Data Security News Headlines 24th June, 2016

  1.  This malware puts 90% of Android devices at risk

A family of mobile malware called “Godless” malware discovered by the folks at Trend Micro affected over 850,000 Android devices worldwide with almost half of these devices in India alone, a new report said on Thursday. It contains various exploits and it can root a device and it can even install spyware,” the report warned. By having multiple exploits to use, ‘Godless’ can target virtually any Android device running on outdated Android OS. Once it is installed in the system it able to do malicious activities such as data theft, spying, installing malicious software.

Cyber Security Tips:To protect from such malicious apps use updated operating system, update antivirus, update your apps, and download the apps from trusted site.

  1. Supreme court allows the FBI to hack any computer in the word.

 The US Supreme Court has approved to change Rule 41, which now gives judges the authority to issue search warrants, not only for computers located in their jurisdiction but also outside their jurisdiction. Under the original Rule 41, let’s say, a New York judge can only authorize the FBI to hack into a suspect’s computer in New York. But the changes in rule 41 would now make it easier for the FBI to hack into any computer or network, literally anywhere in the world.

Under the proposed rules, the government would now be able to obtain a single warrant to access and search thousands or millions of computers at once; and also FDI can hack TOR users legally.

  1. 285 Indians in ‘kill list’ released by pro-Isis hacker group on Telegram app

As many as 285 Indians were reportedly named in a “kill list” released by a pro-Islamic State or Isis hacking group called United Cyber Caliphate (UCC) on Wednesday on its private Telegram channel — a instant messaging app. Among those named in a list of 4,681 people from across the world are many civilians who have no animosity towards Daesh. The purpose of these kill lists — this is not the first to be released by a pro-Isis hacking group — is to spread fear among common citizens, alert security forces and grab media attention, said SITE intelligence group — a counter terrorism organization that tracks and analyses jihadi networks and global terrorism.

  1. GozNym Trojan turns its sight on business accounts at major US banks

The malware redirects victims to perfect replicas of online banking websites. GozNym is a relatively new threat, first discovered in April, and is based on the Nymaim malware dropper and the Gozi banking Trojan. Like most banking Trojans, GozNym can inject rogue code into banking websites displayed in local browsers in order to steal credentials and other sensitive information.

Cyber Security Tips: Solution to prevent from such Trojan, protect banking website with, use web application firewall, test banking application for redirection, input validation with web application scanner

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Blog at WordPress.com.

Up ↑

%d bloggers like this: