website statistics

Archive for the ‘Security’ Category

Facebook Built ThreatData, A Framework For Web Security

Facebook Built ThreatData, A Framework For Web Security

Although having very high security, hackers have been found breaching into many systems. So, to protect itself from being hacked, Facebook has built a security-focused framework called ThreatData. It’ll help Facebook investigate, analyze and combat Internet threats.

By On March 28, 2014 Respond
Add To Bookmark Add To Readlist  
Kaspersky Says There Are 10 Million Rogue Android Apps Out There

Kaspersky Says There Are 10 Million Rogue Android Apps Out There

Google has tried to significantly improve the security of its Google Play store in the last year or so. However, Kaspersky Labs has now warned that there are still 10 million possibly malicious Android apps out there.

By On February 10, 2014 Respond
Add To Bookmark Add To Readlist  
Hackers Get Cash Out Of ATMs Using Infected USBs

Hackers Get Cash Out Of ATMs Using Infected USBs

ATM machines may look fairly secure pieces of hardware but if they are running Windows XP and have a public USB port, they are no good. Researchers have now revealed how hackers used malware-laden USBs to hack into such ATMs to withdraw cash.

By On January 4, 2014 Respond
Add To Bookmark Add To Readlist  
NSA Can Intercept Computer Shipments And Bug Them

NSA Can Intercept Computer Shipments And Bug Them

NSA’s surveillance tactics are an ever-green treasure-trove that just won’t exhaust. Spiegel has now reported that the agency can intercept computer shipments and bug them before they reach the buyers.

By On December 30, 2013 Respond
Add To Bookmark Add To Readlist  
NSA Bribed RSA $10 Million To Enable Encryption Backdoors

NSA Bribed RSA $10 Million To Enable Encryption Backdoors

RSA is one of the most prestigious encryption companies around the globe. A report from Reuters now reveals that NSA paid RSA a whopping $10 million to include backdoors in its products so that NSA could exploit them.

By On December 24, 2013 Respond
Add To Bookmark Add To Readlist  
Sounds Made By A PC Can Be Used To Hack Personal Details

Sounds Made By A PC Can Be Used To Hack Personal Details

With every passing day, new and astonishing PC exploits are discovered. Scientists have, for instance, now revealed that the sounds made by a PC can be used to hack the personal details of its users.

By On December 21, 2013 Respond
Add To Bookmark Add To Readlist  
NSA Tracks Cell Phone Location Data Globally

NSA Tracks Cell Phone Location Data Globally

Edward Snowden’s leaked documents continue to make startling revelations. Washington Post has now published a piece about one of these documents, unveiling how NSA tracks the cell phone location data of countless users worldwide.

By On December 5, 2013 Respond
Add To Bookmark Add To Readlist  
New Zero-Day Vulnerability In Windows XP Used To Infect PCs With Malware

New Zero-Day Vulnerability In Windows XP Used To Infect PCs With Malware

It has been discovered that a new zero-day vulnerability in Windows XP allows a hacker to gain access to the kernel mode of a PC. The hacker can then install a malware or perform any other malicious activity.

By On November 30, 2013 Respond
Add To Bookmark Add To Readlist  
Facebook Vulnerability Allows To View Hidden Facebook Friend List

Facebook Vulnerability Allows To View Hidden Facebook Friend List

To many people, Facebook is one of the most powerful and reliable social networking websites. It allows users to interact with other users after being friends with one another. However, Facebook allows users to make the friend list public or private. But lately, Facebook vulnerability has allowed users to view hidden Facebook friend list.

By On November 27, 2013 Respond
Add To Bookmark Add To Readlist  
Smartphone Cameras Can Be Used To Steal PIN Codes

Smartphone Cameras Can Be Used To Steal PIN Codes

When it comes to modern-day digital security, there are so many security loopholes that virtually every other day, a new possible exploit is found by the researchers. At the University of Cambridge, researchers have now discovered a new method which can be used by hackers to steal PIN codes for sensitive smartphone apps.

By On November 11, 2013 Respond
Add To Bookmark Add To Readlist  
Microsoft Announces Patches For 3 Critical Windows 8.1 Flaws, Ignores Office Zero-Day Vulnerability

Microsoft Announces Patches For 3 Critical Windows 8.1 Flaws, Ignores Office Zero-Day Vulnerability

Microsoft has announced that it will be dishing out a set of patches for Windows 8.1 on Nov 13. The company briefly elaborated on the security vulnerabilities that will be resolved with these patches, citing three such exploits which are deemed critical. However, the company ignored the zero-day vulnerability which has been discovered in Office.

By On November 10, 2013 1 Response
Add To Bookmark Add To Readlist  
Adobe Gets Hacked Again! Around 3 Million Users Data Compromised

Adobe Gets Hacked Again! Around 3 Million Users Data Compromised

Last year in November, an Egyptian hacker known as Hima broke into American multinational computer software company Adobe’s systems and released 150,000 Adobe emails and passwords to get the company’s attention. And lately, again the company’s systems has been hacked. This time, around double info has been compromised than last time!

By On October 4, 2013 1 Response
Add To Bookmark Add To Readlist  
Using Internet Explorer? You Need To Install This Fix-It To Protect Your PC

Using Internet Explorer? You Need To Install This Fix-It To Protect Your PC

Remember the Internet Explorer vulnerability reported by Microsoft itself back in September 17th? The vulnerability later used to exploit a wide range of PC running Windows and Internet Explorer. This risk is critical, here we have brought a temporary solution by Microsoft TechNet.

By On October 2, 2013 Respond
Add To Bookmark Add To Readlist  
Syrian Electronic Army Hacks Twitter Account Of UK’s ITV News

Syrian Electronic Army Hacks Twitter Account Of UK’s ITV News

Yesterday, the Twitter account of UK’s biggest commercial TV station ITV News was hacked by supporters of Syria’s President Bashar al-Assad, just after the day Twitter enhanced security to prevent such attacks.

By On May 25, 2013 Respond
Add To Bookmark Add To Readlist  
Security Expert Opposes The Notion Of Wiretapping Backdoors

Security Expert Opposes The Notion Of Wiretapping Backdoors

Wiretapping backdoors are security loopholes in communication networks which allow the governmental agencies to tap into any call and listen in on it. Conventionally, telecom companies have been forced to provide such backdoors, thanks to certain U.S. laws. But now, security experts are building up a case against adopting similar measures in digital communications.

By On May 18, 2013 Respond
Add To Bookmark Add To Readlist  
Topic List
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook