Data Security News Headlines 7th December, 2016

  1. Cyber cell nabs Surat duo for Rs 19 lakh fraud

AHMEDABAD: A team of cyber cell of city crime branch arrested two men for their alleged involvement in a Nigerian scam. According to the cyber cell officials, an Ahmedabad-based trader had registered a complaint that he had received a mail on October 27 where the sender had identified himself as a supplier of petroleum chemicals. Mail contain that trading in the chemical is very lucrative for many African countries and asked the victim to invest in it. Believing him, the victim over the period of three months paid Rs19.43 lakh for procuring the chemical. But when suppliers kept asking for more money, he realized that he was taken for a ride and approached police.

Cyber Security Tips: To prevent from such fraud, make sure before releasing payment, also check for email which is send by the supplier and avoid to release payment without verification.

  1. North Korea’s Linux-based red star OS can be hacked

Red Star OS is North Korea’s own homegrown OS that looks remarkably just like Apple’s OS X and gives North Korean authorities more control over the computers, providing not only security but also spying tools and also government can be easily trace user. According to the information security company Hacker House, Red Star OS contains a critical vulnerability t possible for hackers to gain remote access to any PC running North Korea’s OS just by tricking victims into opening a hyperlink. The latest version of Red Star OS ships with a Firefox-based web browser called Naenara, and according to researchers, the “trivial remote exploit attack vectors” contained in the web browser allows attackers to hack into the system. This security flaw can be used easily to install malware or exploit PCs running the Red Star operating system. Company not given any update for it.

Cyber Security Tips:  If you are using Red Star OS avoid to click on link, wait until update available and Red Star OS team need to patch the flaw as soon as possible.

  1. Credit card can be hacked within 6 second!

Researcher had found new credit card attack named Distributed Guessing Attack. The issue relies on the Visa payment system, where an attacker can guess and attempt all possible permutations and combinations of expiration dates and CVV numbers on hundreds of websites. Researchers have found two vulnerability in VISA payment system. First is online payment systems do not detect multiple incorrect payment requests, also allow a maximum of 20 attempts per card on each site. Second Web sites do not run checks regularly, varying the card information requested. Attack Scenario: First, an attacker needs a card’s 16-digit number, which can be obtained either from black-market websites for less than $1, or from a smartphone equipped with a near-field communication (NFC) reader to skim them. Once a valid 16-digit number is obtained, the hacker use web bots to brute force three-digit card verification value (or CVV) and expiration date to hundreds of retailers at once. The CVV takes a maximum of 1,000 guesses to crack it and the expiry date takes no more than 60 attempts.

Cyber Security Tips: If you own VISA card then avoid using Visa credit or debit cards for making online payments, always keep an eye on your statements, and keep spending limit on your Visa card as low as possible.

  1. Man sentenced for hacking celebrity emails

NEW YORK — a man is arrested for hacking celebrities email. The man stealing scripts and personal information from celebrities. According to report A Bahamian man who boasted after his arrest for hacking into celebrities’ email accounts that he will someday write a book to “shake up Hollywood” had the book thrown at him Tuesday by a federal judge who said five years in prison was the only way to keep him from harming victims. The reason of hacking and hacked person name is not displayed yet.

Cyber Security Tips: To prevent from such hacking, keep your password strong, use two way authentication and avoid opening spam emails.

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Blog at

Up ↑

%d bloggers like this: