Most Of The Cloud Services Are Still Vulnerable To DROWN And Heartbleed Attack
Most Of The Cloud Services Are Still Affected By DROWN And Heartbleed VulnerabilityDue to the DROWN attack, the cloud service providers are failing to protect their clients from this new attack. Even...
View ArticleTypos Thwart $1 Billion Hack Attempt On Bangladesh Bank
Typos Thwart $1 Billion Hack Attempt On Bangladesh Bank.According to Bangladesh bank officials, "In DHAKA cyber criminals was targeted on central bank and they steal almost $1 billion from an...
View ArticleAccording To Researchers Java Security Is Still Vulnerable
According To Researchers Java Security Is Still VulnerablePolish security firm Security Explorations researchers are claiming that Java users are vulnerable to attacks due to the faculty security...
View Article2016 Cyber Security Essentials - The Ultimate Defense Kit (a $39.99 value!)...
"2016 Security Essentials - The Ultimate Defense Kit (a $39.99 value!)"Kit includes “Windows Malware Analysis Essentials” plus 3 other resources to help you understand network security.By delving into...
View ArticleTor Users Can Be Tracked By Mouse Movements
The Way You Move Your Mouse That Can Help Others To Track You Even On Tor BrowserDo you know what the way you use for browsing the internet that is slowly browsing which could be the reason for...
View ArticleThe Google Chrome Extension That Steals Users Bitcoin
From Users The Bitcoin Is Stolen Which Is Caught By Chrome ExtensionBitstamp (Slovenia-based Bitcoin exchange portal) is warning the Google Chrome extension users about stealing of Bitcoin when the...
View ArticleTwo Teenagers Hacked Instagram Accounts And Earned Tens Of Thousands Of Euros
Two Teenagers Hacked Instagram Accounts And Earned Tens Of Thousands Of EurosThe Dutch Police arrested two suspects who hacked multiple Instagram accounts, last week. The suspects used them to request...
View ArticleFlaw In The Code.org Exposes Volunteer Email Addresses
Flaw In The Code.org Exposes Volunteer Email AddressesCode.org is an organization where students learn computer science. This weekend on their website they found a flaw by which unauthorized parties...
View ArticleDo You Want To Earn $100,000? Then Hack Google Chromebook
Reward Price To Hack Chromebook In Guest Mode Increased from $50,000 To $100,000From 2010, year Google offered a reward to those who find and report security issues under the Google’s Security Reward...
View ArticleSymantec Encryption Everywhere Program Are Providing Free SSL/TLS Certificates
Symantec Encryption Everywhere Program Are Providing Free SSL/TLS CertificatesThrough the Web hosting companies, The Symantec will offer free basic SSL/TLS certificates to domain owners. The Web...
View ArticleGoogle Announces To Add Worldwide HTTPS Info To Transparency Report
Google Announces To Add Worldwide HTTPS Info To Transparency ReportTo track the progress of the Internet's encryption efforts, Google has launched a transparency report. It can consider as the another...
View ArticleTop Media Websites Are Hitting By The Malvertising Campaign
Top Media Websites Are Hitting By The Malvertising CampaignA large malvertising campaign affects many websites like MSN, NYT, BBC, AOL, NFL and its detected by the three major cyber-security vendors....
View Article95.5 Percent Of Mobile Traffic Is Unencrypted In North America, Google...
95.5 Percent Of Mobile Traffic Is Unencrypted In North America, Google Transparency Report.In the Google Transparency Report, the new segment has added that reveals that around 95.5 Percent Of Mobile...
View ArticleOver 198,000 User's Personal Information Exposed By The Kinoptic iOS App
Over 198,000 User's Personal Information Exposed By The Kinoptic iOS AppChris Vickery, a security researcher of MacKeeper has discovered a database that belongs to an abandoned iOS app. The Database is...
View ArticleAndroid Trojan Hides As A Video Player For Pornographic Movies
Android Trojan Hides As A Video Player For Pornographic MoviesA security researchers observed that an Android trojan hides as a video player for pornographic movies and in order to avoid antivirus...
View ArticleSecurity Researcher Found ZeroAccess Malware Botnet To Launch Reflection DDoS...
Security Researcher Found ZeroAccess Malware Botnet To Launch Reflection DDoS AttacksThe ZeroAccess Malware's Botnet Can Be Abused By A MalwareTech Security Researcher.A security researcher has...
View ArticleTeslaCrypt 4.0: Knowing Your Enemy, Knowing Yourself
TeslaCrypt 4.0: Knowing Your Enemy, Knowing YourselfRansomware is raging. It is extremely efficient as the victims often face an uneasy choice between paying money to the cyber criminals and losing...
View ArticleWorld's Largest Companies Including Microsoft And Google Join To Work On...
World's Largest Companies Join Forces To Work On Encrypted EmailThe underlying transport technology, SMTP which is used to send the email is still surprisingly ancient, even though it has been for...
View ArticleSeries Encryption Flaws In iMessage Found And Fixed By Apple
Series Encryption Flaws In iMessage Found And Fixed By AppleOn Monday, Apple revealed by an update that the address of its iOS & Mac OS X operating systems faces the serious defects that affected...
View ArticleFedEx Customers Targeted By New Phishing Scam
FedEx Customers Targeted By New Phishing ScamA new kind of phishing scam targeted by hackers on the FedEx customers uses a social engineering scheme by which it should be strikes that one nerve all...
View Article