69k LimeVPN users data breach

At Thursday,  limeVPN will be offline LimVPN (the world fastest network service provider and it is known as the no. 1 in security safety ) so it can’t be believable by anyone through  this site 69k user data leaked . According to reasearcher / 69,400 users data record hacked .According to them the hacker hacked their site before they keeping offline , and this is approved by a hacker . In this threat the hacker steal username , password and users public and private key encryption .

In the posting of form , hackers alert them they have users private keys , and this is a big problem for limeVPN users , because it means clearly if hackers have users public or private keys then they use public data for wrong intensions and they easily decrypted public or private keys . At wednesday , 10,000 users data for the purpose of sell on red forum keep that place by hackers and the next day site will be offline with the process of malware play game .

Reasearcher said that , they fight against them by a antivirus (malwarebytes) , but the proof of hacking found by slashX telegram channel , and the hacker take response for their hacking creativity , and site down .

In this Image very clearly see that hackers demand payment from users in dollar …..

Actully VPN payment method is different , it payment method is WHMLS (third party site ) and this site show a proof to dealing between users-hackers payment .

In recently , some days linkdin users data hacked and the hacker used their data to make fake profile and through social engineering and phishing attack they used for collect more information about users (as example debit card ,credit card information) , so plz be safe ..

Some safety tips from hackers ::
You keep your password be strength , mixed ( uppercase , lowercase , no. etc) not keep user dear name , cousin name and don’t keep that type password which is guessed by hackers . if you go any third party site use other email account for that site .

                 GOVCOINS

Government launches govcoins to bring down Bitcoin

Why government wants to bring down bitcoin ??

The government controls the country’s finance and economy with the help of central banks and financial institutions. After Bitcoin has become the mainstream, many central banks have lost their business, which is eventually a loss to the government. Thus, the government, as well as central banks, do not like bitcoin.

Bitcoin is not functional , foundational and it is decentralize the economic system , but government wants to make the economic system more functional and regain the lost power through govcoins .

Usually , public used cryptocurrency through an app in digital form , no cheque and card issues ,  so the govcoins is like this type coin in which you uses this through an app in digital era  . but we know that cryptocurrency against government policies because this currency used 80% of illegal work on dark web, so the government wants follow down bitcoin amongst public prospective , and at this place bring govcoins which is used in legal work and these coins under the government policies , and the most important thing is that interest per rate in this coin like a bitcoin . and more profitable thing is govcoins to it used debit card so for indians people  it is better to used govcoins comparison to bitcoin , because bitcoin not used debit card it is only used like paypal etc . so the main motive of govcoins is bring down bitcoin and i wish government motive will be successful among public .

LinkedIn data breach

What to do if u have been affected??

  • Remove your email address from your public LinkedIn profile to avoid it being scraped by a malicious third party in the future.
  • Beware of suspicious LinkedIn messages and connection requests from strangers.
  • Change the password of your LinkedIn and email accounts. 
  • Consider using a password manager to create strong passwords and store them securely.
  • Enable two-factor authentication (2FA) on all your online accounts.

What was shared by threat actors ??

  • LinkedIn summaries, some of which include other contact information
  • Full names
  • Email addresses
  • Locations
  • Professional titles and other work-related data

The hackers find new victim through malware and social engineering (human psychological thoughts read) and malware is the virus which steal your all data info through a virus and destroy your system ..

Recently , a 68MB JSON database containing LinkedIn data recently collected from 88,000 US business owners was shared on a popular hacker forum.

        2FA Authentication

The first thing in this 2FA authentication is that clearly 2FA is secured than any other authentication method , because 2FA adds an extra step in your login process and enabling if for every account , could be a little tiresome , but an unprotected password will make it easier for fraudsters to gain access to your bank account , debit / credit cards or social media accounts . If a person linked several accounts to use  same username and password then more chances to hack their all accounts by hackers through malware, phishing attack . In this case , if a hacker find an account link (username and password ) then through this your all data find by hackers . In 2FA the most weakness point is public keep very poor quality and small length passwords , which is related to family , cousin and your lover name , then this type password actully guessing by hackers very easily so if you wanted to secured your data then keep your password more strenthable , which is not guesses by anyone.Facebook, Twitter, WhatsApp, and Amazon also offer 2FA, but with similar levels of success.

   BITCOIN(TRENDING COIN)

Bitcoin is a digital currency which is created in 2009, it follows the ideas set out in a whitepaper by the mysterious person Satoshi Nakamoto . THe identity of the person who created this technology is still a mystery. this coin can’t see by anyone and can’t touch by anyone , meaning any government agencies , and any person . This coins is not run in market via rule , Any person who buy a bitcoin that has a code , and a  address location of bitcoin . Actully in bitcoin world , also enter a third party called hackers , hackers can also target bitcoin exchanges and steal the bitcoin address through malware and operational glitches . If a thief gain’s access to a bitcoin owner’s computer hard drive and steal their private encryption key, they could transfer the stolen bitcoin to another account . and the mendatory point in bitcoin is these prices is not fixed , and changes everyday , month and year .

As example , in 2009 when it is started the bitcoin price is $0, but today the bitcoin price is in indian rupees in crores .

This coin is not centralized by any government and bank organisation . Bitcoin minning is the process through bitcoin work based on circulation . and the limitation of bitcoin is 21 million through bitcoin minning and at present 1 million adress booked in bitcoin minning.

              Black hat hacker

Black hat hacker is a type of hacker they break into computer system with malicious intent . they break a network system for their financial gain and their profitable prospectus . they steal credit card , debit card information through some attacks like phishing attacks , dos attacks actully phishing attacks is the favourite attacks that is used by black hat hackers . white hat hackers and black hat hackers work process same but black hat hacker or white hat hacker intentions differences does it matter and their purposes different whereas black hat hacker work is illegal and that place white hat hacker is legel . It is more common for black hat hackers to work alone and organized money through use their skils easily . the best example of black hat hacking in 2017 wannacry ransomeware which is effected 150 countries , and earned 120, 000 $ . Actully hacking is a business . Most of the black hat hackers use call center scam ,In this scam, the hacker tries to convince potential victims to allow remote access to their computers or to download software. When the victim grants access or downloads the recommended software, it allows criminals to harvest passwords and banking information or surreptitiously take over the computer and use it to launch attacks on others. To add further insult, the victim is typically charged an exorbitant fee for this “help.”

Ethical hacker

Ethical hacker is also known as white hat hacker and pentration tester , and they hack any computer or network system , to take a permission and their purpose for only to check defense system on your network or computer . Ethical hacker uses some tools like metasploit , nmap etc . their intention is good . Most of the big companies hire ethical hacker behalf on salary . A best hacker recover the clients system vulnerabilities before the attackers discovers their system bug . Ethical hacker is a challenging job if you work for a comapany as a ethical hacker and a attacker challenge their company to hacked their system in 10 minutes with the help of any vulnerability on the company network system , then a company hire a ethical hacker and the ethical hacker accept the attacker challenge , and find vulnerability and recover in few minutes before a attackers find this system hole and attack. and then company happy like a winner and paid more money to ethical hacker .

The no1. ethical hacker at today date is Kevin mitnick .

These are the phases that ethical hackers used in their performing attacks :

              BUG

    A bug is a  type of error and flaws which is find in a software program , hardware according to NSA, a programmer skips a bug in one thousand line of codes and these bugs harmful for public and a useful for hackers (through these bugs create a backdoor and that is the point where hackers steal public data and information , then a company assign a bug bounter which work is find a bug which is created by programmers and inform to company and resolve theses bug and then company paid some money as a amount for bug bounters . as example : in recent few daya ago ,

  • Google is now recruiting security researchers to find security bugs in Android 12.
  • The payouts for finding bugs, including exploits, are up to $1,000,000.
  • Android 12 began rolling out in beta to select phones earlier this month.

A bug bounter is a independent hacker which takes anything as a challenge they find a bug in any company and take a permission to resolve the bug then company paid a amount and these category comes under grey hat hacker. and those hackers called bug bounter and these process called bug bounty program.

JOKER MALWARE

WHAT IS JOKER MALWARE ??

Joker malware is a malicious act that is used to steal victim’s data , information via message, contact lists and device info . According to the quick heal report , at launch these applications ask for notification access , which is used to get notification data , these application then goes on to take SMS data from notifications , and ask for contact access . when the access is provided then your phone calls manages all permissions on you phone .

Apps infected by Joker Malware ??

  • Advocate wallpaper
  • Age Face
  • Antivirus security – security scan
  • Beach camera
  • Certain wallpaper
  • collapte face scanner
  • cute camera
  • Dazzle wallpaper
  • Declare message
  • Auxiliary message
  • Fast free message
  • Travel wallpaper
  • Go Message
  • Element scanner

Who invented joker Malware ??

Actully , joker Malware is self-aware AI created by jokers in his retirement years , with the purpose of continous legecy when he was gone.

How to stop joker Malware on your phone ??

You need an antivirus app on your android , but it can handy when it combat joker malware app . you should only install which app that you fully trust ..

            CYBER THREAT

What is cyber threat ?

Cyber threat is a malicious act that is used to harm , steal and delete data .

What types of cyber threat ?

1 . Malware : –

Malware is a software that does malicious task on a device to currupt or control over a system.

2 . Spyware: –

Spyware is a form of malware that hides on a device and this is installed by unknown person and this purpose is stolen bank details and credentials report.

3. Phishing attack: –

It is a attack type in which hackers choose a trapping way through social engineering to all of control on your credentials information .

4. Ransomeware: –

In this type of attack the hackers give you a way if you paid money in bitcoin then your decrypted data find you which is decrypted by hackers .

5. DOS attack: –

In this type of attack, on your network more websited flooding by hackers and your network can’t handle this flood and crash your network system .

6. Trojen horse attack: –

In this type of attack at your system a backdoor will provided by hackers , for anytime accessing your system when they want .

How to protect yourself from cyber threat ?

The simple mistakes that people do clicks on emails , messaging apps and advertisements to invite hackers . Antivirus is used to prevent, detect and remove malicious codes on your system and updated antivirus with newly version . In your system any spyware and you don’t see because this is a hidden app then if your system work on a large bussiness basis then you install antispyware app , which is detect your system and alerted you if your system infected with spyware .

Design a site like this with WordPress.com
Get started