HIJACKING WHATSAPP ACCOUNTS USING WHATSAPP WEB
Whatsapp accounts are based on phone numbers. This means your phone number is your username and it’s also used for authentication. While this is not perfect from a privacy standpointRead More →
Whatsapp accounts are based on phone numbers. This means your phone number is your username and it’s also used for authentication. While this is not perfect from a privacy standpointRead More →
Only a local hacker in a facility would be able to run an attack. General Electric (GE) has pushed out an update to its industrial control systems following the discoveryRead More →
Lavabit, the Snowden recommended encrypted email service, is back. Its CEO Ladar Levison announced new privacy-enhancing features. Do you remember Lavabit? It was the US Encrypted Email Service used by theRead More →
Reportedly, over a million accounts on the Supercell community forum have been compromised after a data breach occurred in 2016. The firm Supercell, the authors of the notorious “The ClashRead More →
A recently discussed feature in WhatsApp, the messaging app used by more than 1 billion people worldwide, is not a backdoor. That’s the message from an open letter written byRead More →
A Florida man pleaded guilty on Tuesday to charges stemming from his employment with an unlicensed bitcoin exchange that prosecutors say was owned by an Israeli who oversaw a massiveRead More →
Users can expect to share 30 percent of their ill-gotten gains for signing up. A new kind of ransomware-as-a-service (RaaS) which offers users the chance to tailor their own codeRead More →
Security researchers have discovered a new Android trojan named Skyfin that can infiltrate the local Play Store Android app and download or purchase other apps behind the user’s back. UntilRead More →
The encrypted dark web site aims to help users circumvent government censorship. ProtonMail now has a home on the dark web.The encrypted email provider announced Thursday it will allow itsRead More →
A new ransomware family is targeting Android devices, locking access to the screen, and constantly pestering the user to enter his payment card details. According to Fortinet researcher Kai Lu,Read More →