Uncategorized

How to enable the network in Kali Linux Virtual Box?

I brought this simple tips and tricks, because someusers asking about it, because by default some of the virtual box when you try to connect to the internet maybe can’t. Step by step enable the network in kali linux: Notes: Your default wireless network cannot be used while you are using virtual box. if you want to use wireless network in your virtual box, you can use the wireless usb card, then the virtual machine can detect it. Wanna learn how to pentest a website, join our brand new training cum internship program: CLick here

How to enable the network in Kali Linux Virtual Box? Read More »

COVID-19 pandemic brings online coronavirus scams

As the world struggles to cope with the coronavirus pandemic, a parallel digital war is being fought online against another type of global virus. There are malicious actors preying on people at their most vulnerable in attempts to steal what they can. Learn about the latest coronavirus scams so you can stay focused on keeping yourself and your loved ones safe. Coronavirus scams targeting the public Scammers targeting the public will try to use fear and concern about the coronavirus pandemic to get victims to drop their guard. Scams that have already been observed include: Posing as the World Health Organization or Center for Disease Control and asking recipients to download documents containing safety tips. The files have been found to contain malware designed to steal banking credentials or to keylog people’s passwords; Fraudulent offers for face masks, hand sanitizer, and other products whose supplies have been stretched thin during the coronavirus crisis; Emails from tax authorities offering victims “tax refunds” to help them cope with the coronavirus pandemic. All they had to do was enter their name, address, phone number, mother’s maiden name and bank card number – a clear scam. Scammers have been scooping up COVID-19 and coronavirus domains, turning them into malicious malware injection sites. These can even include domains designed to catch common typos, using words like “doronavirus” instead of “coronavirus”. Fake coronavirus cures. They claim to be renegade doctors repressed by the Chinese or Western governments who already have vaccines available. All you have to do is click on their link and download something or enter your personal information. Donate to help find the cure for coronavirus! The only problem is that many of these requests are bogus. Many of the scams detected have asked victims to donate their money in untraceable bitcoins. Fake coronavirus maps. Maps tracking the spread of the pandemic are useful and fascinating, as they let us watch the crisis unfold as it happens. Some scammers are using functioning fake copies of these maps to deploy malware onto victims’ devices. These are only the scams that have already been detected and documented. As governments bring new tools to bear in the fight against COVID-19, other predatory scams might appear Finally – free coronavirus testing! All you have to do is enter your credit card number or other sensitive personal data. It may be a legitimate offer, but you’ll have to be extra careful to make sure it’s legitimate. Your best bet is to contact your national public health authority; Your coronavirus test results have arrived. Whether or not you’ve actually taken a test, all you need to do is give us your sensitive personal data to find out if you’re infected. If you do take a test, make sure you double-check the correct procedure for receiving your results with the whoever performs the test; Your mother has been hospitalized and the hospital’s supplies are running low! You can help by sending untraceable bitcoin funds to this anonymous bitcoin wallet. This would be a variation of the classic car crash scam with a unique spin to prey on our fears about the COVID-19 pandemic. It’s easy to imagine other scams that might still arise. They work because they prey on the fears that so many of us feel about the coronavirus pandemic. It’s important to keep a cool head to see through them. Read on for security tips that will help keep you from falling for these tricks. Coronavirus scams targeting healthcare workers It’s bad enough that scammers and hackers are targeting the public during a pandemic. Worse still are the scammers targeting healthcare workers and institutions. One such scam involved fake emails from the World Health Organization claiming to contain the latest recommendations or directions for healthcare professionals. The attached files instead deployed malware. Coronavirus scam security tips So far, a majority of the scams have involved masquerading as various global or national health organizations and institutions. Unfortunately, hackers have no problem undermining these helpful institutions’ communications to turn a quick buck. Use the right coronavirus map. This link leads to the John Hopkins coronavirus map that some reports have been saying has been hacked. These reports are not entirely accurate. Though it is theoretically possible for the map to have been hacked, what has actually happened is that hackers have made copies of it and are sending it to victims as a downloadable app that contains malware. Do not download this map from here or anywhere else. Simply view the legitimate map in your browser. IF YOU WANT LEGIT SOURCE TO SEE THE CORONAVIRUS UPDATES. VISIT THIS LINK Don’t download anything (and be careful around links as well). It’s difficult to imagine a scenario where an organization like the WHO would need you to download safety tips rather than simply including them in its email/SMS or on its site. So don’t download anything you aren’t 100% sure of. Be careful with links as well. Right click on any link you receive to make sure it’s going to an official website. If you have any doubt at all, simply navigate to that website yourself and find the content you were looking for. Keep a cool head. Yes, masks and hand sanitizer are running low in many places around the world. But imagine they weren’t. Would you buy some from a random SMS asking you to provide your credit card info? You’d probably find a reputable dealer or go to a local store. Stick to your common sense and don’t let fear get the best of you. If it sounds too good to be true, it probably is. What are the odds that the secret cure to COVID-19 just landed in your inbox without anyone else in the world knowing about it? This stands for any scam, whether or not it uses the coronavirus to trick you. Make sure you donate to the right place. Donating money to help fund the search for a treatment or vaccine is a noble cause.

COVID-19 pandemic brings online coronavirus scams Read More »

Hackers Can Use Ultrasonic Waves to Secretly Control Voice Assistant Devices

Researchers have discovered a new means to target voice-controlled devices by propagating ultrasonic waves through solid materials in order to interact with and compromise them using inaudible voice commands without the victims’ knowledge. Called “SurfingAttack,” the attack leverages the unique properties of acoustic transmission in solid materials — such as tables — to “enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer distance and without the need to be in line-of-sight.” In doing so, it’s possible for an attacker to interact with the devices using the voice assistants, hijack SMS two-factor authentication codes, and even place fraudulent calls, the researchers outlined in the paper, thus controlling the victim device inconspicuously. The research was published by a group of academics from Michigan State University, Washington University in St. Louis, Chinese Academy of Sciences, and the University of Nebraska-Lincoin. The results were presented at the Network Distributed System Security Symposium (NDSS) on February 24 in San Diego. How Does the SurfingAttack Work? MEMS microphones, which are a standard in most voice assistant controlled devices, contain a small, built-in plate called the diaphragm, which when hit with sound or light waves, is translated into an electrical signal that is then decoded into the actual commands. The novel attack exploits the nonlinear nature of MEMS microphone circuits to transmit malicious ultrasonic signals — high-frequency sound waves that are inaudible to the human ear — using a $5 piezoelectric transducer that’s attached to a table surface. What’s more, the attacks can be executed from as far as 30 feet. To conceal the attack from the victim, the researchers then issued a guided ultrasonic wave to adjust the volume of the device low enough to make the voice responses unnoticeable, while still be able to record the voice responses from the assistant via a hidden tapping device closer to the victim’s device underneath the table. Once set up, an interloper can not only activate the voice assistants (e.g., using “OK Google” or “Hey Siri” as wake words), but also generate attack commands (e.g. “read my messages,” or “call Sam with speakerphone”) using text-to-speech (TTS) systems — all of which are transmitted in the form of ultrasonic guided wave signals that can propagate along the table to control the devices. Thanks for reading hope you like it Credit :- the hackers news

Hackers Can Use Ultrasonic Waves to Secretly Control Voice Assistant Devices Read More »