Even if security experts continue to make awareness campaign, people continue to use bad passwords exposing their data to the risk of hack. Bad habits are hard to die, 123456 is the most used password ... Read More
1. Do not give any personal information (name, address, bank details, email or phone number) to organisations or people before verifying their credentials. Always question unsolicited calls, texts or emails requesting your personal or financial ... Read More
Payment/ bank card fraud involves the compromise of any personal information from credit, debit or store cards. The personal information stolen from a card, or the theft of a card itself, can be used to ... Read More
Karachi-based Bank Islami acknowledged on Sunday of suffering a security breach of its payment cards system but denied reports of having lost an alleged $6 million in what local press have called the biggest cyber-attack ... Read More
The Pakistani hacker group is attempting to attack government organizations using the infrastructure it also uses to send spam to malware. According to researchers from Palo Alto Networks Unit 42, the group Gorgon Group is ... Read More
Afghan diplomats in Pakistan have been warned they are believed to be victims of "government-backed" cyber attacks trying to steal their email passwords.Afghan embassy sources told the BBC two staff members and a generic account received ... Read More
Fake News & Social Media Propaganda – Impact and Effects on Election Campaigns and polls in Pakistan When Channel4 investigated Cambridge Analytica, the company’s bosses boasted of helping swing last year’s presidential election in Kenya ... Read More
Careem on Monday warned its users that their personal data had been compromised in a massive cyber-security breach.The company stated that sensitive information like customers' names, email addresses, phone numbers and trip history data had ... Read More
The UK Govt announced that it has conducted a "major offensive cyber-campaign" against the Islamic State (Daesh) group, the director of the intelligence agency GCHQ has revealed. This operation has hindered the group's ability to ... Read More
Experts at FireEye have uncovered a new massive phishing campaign conducted by TEMP.Zagros group. This group is targeting Asia and Middle East regions. These Iranian hackers were most active in this period, researchers uncovered a ... Read More
If the user have JAVA (or python or similar interpreters) an attacker can insert jar file or py file into the presentation and trigger it when mouse moves, for easier exploitation the attacker can use ppsx file which will load automatically in presentation mode and once the user opens the file and moves mouse it will trigger the payload.
Pakistan Army has proposed a new alternative network along the China-Pakistan Economic Corridor (CPEC) route for secured flow of the internet traffic as the current framework involve Indian companies posing security risk.
If the file is executed, Carbanak’s VBScript malware will see itself triggered. From here, the malware then proceeds to send and receive commands “to and from” Google services such as Google Apps Script, Google Sheets and Google Forms services.
The move by the technology companies, which is expected to begin in early 2017, aims to assuage government concerns and derail proposed new federal legislation over social media content that is seen as increasingly driving ‘recruitment’ and ‘radicalization’, while also balancing free speech issues.In Pakistan , people can use Surf Safe Pakistan web portal to report terrorist and extremist content online.
CK uses a well known shell as a backdoor which is known as the WSO shell. It stores the backdoor in a file called wp-ajax.php which is made to look like a legitimate WordPress core file.It is affecting wordpress websites all around the world and specially in Pakistan on industrial scale.