We are back with THN Weekly RoundUp to spread lights on last week's top cyber security threats and challenges, just in case you missed any of them (ICYMI).
Last week, we came to know about many security threats including how Google records and stores our Voice searches, How hackers can use Radio-waves to control our Smartphones from 16 feet away and How did the NSA break Trillions of Encrypted connections.
I recommend you to read the entire news (just click 'Read More' because there's some valuable advice in there as well).
Here's the list:
1. Google OnHub Router Runs on Chrome OS; Here's How to Root it
Google OnHub Router runs Chrome operating system, the same Linux-based OS that powers Google Chromebook laptops and desktops.
Google OnHub is a modern wireless router designed by Google and TP-Link. It operates networks on both the 2.4GHz & 5GHz frequency bands simultaneously and offers the speed of up to 1900 Mbps.
Unlike other traditional Broadband Routers, OnHub is designed to support "The Internet of Things" and other Smart devices, including Smartphones, Smart TVs, and Computers.
To know how to Root Google OnHub Router, Read More…
2. USB Killer v2.0 — USB Device that Can Easily Burn Your PC
After developing Killer USB back in March, a Russian security researcher, nicknamed Dark Purple, has launched a new version of the computer frying USB Killer pen drive – USB Killer version 2.0.
USB Killer 2.0 is much stronger than Killer USB and is capable to "kill" more than just a computer it is plugged in.
To know how USB Killer 2.0 can kill your PC, Read More…
3. Google Records and Stores Your Voice — But Thankfully You can Delete it
Yes, Google isn't just listening to you, but the search engine is also recording and storing every single voice search you make using its voice-activated assistant Google's Voice Search and search feature Google Now.
You can listen to your own voice recording by visiting "Voice & Audio Activity" page in the Google Dashboard.
To know more about how is Google recording your voice searches and how you can delete them, Read More…
4. Engineer Built A Thor-Like Hammer that Only He Can Pick Up
Inspired by Thor's legendary hammer Mjolnir, an electrical engineer has devised a real-life Mjolnir that is not liftable by anyone except him.
With only a little bit of programming, Allen Pan created a giant hammer that only he can lift, as long as the hammer is on a metal surface.
To watch the video and know how Pan made it work, Read More…
5. Hackers Can Use Radio-waves to Control Your Smartphone From 16 Feet Away
Researchers from French government agency ANSSI have discovered a new hack that could allow hackers to make calls, send texts, browser a malware site, and do many more activities using…
…your iOS or Android devices' personal assistant Siri or Google Now — without even speaking a single word.
This mind-blowing hack utilizes a radio transmitter to remotely and silently transmit radio commands to iOS or Android smartphone from as far as 16 feet away only if it has a pair of headphones plugged into its jack.
To watch the video demonstration and know how hackers can make it possible, Read More…
6. Windows 10 Upgrade Become More Aggressive, No Option to Opt-Out
Last week, Microsoft was caught forcing its users running Windows 7 and Windows 8/8.1 to install Windows 10 on their PCs, giving them no option to cancel or opt-out of upgrading.
Some Windows 7 and Windows 8.1 users claimed last week that Windows 10 began to automatically install itself on their PCs and…
…users were presented a message displaying that the "Upgrade to Windows 10 is Ready," which prompted them to "Restart your PC to begin the installation."
For in-depth information about the issue, Read More…
7. World's First Anti-Drone Weapon to Shoot Down UAVs with Radio Waves
The US company Battelle has developed a shoulder-mounted rifle, dubbed DroneDefender, which is specially designed to knock drones out of the sky at a range of 400 meters, without purposefully damaging them.
DroneDefender uses radio waves to neutralize in-flight Drones and force them to either land or hover in its position or return to its point of origin.
To watch the video that shows how the weapon causes the drone to land and to know how DroneDefender works, Read More…
8. How NSA successfully Broke Trillions of Encrypted Connections
Everyone is aware of the United States National Security Agency (NSA) powers to break almost all types of encryption used on the Internet and intercept nearly Trillions of Internet connections…
…exactly how did the agency apparently intercept VPN connections, and decrypt SSH and HTTPS has been a mystery until the researchers spread lights on the most plausible theory.
According to researchers, the NSA has exploited the weakness in the standard implementations of the Diffie-Hellman algorithm – a common means of exchanging cryptographic keys over untrusted channels – to decrypt a vast number of HTTPS, SSH, and VPN connections.
For in-depth information, Read More…
9. ISIS Hacker Arrested in Malaysia
Kosovo citizen Ardit Ferizi has been arrested for allegedly hacking into the United States web hosting company's servers, stealing personal data of more than 1,300 US government and military employees, and then passing that data to an ISIS member.
Ferizi allegedly handed the hacked information over to Junaid Hussain (or Abu Hussain Al-Britani), an ISIS hacker who was killed in a United States drone strike in August.
For detail information, Read More…
10. Adobe Releases Emergency Patch for Recent Flash Zero-Day Flaw
The Zero-day vulnerability in the freshly patched Adobe Flash Player – which was exploited in the wild by "Pawn Storm" hacking group to target several foreign affairs ministries worldwide – has now been patched by the company.
The zero-day flaw (CVE-2015-7645) allowed hackers to remotely execute random code on the affected system via a crafted SWF (Small Web Format) file, an Adobe Flash File format for efficient delivery of video and audio over the web.
For in-depth information, Read More…
Popular Deals From Our Store
Ethical Hacking Certification Training
Get Professional Ethical Hacking Certifications: CEH, CHFI, CISM, CISA, CISSP Trainings.
96% Off Get this Deal
Computer Hacking Forensic Investigation
Online Hands-on Training with Lifetime Access to Forensic Investigation Certification Classes.
98% Off Get this Deal