cki_edited.png

CYBER KINGS INDIA

We Are For You

  • Home

  • Blog

  • Festival

  • Careers

  • Students

  • Services

  • About

  • More

    Use tab to navigate through the menu items.
    • All Posts
    • cyber security
    • Ethical hacking festival
    Search
    Hackers stole Customers Credit Cards Information from Checkers and Rally's Restaurants
    Neha
    • Jun 1, 2019
    • 1 min

    Hackers stole Customers Credit Cards Information from Checkers and Rally's Restaurants

    A big alert.If you have swiped your payment card at the popular Checkers and Rally's drive-through restaurant chains or like somewhere in past 2-3 years then now you should urgently  request your bank to block your card and  notice If any suspicious  transaction was done through your card. Checkers in the United States, founded with a huge data breach that affected an unknown number of customers at 103 of its Checkers and Rally's locations nearly 15% of its restaurants. The a
    64 views
    The Tor Browser for Android Released On Play Store
    Neha
    • May 28, 2019
    • 1 min

    The Tor Browser for Android Released On Play Store

    Here is the big news.If you concerns about privacy then its your day.Tor browser for android is now officially released on play store and it is available for download. Tor Browser 8.5 that which you can now download for FREE  on your mobile devices from Google Play Store. It's the first time that Official version of TOR is released through play store.Tor browser is used by the people to avoid tracking also to be anonymous. The criminals also using TOR to avoid government moni
    42 views
    Google Stored Passwords Of G suite Users in Plain-Text format for 14 Years
    Neha
    • May 22, 2019
    • 1 min

    Google Stored Passwords Of G suite Users in Plain-Text format for 14 Years

    Google unknowingly stored its G Suite users passwords in plain text on its servers that means any Google employee who has the permission to access  the servers could have read the passwords G Suite is a brand of cloud computing, productivity and collaboration tools, software and products developed by Google Google revealed that its G Suite platform mistakenly stored unhashed passwords due to a bug In a password recovery. Google also says that the plain text passwords were sto
    81 views
    GozNym Banking Malware Gang Was Dismantled by the International Law Enforcement
    Neha
    • May 17, 2019
    • 1 min

    GozNym Banking Malware Gang Was Dismantled by the International Law Enforcement

    In a joint exertion by a few law requirement offices from 6 unique nations, authorities have disassembled a worldwide cybercrime organize behind GozNym banking malware. GozNym banking malware is responsible for stealing nearly $100 million from over 41,000 victims across the World mainly in the United States and Europe  for many years GozNym was created by combining two known powerful Trojans — Gozi ISFB malware, a banking Trojan that first appeared in 2012 and Nymaim, a Troj
    29 views
    The Most Popular Online Tutoring Marketplace Wyzant affected  Data Breach
    Neha
    • May 17, 2019
    • 1 min

    The Most Popular Online Tutoring Marketplace Wyzant affected Data Breach

    WyzAnt is an online marketplace where students and parents can find qualified, local in-person and online tutors in more than 250 different subjects. Visitors can browse WyzAnt's network of 75,000+ available tutors at no cost and compare tutors' experience, qualifications, personality and teaching style, background checks. Now Wyzant has suffered a data breach which includes their customers certain personal information An unknown attacker was able to gain access to one of its
    8 views
    Hackers Exploits Whatsapp 0-Day Flaw to Secretly Install Spyware On Phones
    Neha
    • May 14, 2019
    • 1 min

    Hackers Exploits Whatsapp 0-Day Flaw to Secretly Install Spyware On Phones

    One of the most advanced mobile spyware on the planet, the WhatsApp exploit installs Pegasus spyware on to Android and iOS devices. A buffer overflow vulnerability in WhatsApp VOIP stack allows remote attackers to run random code on target phones by sending a specially crafted series of SRTCP packets. The vulnerability, identified as CVE-2019-3568, can successfully be taken the advantage to install the spyware and steal data from a targeted Android phone or iPhone by making a
    66 views
    Two Illegal Dark Web Trading Websites Shuts down by Europol
    Neha
    • May 6, 2019
    • 1 min

    Two Illegal Dark Web Trading Websites Shuts down by Europol

    Europol announced the shut down of two prolific dark web marketplaces—Wall Street Market , Silkkitie due to Selling of the drugs, Stolen credit card numbers and private informations,Selling malicious software and pirated contents.Many unknown transactions are takes from here every day. Three men who were running Wall Street Market was arrested by the police of western germany.Wall Street Market have more than a million users and 5,400 dealers who was participating in the tr
    67 views
    GandCrab ransomware and Ursnif virus spreading through the MS Word macros
    Neha
    • Jan 27, 2019
    • 1 min

    GandCrab ransomware and Ursnif virus spreading through the MS Word macros

    Ms word is a famous software from giant microsoft that is using for offices as well as for homes. Security experts are founded that GandCrab ransomware and Ursnif virus spreading through the MS Word macros. Ursnif is a data-stealing trojan and the GandCrab ransomware will affect only the users which affected the Ursnif. Even Both of them is developed by different criminal groups there is some similarity in case of their orgin.Both they are origin from spam emails which hav
    16 views
    PHP PEAR site got hacked and package was replaced
    Neha
    • Jan 25, 2019
    • 1 min

    PHP PEAR site got hacked and package was replaced

    Be alert!f you have downloaded PHP PEAR package manager from its official website in past 6 months, then it's highly chance that your server might have been got hacked. the maintainers at PEAR took down the official website of the PEAR (pear-php.net) after they found that someone has replaced original PHP PEAR package manager (go-pear.phar) with a modified version in the core PEAR file system. The PHP Extension and Application Repository (PEAR) is a community framework and di
    22 views
    UNSECURED VOIP SERVERS LEFT MILLIONS OF THEIR USERS DATA
    Neha
    • Jan 18, 2019
    • 1 min

    UNSECURED VOIP SERVERS LEFT MILLIONS OF THEIR USERS DATA

    A California based Voice-Over-IP (VoIP) services provider VOIPO has left tens GB of its customer data, containing millions of call logs, SMS, and system credentials, publicly that can be accessible to anyone without any permission. VOIPO is one of the most popular who provides the VoIP facility in US.Their unprotected database contains the phone numbers,all the SMS/MMS and certain internal credentials that exposed to the public.This is not the first time that a database cont
    13 views
    FORTNITE FLOWS WILL ALLOW HACKERS HACKS YOUR GAME ACCOUNT
    Neha
    • Jan 18, 2019
    • 1 min

    FORTNITE FLOWS WILL ALLOW HACKERS HACKS YOUR GAME ACCOUNT

    Researchers have discovered some critical flows in one of the most popular online game Fortnite and this flows will allows the hackers to take your game account.The games includes some critical flows like SQL injection, cross-site scripting (XSS) bug, a web application firewall bypass issue, and most importantly an OAuth account takeover vulnerability. The XSS flows will allow attackers to take the authentication token just by diverting them by clicking a specially crafted we
    10 views
    MOST POPULAR 5 WEB HOST SERVICES HAD FOUND VULNERABLE
    Neha
    • Jan 17, 2019
    • 1 min

    MOST POPULAR 5 WEB HOST SERVICES HAD FOUND VULNERABLE

    Many one-click client-side vulnerabilities in the some of the world's most popular web hosting companies that put millions of their customers and visitors at risks and dangers of hacking. A bug-hunter and security researcher Paulos Yibelo, found many vulnerabilities in the most popular hosting providing web sites such us Bluehost, Dreamhost, HostGator, OVH, and iPage. This vulnerabilities will make attackers to simply hack their victims. Man In Middle Attack,Cross Site Scrip
    21 views
     

    CYBER KINGS INDIA

    "We Are For You"

    cki_edited.png

    support@cyberkingsindia.com

    +919744912079,917034866076

    Calicut,Kerala, India

    ©2020 Cyber kings india  

    All Rights Reserved