website statistics

NSA Knew About The Heartbleed Bug And Exploited It, Report Claims

NSA Knew About The Heartbleed Bug And Exploited It, Report Claims

Ever since Edward Snowden’s shocking revelations about NSA, the agency has been at the bitter end of criticisms related to digital security. Bloomberg has now claimed that NSA knew about the Heartbleed bug and exploited it for two years.

By On April 12, 2014 Respond
Add To Bookmark Add To Readlist  
Facebook Built ThreatData, A Framework For Web Security

Facebook Built ThreatData, A Framework For Web Security

Although having very high security, hackers have been found breaching into many systems. So, to protect itself from being hacked, Facebook has built a security-focused framework called ThreatData. It’ll help Facebook investigate, analyze and combat Internet threats.

By On March 28, 2014 Respond
Add To Bookmark Add To Readlist  
DDoS Attacks Are Growing In Size And Volume, Warns Security Firm

DDoS Attacks Are Growing In Size And Volume, Warns Security Firm

DDoS attacks are probably the most common tactic used by hackers to attack servers. It typically involves using multiple computers to attack a given server and try to choke its bandwidth. Over the years, the size and volume of these DDoS attacks is growing rather rapidly, a security firm has warned now.

By On October 22, 2013 Respond
Add To Bookmark Add To Readlist  
Long Passwords May Lead To DoS Attacks

Long Passwords May Lead To DoS Attacks

For long, security researchers have preached longer passwords because the odds of cracking them are less than shorter passwords. However, now it has been revealed that longer passwords come with the risk of possible DoS attacks, especially if no specific password length is maintained by the web service.

By On September 17, 2013 Respond
Add To Bookmark Add To Readlist  
Hackers Deface Google Palestine Site

Hackers Deface Google Palestine Site

Since Google’s localized versions normally garner the highest amounts of traffic, they are the primary targets of different hackers. The localized Palestinian site of Google was recently defaced by hackers who were apparently ‘trying’ to put out a political message.

By On August 27, 2013 Respond
Add To Bookmark Add To Readlist  
[Video] Police Introduce New Body Cameras

[Video] Police Introduce New Body Cameras

Although having latest technologies, police spend huge time on paperwork when they catch any criminal or suspect. To ease their work, police now use new technologies like body worn cameras and tablet computers, which help them spend less time on paperwork and more time on the beat. Lately, police have introduced new body cameras.

By On August 22, 2013 Respond
Add To Bookmark Add To Readlist  
CyanogenMod Offers Secure Device-Tracking With Device Finder

CyanogenMod Offers Secure Device-Tracking With Device Finder

Currently, there are a number of services which let you recover your lost Android device. However, most of these services, offered as apps, are not very secure. The CyanogenMod team has offered a new Device Finder service which, it claims, will be absolutely secure to use.

By On August 21, 2013 Respond
Add To Bookmark Add To Readlist  
Mobile Ad Networks Used To Install Mobile Malware, Steal Money

Mobile Ad Networks Used To Install Mobile Malware, Steal Money

In the past, we have seen many methods used by mobile malware authors to install their nefarious software on mobile devices. Now, it has been found that many of these malware are using mobile ad networks to gain access to users’ devices.

By On August 19, 2013 Respond
Add To Bookmark Add To Readlist  
Android Exploit Forces Bitcoin Applications To Upgrade Wallets

Android Exploit Forces Bitcoin Applications To Upgrade Wallets

Recently, a serious cryptography problem was discovered in Android. The exploit, when used by hackers to break into Bitcoin wallets, would’ve enabled them to steal the currency. In view of the security loophole, several Bitcoin applications have upgraded their wallets.

By On August 14, 2013 Respond
Add To Bookmark Add To Readlist  
Secure Your Keys By Keeping A Copy In Cloud With KeyMe

Secure Your Keys By Keeping A Copy In Cloud With KeyMe

Most of us have faced such instances where we lose our keys, have to go through a lot of pain to get a new copy and then finally get access back to our house or our car. KeyMe is a new startup which lets you store digital copies of your keys in the cloud, which can be immensely helpful in the event that you lose any of them.

By On August 10, 2013 Respond
Add To Bookmark Add To Readlist  
FBI Can Remotely Activate Your Android Smartphone Microphone

FBI Can Remotely Activate Your Android Smartphone Microphone

In the recent past, it has been realized that intelligence agencies are usually equipped with the latest exploits, which let them break into any devices and machines they want to. It has now been revealed that FBI can remotely activate your Android smartphone’s microphone, thus listening in on your real-life conversations.

By On August 5, 2013 Respond
Add To Bookmark Add To Readlist  
Hackers Can Use Your Smart TV To Watch You

Hackers Can Use Your Smart TV To Watch You

Smart TVs have been around for a while and most of them equipped with a whole plethora of apps as well as in-built internet connectivity, to let you stream any content of your liking. However, a few exploits were recently discovered in certain Samsung Smart TV models, which would let hackers ‘watch’ you through the built-in cameras.

By On August 4, 2013 Respond
Add To Bookmark Add To Readlist  
Fake Chargers Can Install Malware On Your iPhone

Fake Chargers Can Install Malware On Your iPhone

Security researchers have made a rather astonishing discovery – some fake chargers may come packed with malware, which can then be installed on an iPhone as soon as the charger is connected to it.

By On August 3, 2013 Respond
Add To Bookmark Add To Readlist  
Court Bans Scientists From Revealing Luxury Car Code Flaws

Court Bans Scientists From Revealing Luxury Car Code Flaws

Falvio Garcia is a computer science lecturer in University of Birmingham who recently found a weakness in the security system of some major luxury cars. He intended to publish these findings in a research paper, but a court has now barred him from doing so, citing that this may lead to car thefts.

By On July 29, 2013 Respond
Add To Bookmark Add To Readlist  
Hackers Take Control Of A Standard Car Using A Laptop

Hackers Take Control Of A Standard Car Using A Laptop

Car hacking isn’t exactly a huge issue right now. But as cars get more automated and are fitted up with more advanced systems, such a niche is inevitable in the near future. To highlight this, two hackers were able to control a standard car simply by using a laptop, demonstrating how such a hack can be pulled off very easily.

By On July 28, 2013 1 Response
Add To Bookmark Add To Readlist  
Topic List
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook