Technology

Major Updates about technology in Pakistan.

February 12, 2017

Financial Monitoring Unit (FMU) Pakistan – Anti-Money Laundering Software

with a little help from the UK government and the UN Office of Drugs and Crime, an automated system will track millions of transactions and be able to flag suspicious ones instead of the authorities having to wait for banks.
February 11, 2017

Year 2016 – 50,362 cyber security incidents were logged in India (CERT-In)

The attacks are observed to be originating from various countries including China, Germany, Hong Kong, Japan, Malaysia, Pakistan, Romania, the UK, the US, Syria, the UAE and Italy.
February 11, 2017

HACKING CAMPAIGN TARGETING MINISTRY AND EMBASSY SITES

malicious reconnaissance campaign that targets websites. It is unknown what is the intent behind the campaign as of this writing, however, the profile of the targets resembles those that are common targets of Advanced Persistent Threat (APT) actors. As the attack is currently active, it effectively turns compromised sites into attack surfaces against their visitors.
February 6, 2017

Anonymous Hacktivist group hacks 10,613 Tor Websites On Dark Web

Hacktivist group Anonymous hacks the company servers Freedom Hosting II and lay down some 10,000 web pages based on Tor, representing almost 20% of the web deep. Hackers claim that at least half of the web pages were child pornography.
February 3, 2017

Russian hackers group ” Turla ” uses new JavaScript Malware KopiLuwak

The Russia-linked cyber espionage group known as Turla is using a new piece of JavaScript malware KopiLuwak , Kaspersky Lab reported on Thursday.
February 3, 2017

New Phishing Techniques – Amazon and PayPal fraudsters ‘up their game’ with fake messages

Our experts confirm spoofing contact details is easy to do. There are a number of websites who offer the service as a way to "prank" your friends.Not saying these sites are set up for criminals but are they taking into account that fraudsters are making use of the spoofing services.
February 3, 2017

Tier3 Pakistan partners with STOP. THINK. CONNECT.

Tier3 Pakistan partners with STOP. THINK. CONNECT.     February 3, 2017 — Tier3 Cyber Security Services today announced that it has signed on as its  partner of STOP. […]
February 2, 2017

Microsoft Power Point 2016, Java Code Execution

If the user have JAVA (or python or similar interpreters) an attacker can insert jar file or py file into the presentation and trigger it when mouse moves, for easier exploitation the attacker can use ppsx file which will load automatically in presentation mode and once the user opens the file and moves mouse it will trigger the payload.