Data Security News Headlines 7th July, 2016

  1. HummingBad’ malware affects 85 million Android devices

Almost 85 million devices running on Google’s mobile operating system have got infected by a malware called HummingBad. The security company further claims that the majority of the HummingBad victims are in India and China. The malware affects most almost all Android OS versions; however, the most affected are devices running on Android KitKat and Android Jelly Bean. HummingBad malware is a “drive-by download attack” that users face when they visit certain websites. It includes two components: First component tries to gain root access on the Android device to exploit vulnerabilities. This could give hackers full access to the device. If the first component is not able to root the device, the second component shows a fake system update notification, tricking users to unknowingly grant system-level access to the HummingBad malware

Cyber security Tips: To prevent from this attacks use antivirus in your system, update antivirus, do not click on any ad, avoid opening spam mails.

  1. Pandora warn users change passwords after data releases online

Pandora hasn’t been hacked, but its user’s accounts could be. Pandora is warning it’s users to change their passwords thanks to a breach in a different service leading to hacking risks. A “data dump” from a different service that was recently released to the public that contains usernames and passwords of users.Although Pandora’s systems weren’t hacked themselves the risk is that many use the same username and password across various different services and platforms. Unfortunately the issue of login details being hacked and sold on the Deep Web is more prevalent than it may seem.

Cyber security Tips: If you’re a Pandora user, especially if you’ve received that email, you may want to go set a new password to protect your account, use strong password for your account, check mail before changing password.

  1. TP-Link forgets to renew and loses its domain used to configured router setting

TP-Link has reportedly “forgotten” to renew both domains that are used to configure its routers and access administrative panels of its devices. Networking equipment vendor TP-LINK uses either or for its routers configuration. Although users can also access their router administration panel through local IP address (i.e. first domain offered by the company is used to configure TP-LINK routers and the second is used for TP-LINK Wi-Fi extenders. Both domains have now been re-registered using an anonymous registration service by an unknown entity and are being offered for sale online at US$2.5 Million each.If malicious actors get their hands on these domains, they could use them to distribute malware, serve phishing pages instructing users to “download new firmware to your router,” and request device or social media credentials from users before redirecting them to the router’s local admin panel IP.

Cyber security tips: for this avoid accessing their TP-Link routers using the domain, recommended Internet Service Providers (ISPs) to block the affected domain names.

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Create a free website or blog at

Up ↑

%d bloggers like this: