center   How to download the free Microsoft e-books? There are two ways to download the free e-books available as a p
SpyDealer Malware Hacks Your Facebook, WhatsApp, Web Browser, And Other Android Apps

SpyDealer Malware Hacks Your Facebook, WhatsApp, Web Browser, And Other Android Apps

0 Day Attacks, Cyber News, Cyber Security
A few days ago I told you about the CopyCat malware for Android smartphone that infected about 14 million devices and the malware authors earned about $1.5 million via fraudulent ads. Now, the security researchers at Palo Alto Network have identified a malware that has the power to hack 40 or more social media accounts. Before going ahead and tell you the details of the malware, let me inform you that this malware, called SpyDealer, affects only the Android versions between 4.4 KitKat and 2.2 Froyo. These users account for about 25% of the total Android users, i.e., 500 million. What does SpyDealer malware do? SpyDealer has advanced capabilities like exfiltrating data private data from more than 40 popular apps. The list of the targeted apps includes the following: WeChat, Face...
This Website Auto Sends Spoilers To Your Enemies, Ruins Their Life

This Website Auto Sends Spoilers To Your Enemies, Ruins Their Life

Cyber News, Cyber Security, In Buzz
Benitez has created a website named Spoil Your Enemies and it does what is says; it destroys the life of your enemies and even friends by sending them TV show spoilers. What’s more is the information is sent via SMS, so, if the other person is isolated from the internet to protect himself, he/she still not safe. Also, the sender being anonymous makes the target totally unsuspecting of what’s coming. It appears our post about blocking movie and TV show spoilers won’t work in this case because the website uses the vintage Short Message Service to deliver the spoilers. On the about page, he says that his motivation behind creating such thing is his friends who constantly told him spoilers about his favorite TV shows. “They drove me nuts,” he adds. It took around two weeks for
World’s First Wireless Charging Laptop Launched By Dell

World’s First Wireless Charging Laptop Launched By Dell

Cyber News, In Buzz
The first laptop in the world to feature the wireless charging feature is the Dell Latitude 7285 which is now available with a price tag of $1,199.99 for the starting model and $2,139 for the highest priced. The 2-in-1 hybrid device was first announced at the CES 2017 event in January earlier this year. The company had partnered with the American company WiTricity whose wireless charging tech has been included in the device. Although, the laptop can be charged without wires but requires an external detachable keyboard unit and a wireless charging mat achieve the functionality. These accessories are sold separately and put an extra burden of $549.99 in your pocket. The specification for $1,199 Latitude 7285 include an Intel Core i5-7Y54 processor, 128GB SSD, 8GB RAM, 12.3-inch
Make sure you’re using the real Tor Browser

Make sure you’re using the real Tor Browser

0 Day Attacks, Cyber News, Cyber Security
Dark Web is the part of the world wide web which is beyond the reach of normal search engines and is accessible with the help of specific tools like the Tor Browser. The dark web has a lot of shady and illegal stuff. But what’s shadier is a fake Tor browser that’s being promoted among the users in the form of YouTube videos. The fake Tor Browser was spotted last week by Lawrence Abrams of Bleeping Computer. The said YouTube videos are tutorials to teach users about buying stuff from a Dark Web marketplace known as The Rodeo. Fake Tor Connection The only way you can relate the imposter web browser to Rodeo is that it carries the name in the title bar. After further digging, it was found that the software carries Tor’s UI and houses .NET code under the hood. Most of the options and b
Now You Can Send Almost Any File Using WhatsApp, Even APKs And Setup Files

Now You Can Send Almost Any File Using WhatsApp, Even APKs And Setup Files

Cyber News, In Buzz
After almost a month of testing, WhatsApp has finally made their file sharing feature truly amazing. Now, WhatsApp allows you to send files of almost any type, be it a software, Android APK, or some other format. You can send them using the Documents options when sharing files with your contacts. To send a particular file on Android: Open the Contact to which you want to send the file. Tap the Attachment button. Tap Document. Tap Browser other docs… Now, select the file you want and tap the Send button. It’ll take a while to upload the file depending on its size. To send more than one file. Long press one file and select the others.   The feature also works for WhatsApp Web making it easier to share software setup files without the pain of uploading it on
5 New CIA Malware Unveiled By WikiLeaks – HTTPBrowser, NfLog, Regin, HammerLoss, Gamker

5 New CIA Malware Unveiled By WikiLeaks – HTTPBrowser, NfLog, Regin, HammerLoss, Gamker

0 Day Attacks, Cyber News
Since early 2017, whistleblower website WikiLeaks has been publishing secret CIA documents and the malware used by them to take control of all sort of electronic devices. In the ongoing Vault 7 series, WikiLeaks has recently published documents from CIA contractor Raytheon Blackbird Technologies. The leaked documents were submitted to the CIA between 21st Nov 2014 and 11th Sep 2015. The documents submitted by Raytheon contained proof-of-concept assessments for malware attack vectors. It should be noted that Raytheon acted as a technology scout for CIA’s Remote Development Branch (RDB). The scout made recommendations to the CIA teams for further research and malware development. So, without further delay, let’s tell you about the 5 CIA-Raytheon malware described in the leaked d
Google for jobs : Looking for a new job is getting easier

Google for jobs : Looking for a new job is getting easier

Cyber News, Cyber Security, In Buzz
After making the announcement about a new job search tool at this year’s Google I/O conference, the search giant finally rolled out Google For Jobs yesterday. The platform helps both job seekers employers connect with each other, Google says. As already known, the AI-powered job search engine displays job listings from other leading portals like Monster, Linkedin, WayUp, DirectEmployers, CareerBuilder, Glassdoor, etc. The service is currently available in the United States where people can make job-related queries like “jobs near me” in Google Search Various filters allow people to narrow down jobs based on their location, job title, employer reviews, and other things. Google For Jobs can also send email alerts when new listings arrive. Cloud Jobs API, announced last ye