Standard Post with Image

iOS apps can use your camera without you knowing

Felix Krause, founder of Fastlane.Tools, said the way Apple’s software handles camera access and recording is leaving many fans vulnerable to being spied on by apps on their gadgets without any notification or warning.

Read More
Standard Post with Image

jQuery Official Blog Hacked — Stay Calm, Library is Safe!

While there is no evidence yet if the server (code.jquery.com) that host jQuery file was also compromised

Read More
Standard Post with Image

Hacker Hijacks CoinHive's DNS to Mine Cryptocurrency Using Thousands of Websites

When yesterday I was reporting about the sudden outbreak of another global ransomware attack ‘Bad Rabbit,’ I thought what could be worse than this?

Read More
Standard Post with Image

Bad Rabbit: New Ransomware Attack Rapidly Spreading Across Europe

A new widespread ransomware attack is spreading like wildfire around Europe and has already affected over 200 major organisations, primarily in Russia, Ukraine, Turkey and Germany, in the past few hours.

Read More
Standard Post with Image

DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions

DUHK — Don’t Use Hard-coded Keys — is a new ‘non-trivial’ cryptographic implementation vulnerability that could allow attackers to recover encryption keys that secure VPN connections and web browsing sessions.

Read More
Standard Post with Image

Kaspersky Opens Antivirus Source Code for Independent Review to Rebuild Trust

Kaspersky Lab — We have nothing to hide!

Russia-based Antivirus firm hits back with what it calls a “comprehensive transparency initiative,” to allow independent third-party review of its source code and internal processes to win back the trust of customers and infosec community.

Read More
Standard Post with Image

New Rapidly-Growing IoT Botnet Threatens to Take Down the Internet

Just a year after Mirai—biggest IoT-based malware that caused vast Internet outages by launching massive DDoS attacks—completed its first anniversary, security researchers are now warning of a brand new rapidly growing IoT botnet.

Read More
Standard Post with Image

Unpatched Microsoft Word DDE Exploit Being Used In Widespread Malware Attacks

Last week we reported how hackers could leveraging an old Microsoft Office feature called Dynamic Data Exchange (DDE), to perform malicious code execution on the targeted device without requiring Macros enabled or memory corruption.

Read More
Standard Post with Image

Google Play Store Launches Bug Bounty Program to Protect Popular Android Apps

Better late than never.



Google has finally launched a bug bounty program for Android apps on Google Play Store, inviting security researchers to find and report vulnerabilities in some of the most popular Android apps.

Read More
Standard Post with Image

Android to get DNS over TLS

No doubt your Internet Service Provides (ISPs), or network-level hackers cannot spy on https communications.

But do you know — ISPs can still see all of your DNS requests, allowing them to know what websites you visit.

Read More
Looking for older posts? View our Archives