Bangladesh Computer Council (BCC) is taking necessary measures to improve Bangladesh’s capability to manage the risks related to digital revolution and deal with fast growing cybercrime. Bangladesh e-Government Computer Incident Response Team (BGD e-GOV CIRT) was established at BCC under the project “Leveraging ICT for Growth, Employment and Governance Project (LICT)”. What is BGD e-GOV CIRT? The Computer Incident Response Team (CIRT) investigates and resolves...
Read More
Google has yet to remove two apps infected with dangerous malware that are currently still available for download via the official Google Play Store. The apps are named “Earn Real Money Gift Cards” — an app for winning gift cards by installing other apps on your phone — and “Bubble Shooter Wild Life” — a mobile game. Both apps were developed and recently uploaded on...
Read More
From time to time, our readers raise questions or issues related to topics that concern, or simply interest them. One such issue was brought up recently by a Twitter user, who asked us: “Do you have any posts discussing the risk to banks when people use their cell phone inside them, ignoring the security guards?” We think this is a very interesting question and one...
Read More
USB connections, the most common interface used globally to connect external devices to computers, are vulnerable to information “leakage,” making them even less secure than has been thought. Researchers tested more than 50 different computers and external USB hubs and found that over 90 percent of them leaked information to an external USB device.
Smartphone users can now add a new entry to the list of things they need to worry about: their phones being compromised via replacement parts. A group of researchers from Ben-Gurion University of the Negev has demonstrated that hardware replacements – e.g. touchscreens, NFC readers, wireless charging controllers, and so on – can be equipped with a chip that is capable of manipulating the device’s...
Read More
DDoS attacks rose again in Q2 for the first time in almost a year as the black hats returned to tried-and-tested tools and techniques including PBot, Mirai and Domain Generation Algorithms (DGA), according to Akamai. The cloud delivery provider crunched data collected from over 230,000 servers in more than 1600 networks to compile its State of the Internet/Security Report for Q2 2017.
An editor used by millions of game developers and coding students around the world contains a remote code execution vulnerability in all of its Windows versions on all versions of Windows. The Mac version of the editor is not affected.
Is that music tracking you? Hackers can remotely hijack smart devices and use SONAR to record your every move The CovertBand system can determine the position of objects using sonar It sends out a repeating pulse of sound waves in the 18 to 20 kHz range Devices were hacked to play music with pulses to track someone’s position It uses the device’s built-in microphones to...
Read More
Chrome Extensions are a powerful means of adding functionality to the Chrome browser with features ranging from easier posting of content on social media to integrated developer tools. At the end of July and beginning of August, several Chrome Extensions were compromised after their author’s Google Account credentials were stolen via a phishing scheme. This resulted in hijacking of traffic and exposing users to potentially...
Read More
Description: Mozilla has released a security update to address multiple vulnerabilities in Thunderbird. In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts. Impact: An attacker who successfully exploited the vulnerability could take control of an affected system. Mitigation: Updates are available. Please check specific vendor advisory for...
Read More