Showing posts with label facebook like. Show all posts
Showing posts with label facebook like. Show all posts

Sunday, 12 June 2016

Hackers Are Offering Apple Employees $23,000 for Corporate Login Details

hacking-apple-id
An unsatisfied Employee may turn into a Nightmare for you and your organization.

Nowadays, installing an antivirus or any other anti-malware programs would be inadequate to beef up the security to maintain the Corporate Database.

What would you do if your employee itself backstabbed you by breaching the Hypersensitive Corporate Secrets?

Yes! There could be a possibility for an Internal Breach all the time.

Just last year, an ex-employee stole Yandex Search Engine Source Code and tried to sell it for just $29,000 in the underground market.

Over a few years, hackers have adopted various techniques ranging from Stress Attacks to Social Engineering tactics in order to gain the Classified Corporate information.

Hackers Offering $23,000 for Internal Access

Now hackers are rolling their dice for the next Deceptive Step to acquire Corporate Login Details of Irish Apple Employees in exchange of 20,000 Euro ($23,000 USD).

The current situation is being faced by the employees of Apple's European Headquarters in Cork, Ireland.

The offer had been made by the unknown hackers and criminals to the random Apple employees in their mailbox demanding the employee's Apple Login passwords in return of 20,000 Euros.

"You'd be surprised how many people get on to us, just random Apple employees," the anonymous employee said. "You get emails offering you thousands [of euros] to get a password to get access to Apple" stated.
"I could sell my Apple ID login information online for €20,000 ($23,000) tomorrow. That’s how much people are trying" another employee quoted.
This new proposal had been made to the non-lifers of the company who would not spend there. Thus, widening a fluky entry to the database.

By gaining the access to Apple Employee’s Login credentials, hackers could find the jewel in their pocket for their malicious activity from which they could amass the financial profit.

Apple is considering this scam very seriously and till now, no employees had compromised his/her Login Credentials for illicit gain.

Internal Breach

One of the domestic threat to your organization is the INSIDER. According to a survey conducted by SANS last year, it is found that 71% of respondents are feared about the Insider Attack.

The consequence of the threat may even result in the liquidation of your company.

The Department of Homeland Security (DHS) and FBI also had a pressed up the issue by underlining that majority of the threats are the outcomes of an Insider.

Lack of Technical Training to the employees, Lack of Budget and inappropriate policies broaden the chances of a breach.

Hiring a Security Firm, Proper Training to all the Employees about latest threats, Shutting down of an employee Account soon after his/her Termination, Frequent changes applied in the Password, Limited Allowance of employees to sensitive docs, etc. would cover such vulnerabilities.

Now, before purchasing the high-end firewalls or Virus Destructors, just turn around and look…
...Who’s at your back!


Thanks and stay blessed!

Saturday, 11 June 2016

How to Delete or Modify a Facebook Message Once It Has Been Sent

delete facebook message after sent

Sometimes I receive emails from our readers who wanted to know how to hack Facebook account, but just to delete some of their messages they have sent to their friends or colleagues mistakenly or under wrong circumstances like aggression.

It is probably the biggest "n00b" question you will see on the Internet.
The solution for this query is hard to find — but recently researchers have shown that how you can modify or alter your messages once you have pressed the SEND button in Facebook Messenger.

According to the researcher Roman Zaikin from cyber security firm Check Point, a simple HTML tweak can be used to exploit Facebook online chat as well as its Messenger app, potentially allowing anyone to modify or delete any of his/her sent message, photo, file, and link.

Though the bug is simple, it could be exploited by malicious users to send a legitimate link in a Facebook chat or group chat, and later change it to a malicious link that could lead to a malware installation, tricking victims into infecting their systems.

Here’s How the Exploit Works:

The exploit works on the way Facebook assigns identities to chat messages. Each chat message has a unique "message_id" identifier that could be revealed by sending a request to www.facebook.com/ajax/mercury/thread_info.php.

Once message_id is identified, an attacker could alter its respective message content and send it back to Facebook servers which accept the new content as legitimate and push it back to the victim’s PC or mobile device.


Video Demonstration:


"By exploiting this vulnerability, cyber criminals could change a whole chat thread without the victim realizing," said Oded Vanunu, Head of Products Vulnerability Research at Check Point. 
"What’s worse. The hacker could implement automation techniques to continually outsmart security measures for long-term chat alterations. We applaud Facebook for such a rapid response and putting security first for their users."

Researchers discovered the vulnerability earlier this month and notified Facebook about the flaw.
The social networking giant promptly moved to fix the vulnerability, though Facebook explained that the flaw only affected its Messenger app on Android.

"Based on our investigation, this simple misconfiguration in the Messenger app on Android turned out to be a low-risk issue, and it's already been fixed," Facebook wrote in its blog post published Tuesday.

Additionally, Facebook claims the vulnerability could not be exploited to infect its users' PCs with malicious software, as the company is using anti-spam and anti-virus filters to detect malware and spams.

Friday, 10 June 2016

Have you ever suspected that Facebook is listening to your conversations through Microphone?

Have you ever felt Facebook is showing you very relevant ads about topics you’re only discussing around your phone?
If yes, then you may find this news worth reading.
Communications Professor Kelli Burns from the University of South Florida claims that Facebook is listening to all conversations people have while its app is open to serve more relevant ads for products related to what they are talking about.
However, the social networking giant responds it does listen to audio and collect information from users, but does not record or use sounds heard around people for targeted ads.
"Facebook does not use microphone audio to inform advertising or News Feed stories in any way," a Facebook spokesperson said. "Businesses are able to serve relevant ads based on people's interests and other demographic information, but not through audio collection."

Facebook rolled out a feature in May of 2014 when the company said that it might target ads "in the future" based on the use of your audio identification in posts.

Like if you post that you are listening to "Shake It Off," you might see an ad for Taylor Swift’s concert tour.

However, Burns isn’t convinced by Facebook’s claims and has accused the social media giant of using an audio collection tool to not only gather it simply of helping out users, but also listen in on everything users say to serve them with relevant ads.

Burns says that she tested the feature by discussing certain topics around the phone and discovered that the site appeared to show relevant ads based on the topic.

Burns' finding is supported by many users across the Internet, who also say that ads in their Facebook feed are related to things they spoke or discuss around their phone, but never searched for it on the Internet.

If you are also the one not convinced by Facebook’s claims, you can turn off this feature with relative ease.

Here’s how you can stop Facebook from listening to you:

For iPhone users: Go to the Settings → Facebook → Settings and Turn OFF Microphone.

Android users can use App Permissions to do so. For this: Go to Settings → Personal → Privacy and Safety → App Permissions → Microphone → Facebook and Turn OFF the slider.

Since these changes are done at the operating system level, Facebook can not turn the feature ON even if the social network wanted to.

Thanks and stay blessed!

Tuesday, 7 June 2016

Facebook Founder Zuckerberg's Twitter, Pinterest accounts gets Hacked! And the Password was...

The man who runs the biggest social network and continuously  implements new security measures to boost its billion users security, himself failed to follow basics of Internet security for his own online accounts.

Yes, I’m talking about Facebook CEO Mark Zuckerberg, who had his Twitter and Pinterest accounts compromised on Sunday.

The hacker group from Saudi Arabia, dubbed OurMine, claimed responsibility for the hack and guess how the group did it?


The hackers tweeted that they found Zuck's account credentials in the recent LinkedIn data breach, from which they took his SHA1-hashed password string and then broke it and tried on several social media accounts.

The group, which has more than 40,000 Twitter followers, then successfully broke into Zuck's Twitter (@finkd) and Pinterest profile and defaced its banners with its logo as well as tweeted out some offensive posts.

Mr. Zuckerberg has not sent a tweet from the account since 2012.

Now, what’s more surprising?

Zuckerberg's LinkedIn password was "dadada", which he also used for his other online accounts, the group tweeted.

So, this might be another alarm for those who haven’t yet changed passwords for their LinkedIn as well as other online accounts that used the same credentials.

Also Read: Popular Social Site Vk.com Hacked ! 100 Million Passwords Leaked Online

In tweets now deleted, the group also claimed to have gained accessed to Zuck’s Instagram account, but Facebook confirmed that the group did not access his Instagram account.


"No Facebook systems or accounts were accessed," a Facebook spokesperson said. "The affected accounts have been re-secured."

More than 167 Million members' email and password combinations were hacked during a 2012 LinkedIn data breach and had just been posted online. The passwords were encrypted with the SHA1 algorithm with "no salt" that made it easier for hackers to crack them.

Like other data breaches, I suggest you change your password immediately, especially if you use the same password for other websites.



Thanks and stay blessed!