Author: John Wiley

John Wiley is a Cyber security Evangelist, Researcher, Author & Speaker. He is a Security Writer & Editor-in-Chief, Author of W-Se Web Security Council.

Ransomware Spreads DopplePaymer via Committed Credentials: Microsoft

The DopplePaymer ransomware spreads over current Domain Admin accounts, not exploiting the vulnerabilities targeting BlueKeep, Microsoft notes. The malware that security researchers believe is involved in the recent attack against the state-owned Mexican petroleum company Petróleos Mexicanos (Pemex), has been running since June 2019, with some earlier samples dating to April 2019. DopplePaymer was originally…

Cryptocurrency Stealer Official Monero Website Stealer

The Monero Cryptocurrency official website was recently hacked and the attackers replaced a fake version of legal wallet files available for download. The infringement of the Linux CLI wallet was discovered on November 18 after somebody found that it did not match the hashings provided by software developers. An investigation has shown that a fake…

Installing Kali Linux in Android

Android is regarded as the kernel-based Linux operating system that has been storming the mobile computer market since 2008. Although it’s based on a Linux kernel, it doesn’t function as a standard Linux distribution such as Ubuntu, Fedora, Debian and so on, but uses a Java virtual machine variant called Android RunTime that doesn’t support…

Microsoft is Providing Windows with DNS Over HTTPS (DoH)

This week, Microsoft announced plans to implement HTTPS (DoH) DNS in Windows 10 to ensure as secure as possible user traffic. Helping DoH for Windows already means encrypted DNS queries in Chrome and Firefox that effectively close plain-text domain names transmissions in common web traffic, contributing to a safer overall Internet ecosystem. DNS authentication does…

How to Read Other Facebook Messages Without You

Today, Facebook is an important part of our everyday lives; millions of people around the world use Facebook daily and interaction has been significantly redefined. It also paves the way for networking people, mobilizing large numbers of people to do many organized things to improve society. Hacking in a Facebook inbox and reading emails has…

Stop Supporting Cortana for Android and iOS by Microsoft

Microsoft has announced the Cortana Virtual Personal Assistant software for Android and iOS phones will no longer be supported beginning in 2020. Microsoft said in support reports from the UK, Australia and Canada markets it will no longer support Cortana’s IOS and Android digital assistant applications on January 31st, 2020. Alternatively, Microsoft will incorporate Cortana…

Siemens PLCs are Exposed to Attacks by Undocumented Access Feature

Siemens addresses a vulnerability which a skilful attacker can exploit in executing arbitrary code on its programmable logic controller (PLC) SIMATIC S7-1200 by abussing hardware based access mode. The analyzes of Siemens S7-1200 PLCs, which, according to Siemens, are for discrete and continuous control in industrial environments, including manufacturing, chemical and food-and-beverage industries have been…

New Safety Laboratory GitHub Aims to Protect Open Source Software

GitHub unveiled this week GitHub Security Lab, a new initiative that aims to improve the security of open source software. While GitHub Security Lab helps to recognize and report security vulnerabilities, developers and maintainers can use GitHub to repair, manage and upgrade projects. GitHub’s efforts are already funded by several technology companies, who are committed…

Ten Best Network Security Scanning Tools

In today’s world, network security needs no introduction or explanation. We all know that the term network security means securing any computer network so that nobody accesses, manipulates or malfunctions the network in any way. Therefore, we have rules, policies and instructions concerning computer network monitoring and security. Network scanning is integral to the maintenance…

Payment Monitoring Carding Robots Prior to Major Shopping Events

As the main events of the holiday season end, cyber criminals often plan for pillage by validating their stolen card data with low-value shopping on store websites. Two new carding bots are found using top e-commerce platforms and card payment provider APIs for websites or mobile applications. Preparation for a spree shopping Stolen payment card…