Just In
- 23 min ago Deal Alert: Grab the Samsung Galaxy S23 Ultra for Under ₹90,000 on Flipkart – Here’s How
- 2 hrs ago OPPO F25 Pro New Coral Purple Colour Variant Launched in India; Where to Buy?
- 3 hrs ago New Nothing Tech Coming Soon? Teaser Suggests Ear (3) Launch
- 4 hrs ago Amazon Invests $2.75 Billion in ChatGPT, Google AI Rival Anthropic, Spending a Total of $4 Billion
Don't Miss
- News Noida Women Preeti And Vineeta Facing Legal Action Over Viral Holi Video, Slapped With Hefty Challan
- Automobiles Honda Motorcycle & Scooter India Reaches 6 Crore Sales Milestone
- Finance STEL - RVNL JV Received Order From Energy Development Corporation Ltd
- Sports IPL 2024: Steve Smith also slams Hardik Pandya's captaincy - 'Perplexed, I mean you can't have...'
- Movies Heart Of The Hunter OTT Release Date, Time, Platform: Here's When Suspence Thriller Will Premiere
- Lifestyle Aditi Rao Hydari Marries Siddharth, Exploring Heeramandi Star's Ethnic Style Statements, Bookmark Now!
- Education OAVS Teacher Direct Recruitment 2024; Apply online for 1386 Posts, Check out for more details
- Travel Explore Tamil Nadu's Diverse Wedding Venues
Telegram desktop app leaked users' location when on voice calls
Telegram falls prey to a major vulnerability.
Telegram has a reputation for high-end privacy and security, but that doesn't make it immune to breaches. Security researcher Dhiraj Mishra discovered that Telegram's desktop version was leaking both public and private IP addresses whenever users made voice calls to its peer-to-peer framework.
While the mobile app offers the option to turn off peer-to-peer calls and keep the information intact, the desktop version offered no such choice. This could open the users to attack or reveal their exact location.
Telegram has fixed the issue in both the 1.3.17 beta and 1.4 versions by offering an option to disable peer-to-peer calling entirely or limit it to their contacts. Mishra received a €2,000 (about $2,300) bounty for the find.
Many apps in the past have fallen prey to such issues. Besides, the mining of cryptocurrencies is a lucrative business. But why shell out hefty sums to buy this mining equipment when you can hijack other people's mobiles and computers to do the same for you? Now that's what the hackers are up to.
According to Malwarebytes, hackers managed to breach the security barrier of millions of Android phones through malicious ad redirect scam. The exact method is yet to be determined, but it seems the users downloaded the malicious apps that redirected them to a website.
The website directly prompted that it was using the infected device to mine the cryptocurrency, and would only stop if the user enters a valid CAPTCHA code. The average of time spent by users on this malicious site was around four minutes, but the site had over 30 million visitors per month. If we add the numbers, it is evident that the hackers have mined a huge crypto amount.
A report said that since its first appearance in December 2015, the SamSam ransomware has raked in almost $6 million by targeting organizations and individuals around the world, including those in India. According to the 47-page report, 74 percent of the known victims are based in the United States. Other regions known to have suffered attacks include Canada, the U.K., and the Middle East, with India ranking sixth among the top victim countries across the world.
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
1,39,900
-
1,29,900
-
79,900
-
65,900
-
12,999
-
96,949
-
16,499
-
38,999
-
49,999
-
30,700
-
23,990
-
1,25,999
-
36,999
-
38,999
-
1,17,840
-
35,000
-
23,960
-
82,510
-
11,999
-
25,999