Just In
- 3 hrs ago Best Noise-Cancelling Earbuds Under Rs 5,000: CMF Buds Pro, Redmi Buds 5, Realme Buds Air 5, and More
- 3 hrs ago How to Get Zomato Gold Membership Worth Rs 999 for Free
- 5 hrs ago Garena Free Fire Max Redeem Codes for April 20, 2024: Get Access to the Latest In-game Loot
- 5 hrs ago Apple Watch X Renders Surface: Magnetic Bands, Blood Pressure Tracking, and More
Don't Miss
- Automobiles Ola Electric Hits New Milestone – 500th Service Centre Opened In Kochi
- Lifestyle Alia Bhatt Dons Classic Pantsuit For Time Magazine Cover, Bookmark Her Power Dressing Looks!
- Sports KKR vs RCB IPL 2024 Playing 11: Kolkata Knight Riders vs Royal Challengers Bengaluru Team News, Predicted Lineup
- Education Railway RPF Recruitment 2024; Apply Online for 4660 Post Vacancies @rpf.indianrailways.gov.in
- News Who Was Max Azzarello, The US 'Conspiracy Theorist' Who Set Himself On Fire Outside Donald Trump's Trial?
- Movies Do Aur Do Pyaar Box Office Collection Day 2 Prediction: Vidya-Pratik's Rom-Com To Cross 1 Cr On Saturday
- Finance Elon Musk Postpones India Trip, Tesla's Indian Market Entry Delayed
- Travel Journey From Delhi To Ooty: Top Transport Options And Attractions
Telegram desktop app leaked users' location when on voice calls
Telegram falls prey to a major vulnerability.
Telegram has a reputation for high-end privacy and security, but that doesn't make it immune to breaches. Security researcher Dhiraj Mishra discovered that Telegram's desktop version was leaking both public and private IP addresses whenever users made voice calls to its peer-to-peer framework.
While the mobile app offers the option to turn off peer-to-peer calls and keep the information intact, the desktop version offered no such choice. This could open the users to attack or reveal their exact location.
Telegram has fixed the issue in both the 1.3.17 beta and 1.4 versions by offering an option to disable peer-to-peer calling entirely or limit it to their contacts. Mishra received a €2,000 (about $2,300) bounty for the find.
Many apps in the past have fallen prey to such issues. Besides, the mining of cryptocurrencies is a lucrative business. But why shell out hefty sums to buy this mining equipment when you can hijack other people's mobiles and computers to do the same for you? Now that's what the hackers are up to.
According to Malwarebytes, hackers managed to breach the security barrier of millions of Android phones through malicious ad redirect scam. The exact method is yet to be determined, but it seems the users downloaded the malicious apps that redirected them to a website.
The website directly prompted that it was using the infected device to mine the cryptocurrency, and would only stop if the user enters a valid CAPTCHA code. The average of time spent by users on this malicious site was around four minutes, but the site had over 30 million visitors per month. If we add the numbers, it is evident that the hackers have mined a huge crypto amount.
A report said that since its first appearance in December 2015, the SamSam ransomware has raked in almost $6 million by targeting organizations and individuals around the world, including those in India. According to the 47-page report, 74 percent of the known victims are based in the United States. Other regions known to have suffered attacks include Canada, the U.K., and the Middle East, with India ranking sixth among the top victim countries across the world.
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
79,900
-
1,39,900
-
1,29,900
-
65,900
-
1,56,900
-
1,30,990
-
76,990
-
16,499
-
30,700
-
12,999
-
18,800
-
62,425
-
1,15,909
-
93,635
-
75,804
-
9,999
-
11,999
-
3,999
-
2,500
-
3,599