Archive for the ‘Security’ Category

Russia Claims Imported Chinese Clothing Irons Are Bugged

Russia Claims Imported Chinese Clothing Irons Are Bugged

When it comes to cyber ops, technology is often used very intelligently to accomplish espionage. But a Russian channel has now claimed that China is bugging its clothing irons so that when they are imported to Russia, they can connect to unsecured Wi-Fi networks and spread viruses.

By On October 30, 2013 Respond
Add To Bookmark Add To Readlist  
Attacker Can Hijack Web-Based iOS App Requests Over Wi-Fi

Attacker Can Hijack Web-Based iOS App Requests Over Wi-Fi

When a user connects to a random Wi-Fi network without first ensuring adequate security measures on his device, it puts him at many risks. Skycure has now demonstrated that an attacker can easily hijack an iOS app web request when initiated on the same Wi-Fi network that he is connected to.

By On October 30, 2013 Respond
Add To Bookmark Add To Readlist  
Adobe Security Breach Is Far More Serious Than The Company Revealed

Adobe Security Breach Is Far More Serious Than The Company Revealed

We recently reported how Adobe was a victim of the hackers, yet again, and that the hackers were able to make away with the data of nearly 3 million users. But more details about the incident show that hackers may have laid their hands on the data of 38 million users, while also getting the source code of many notable Adobe softwares.

By On October 30, 2013 Respond
Add To Bookmark Add To Readlist  
Report Cites NSA Monitored Data From 60 Million Phone Calls In Spain

Report Cites NSA Monitored Data From 60 Million Phone Calls In Spain

The Snowden leaks continue to put the US government in a very difficult position. The country’s premier intelligence agency, NSA, not only tapped into the emails of former Mexican President and the phone calls of German Chancellor, it also apparently collected data on 60 million phone calls in Spain, cites a new report.

By On October 29, 2013 Respond
Add To Bookmark Add To Readlist  
Google Detected Malware On PHP.net Website, Issue Resolved Now

Google Detected Malware On PHP.net Website, Issue Resolved Now

A few days ago, multiple sources confirmed that the notable website PHP.net was compromised. Google warned users trying to access the site that it contained a malware while Chrome and Firefox also cited similar warnings. The issue has been resolved by now.

By On October 28, 2013 Respond
Add To Bookmark Add To Readlist  
12-Year-Old Boy Hacks Government Sites And Leaks Data To Anonymous

12-Year-Old Boy Hacks Government Sites And Leaks Data To Anonymous

Earlier we have seen Anonymous hacking government website and threatening to leak confidential information. But this time, a 12-year-old boy has hacked government websites and later leaked the data to famous hacktivist group Anonymous.

By On October 27, 2013 Respond
Add To Bookmark Add To Readlist  
German Chancellor Merkel Protests To Obama Over NSA Tapping Her Calls

German Chancellor Merkel Protests To Obama Over NSA Tapping Her Calls

Ever since NSA’s extensive surveillance program blew up to the public, thanks to Edward Snowden, startling revelations have been coming to light. Recently, it was reported that NSA hacked into the email of former Mexican President. And now, German Chancellor has protested to President Obama over the fact that NSA tapped her calls.

By On October 24, 2013 1 Response
Add To Bookmark Add To Readlist  
US Senator Launches Initiative To Regulate Tracking Of User Data In Retail Stores

US Senator Launches Initiative To Regulate Tracking Of User Data In Retail Stores

The habits, choices and preferences of the consumers are increasingly important for the retail industry. To that end, many retail stores actively gather location data of the users when they are within a retail location. A US Senator now aims to regulate and restrict such industry practices.

By On October 24, 2013 Respond
Add To Bookmark Add To Readlist  
DDoS Attacks Are Growing In Size And Volume, Warns Security Firm

DDoS Attacks Are Growing In Size And Volume, Warns Security Firm

DDoS attacks are probably the most common tactic used by hackers to attack servers. It typically involves using multiple computers to attack a given server and try to choke its bandwidth. Over the years, the size and volume of these DDoS attacks is growing rather rapidly, a security firm has warned now.

By On October 22, 2013 Respond
Add To Bookmark Add To Readlist  
NSA Hacked Email Account Of Former Mexican President Felipe Calderon

NSA Hacked Email Account Of Former Mexican President Felipe Calderon

Recent leaks by Edward Snowden have shown that NSA has used illegal and unconstitutional ways to spy on the US citizens as well as people elsewhere. A fresh report in Der Spiegel magazine shows that the agency hacked the email account of former Mexican President, Felipe Calderon.

By On October 21, 2013 Respond
Add To Bookmark Add To Readlist  
Backdoor Vulnerability Found In D-Link Router

Backdoor Vulnerability Found In D-Link Router

A new backdoor vulnerability has been discovered in D-Link modem routers. The vulnerability allows a potential hacker to gain access to the configuration page of the router, even without knowing the username and password.

By On October 15, 2013 Respond
Add To Bookmark Add To Readlist  
United Airlines Website Glitch Lets You Purchase Free Tickets

United Airlines Website Glitch Lets You Purchase Free Tickets

United Airlines doesn’t exactly seem keen on improving its ticket-purchasing system. The company has suffered because of it in the past and now, users have found an exploit which lets them purchase United Airlines tickets absolutely free of cost.

By On October 15, 2013 Respond
Add To Bookmark Add To Readlist  
Team Madleets Hacks Google’s Malaysian Site

Team Madleets Hacks Google’s Malaysian Site

In recent months, we have seen a number of DNS poison attacks. These attacks typically involve meddling with the DNS of a given site so that it is redirected by the hackers to a different page. A similar attack has now been used to hack and redirect Google’s Malaysian site.

By On October 11, 2013 Respond
Add To Bookmark Add To Readlist  
Secure Your Dropbox Files With Qi

Secure Your Dropbox Files With Qi

Dropbox is used by many users to store their documents and other files in cloud storage. However, once these files are stored in Dropbox, it is only natural to wonder how secure they are. Now you can add an extra layer of security by using Qi, a secure token that automatically encrypts all your Dropbox files before uploading them.

By On October 9, 2013 Respond
Add To Bookmark Add To Readlist  
Microsoft Pays $28,000 To Researchers For Finding IE 11 Bugs

Microsoft Pays $28,000 To Researchers For Finding IE 11 Bugs

Microsoft’s browser, Internet Explorer, has long been lambasted and criticized for providing inadequate security. However, the company seems adamant on providing better security features in IE 11. To that end, Microsoft recently paid $28,000 to six researchers who were able to find key bugs in IE 11.

By On October 9, 2013 1 Response
Add To Bookmark Add To Readlist  
Topic List
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook