Archive for the ‘Security’ Category

New Master Key Vulnerability Found In Android 4.4 KitKat

New Master Key Vulnerability Found In Android 4.4 KitKat

Android 4.4 KitKat, the latest version of the mobile OS, hasn’t reached a lot many devices yet. It is already available as part of the Android Open Source Project though. Jay Freeman, a notable security researcher, has now revealed that Android 4.4 KitKat contains yet another Master Key Vulnerability.

By On November 3, 2013 Respond
Add To Bookmark Add To Readlist  
Google Starts Auto-Blocking Of Malware Downloads In New Chrome Build

Google Starts Auto-Blocking Of Malware Downloads In New Chrome Build

Malware are one of the most widespread security threat to modern computing machines and devices. Several browsers have tried to build functionality to warn users when they try to download a malicious file. Google, too, has now added automatic malware blocking to the latest build of Chrome browser.

By On November 3, 2013 Respond
Add To Bookmark Add To Readlist  
‘Severe And Large’ Hacking Attack Launched At Finland’s Government Data Network

‘Severe And Large’ Hacking Attack Launched At Finland’s Government Data Network

Over the past few years, hackers around the globe have grown increasingly sophisticated. Concerted cyberattacks have been launched against different countries and now, Finland has made it to the list. It has been revealed that the country’s government data network was hit with a ‘severe and large’ hacking attack earlier this year.

By On November 1, 2013 1 Response
Add To Bookmark Add To Readlist  
Hackers Break Into The Personal Life Of NYU Professor By Invitation

Hackers Break Into The Personal Life Of NYU Professor By Invitation

In today’s digital age, nearly every one of us has a digital presence. This makes us vulnerable in many ways because digital security is a tricky thing. A New York University professor, Adam Penenberg, recently asked a group of hackers to try and ‘break’ into his life. And they did, astonishing the professor along the way.

By On October 31, 2013 Respond
Add To Bookmark Add To Readlist  
Russia Claims Imported Chinese Clothing Irons Are Bugged

Russia Claims Imported Chinese Clothing Irons Are Bugged

When it comes to cyber ops, technology is often used very intelligently to accomplish espionage. But a Russian channel has now claimed that China is bugging its clothing irons so that when they are imported to Russia, they can connect to unsecured Wi-Fi networks and spread viruses.

By On October 30, 2013 Respond
Add To Bookmark Add To Readlist  
Attacker Can Hijack Web-Based iOS App Requests Over Wi-Fi

Attacker Can Hijack Web-Based iOS App Requests Over Wi-Fi

When a user connects to a random Wi-Fi network without first ensuring adequate security measures on his device, it puts him at many risks. Skycure has now demonstrated that an attacker can easily hijack an iOS app web request when initiated on the same Wi-Fi network that he is connected to.

By On October 30, 2013 Respond
Add To Bookmark Add To Readlist  
Adobe Security Breach Is Far More Serious Than The Company Revealed

Adobe Security Breach Is Far More Serious Than The Company Revealed

We recently reported how Adobe was a victim of the hackers, yet again, and that the hackers were able to make away with the data of nearly 3 million users. But more details about the incident show that hackers may have laid their hands on the data of 38 million users, while also getting the source code of many notable Adobe softwares.

By On October 30, 2013 Respond
Add To Bookmark Add To Readlist  
Report Cites NSA Monitored Data From 60 Million Phone Calls In Spain

Report Cites NSA Monitored Data From 60 Million Phone Calls In Spain

The Snowden leaks continue to put the US government in a very difficult position. The country’s premier intelligence agency, NSA, not only tapped into the emails of former Mexican President and the phone calls of German Chancellor, it also apparently collected data on 60 million phone calls in Spain, cites a new report.

By On October 29, 2013 Respond
Add To Bookmark Add To Readlist  
Google Detected Malware On PHP.net Website, Issue Resolved Now

Google Detected Malware On PHP.net Website, Issue Resolved Now

A few days ago, multiple sources confirmed that the notable website PHP.net was compromised. Google warned users trying to access the site that it contained a malware while Chrome and Firefox also cited similar warnings. The issue has been resolved by now.

By On October 28, 2013 Respond
Add To Bookmark Add To Readlist  
12-Year-Old Boy Hacks Government Sites And Leaks Data To Anonymous

12-Year-Old Boy Hacks Government Sites And Leaks Data To Anonymous

Earlier we have seen Anonymous hacking government website and threatening to leak confidential information. But this time, a 12-year-old boy has hacked government websites and later leaked the data to famous hacktivist group Anonymous.

By On October 27, 2013 Respond
Add To Bookmark Add To Readlist  
German Chancellor Merkel Protests To Obama Over NSA Tapping Her Calls

German Chancellor Merkel Protests To Obama Over NSA Tapping Her Calls

Ever since NSA’s extensive surveillance program blew up to the public, thanks to Edward Snowden, startling revelations have been coming to light. Recently, it was reported that NSA hacked into the email of former Mexican President. And now, German Chancellor has protested to President Obama over the fact that NSA tapped her calls.

By On October 24, 2013 1 Response
Add To Bookmark Add To Readlist  
US Senator Launches Initiative To Regulate Tracking Of User Data In Retail Stores

US Senator Launches Initiative To Regulate Tracking Of User Data In Retail Stores

The habits, choices and preferences of the consumers are increasingly important for the retail industry. To that end, many retail stores actively gather location data of the users when they are within a retail location. A US Senator now aims to regulate and restrict such industry practices.

By On October 24, 2013 Respond
Add To Bookmark Add To Readlist  
DDoS Attacks Are Growing In Size And Volume, Warns Security Firm

DDoS Attacks Are Growing In Size And Volume, Warns Security Firm

DDoS attacks are probably the most common tactic used by hackers to attack servers. It typically involves using multiple computers to attack a given server and try to choke its bandwidth. Over the years, the size and volume of these DDoS attacks is growing rather rapidly, a security firm has warned now.

By On October 22, 2013 Respond
Add To Bookmark Add To Readlist  
NSA Hacked Email Account Of Former Mexican President Felipe Calderon

NSA Hacked Email Account Of Former Mexican President Felipe Calderon

Recent leaks by Edward Snowden have shown that NSA has used illegal and unconstitutional ways to spy on the US citizens as well as people elsewhere. A fresh report in Der Spiegel magazine shows that the agency hacked the email account of former Mexican President, Felipe Calderon.

By On October 21, 2013 Respond
Add To Bookmark Add To Readlist  
Backdoor Vulnerability Found In D-Link Router

Backdoor Vulnerability Found In D-Link Router

A new backdoor vulnerability has been discovered in D-Link modem routers. The vulnerability allows a potential hacker to gain access to the configuration page of the router, even without knowing the username and password.

By On October 15, 2013 Respond
Add To Bookmark Add To Readlist  
Topic List
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook