FBI Wants You To “Just Pay The Ransom” to Cyber Criminals
The Federal Bureau of Investigation (FBI) has stated that it’s completely fine to pay ransom to cyber criminals. If you are a fan of Hollywood movies you may be familiar withRead More →
The Federal Bureau of Investigation (FBI) has stated that it’s completely fine to pay ransom to cyber criminals. If you are a fan of Hollywood movies you may be familiar withRead More →
Despite its controversial nature, the US Senate has passed the Cybersecurity Information Sharing Act (CISA). Detractors are concerned because CISA would open up an information exchange between the public andRead More →
“We’re about to leave a whole chunk of the internet in the past,” as millions of people remain dependent on old, insecure, but widely-used encryption. In 2016, tens of millionsRead More →
Buying and selling things online are just two of the many activities Internet users are fond of doing. For some, they shop for clothes, bags, shoes, jewelries, and books; forRead More →
The deputy director of the US National Security Agency (NSA), Richard Ledgett, has warned of the increasing danger of destructive cyber attacks by states. He told the BBC: “If youRead More →
Two weeks after authorities announced they had taken down the botnet behind the banking malware Dridex, new research suggests the threat is alive and well. Researchers with security company Invincea announced todayRead More →
A recent network forensic examination of popular messaging service WhatsApp is offering new details on the data that can be collected from the app’s network from its new calling feature:Read More →
Unlike other body parts, heart tissues are incapable of seal-healing once damaged. Fortunately, the scientific community continue to hack modern technology into solving life’s most complex health problems. Conventional 3DRead More →
TalkTalk, a British phone and broadband provider with more than four million customers, disclosed Friday that intruders had hacked its Web site and may have stolen personal and financial data.Read More →
The fear of malicious actors taking control of glaring flaws in smart cars is on the rise. This threat is therefore considered to be one of the major technical challengesRead More →
Researchers have found out that hackers took over around 900 CCTV cameras with weak login credentials and used them as a DDosS botnet that runs all around the world. AccordingRead More →
Cyber criminals are targeting Apple users with yet another sophisticated phishing scam where users are asked to click a link for payment refund. This new phishing campaign has been disguised immaculatelyRead More →
Facebook has indexed almost two trillion posts put on the site by its members to make it easier to find them. The change means that many older posts will now beRead More →
A cyber attack and spy group believed to have ties with the Russian government reportedly attempted to hack the Dutch agency tasked with investigating the Malaysia Airlines flight MH17 disaster,Read More →
Joomla on Thursday released a new version of its content management system, 3,4,5, that addresses a critical SQL injection vulnerability that could have let attackers gain access to data in theRead More →
For those who seek privacy while working online, you now have a solution in “Warble,” an Anonymous calling app for Android, iOS and Windows OS. Warble is an app developedRead More →
TalkTalk, one of UK’s biggest telecoms, has suffered a “significant and sustained cyberattack” on their website, and it’s possible that personal and financial information of some 4 million of theRead More →
Sony has agreed to pay up to $8m over employees’ personal data lost in the 2014 hacking scandal surrounding the release of The Interview. Hackers had broken into the company’sRead More →
Sharon Goldberg remembers the cold February day when her Boston University PhD candidate Aanchal Malhotra was studying routing security, in particular, attacks against the resource public key infrastructure (RPKI)—and keptRead More →
Apple has released security updates to fix critical vulnerabilities in the following Apple products: OS X El Capitan, Mavericks and Yosemite, OS X Server, Safari, watchOS, iOS, iTunes, Xcode, andRead More →