Jump to content

Search the Community

Showing results for tags 'backdoors'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Categories

  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Categories

  • General News
  • File Sharing News
  • Mobile News
  • Software News
  • Security & Privacy News
  • Technology News

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 7 results

  1. Cybersecurity researchers have disclosed details about a new watering hole attack targeting the Korean diaspora that exploits vulnerabilities in web browsers such as Google Chrome and Internet Explorer to deploy malware for espionage purposes. Dubbed "Operation Earth Kitsune" by Trend Micro, the campaign involves the use of SLUB (for SLack and githUB) malware and two new backdoors — dneSpy and agfSpy — to exfiltrate system information and gain additional control of the compromised machine. The attacks were observed during the months of March, May, and Septe
  2. Attackers Hide Backdoors and Cryptominers in WAV Audio Files Attackers behind a new malicious campaign are using WAV audio files to hide and drop backdoors and Monero cryptominers on their targets' systems as BlackBerry Cylance threat researchers discovered. While various other malware peddlers were previously observed injecting payloads in JPEG or PNG image files [1, 2, 3] with the help of steganography, a well-known technique used to evade an
  3. Microsoft CEO believes backdoors aren't the answer Satya Nadella chooses privacy and public safety over backdoors (Image credit: Mike Moore) As Apple is once again in the midst of another fight over encryption following a recent shooting at Pensacola naval base, Microsoft CEO Satya Nadella weighed in with his thoughts on the encryption question. During a recent meeting with reporters, Nadella reiterated Microsoft's opposition to encryption backdoors while also expressing support for future legal and technical solutions,
  4. Chinese hacking group backdoors products from three Asian gaming companies ESET suspects that tens or hundreds of thousands of users have been infected already. Image: Screengrab of Infestation homepage A notorious Chinese cyber-espionage outfit known as the Winnti Group has breached the networks of two game makers and a gaming platform in Asia to include a backdoor trojan within their products. Two of the compromised products no lo
  5. Criminals are distributing fake VPN installers with backdoors built in Another reason to always download VPN clients directly from a provider's website (Image credit: Shutterstock) The recent shift to remote working has led users to turn to VPN services to stay secure and protect their privacy online but new research from Trend Micro has revealed that cybercriminals are now distributing fake VPN installers with backdoors. The firm's researchers discovered VPN installers for Windscribe being distributed online that also i
  6. Telecom kit maker points finger in the general direction of Middle Kingdom's complicated supply chain Hardware video encoders from multiple suppliers contain several critical security bugs that allow a remote unauthenticated miscreant to run arbitrary code on the equipment. In a disclosure published this week, Alexei Kojenov, lead product security engineer at Salesforce, outlined a series of flaws affecting IPTV/H.264/H.265 video encoders powered by the hi3520d chipset from Huawei's HiSilicon subsidiary. The security holes are present in software, wh
  7. Tor is still DHE 1024 (NSA crackable) After more revelations, and expert analysis, we still aren't precisely sure what crypto the NSA can break. But everyone seems to agree that if anything, the NSA can break 1024 RSA/DH keys. Assuming no "breakthroughs", the NSA can spend $1 billion on custom chips that can break such a key in a few hours. We know the NSA builds custom chips, they've got fairly public deals with IBM foundries to build chips. The problem with Tor is that it still uses these 1024 bit keys for much of its crypto, particularly because most people are still using older versions o
×
×
  • Create New...