Edward Snowden joins Twitter and follows NSA
Fugitive US intelligence contractor Edward Snowden has opened an account on the social network website Twitter. His opening tweet was: “Can you hear me now?” In his profile, Mr SnowdenRead More →
Data Security News | Infosec Blog | Information Security Tutorials
Fugitive US intelligence contractor Edward Snowden has opened an account on the social network website Twitter. His opening tweet was: “Can you hear me now?” In his profile, Mr SnowdenRead More →
Pirate Bay is online and playing a game of cat and mouse with IP regulators. Pirate Bay co-founder Gottfrid Svartholm Warg was released from a Swedish prison Saturday, three years afterRead More →
Technique allows full recovery of 2048-bit RSA key stored in Amazon’s EC2 service. Piercing a key selling point of commercial cloud computing services, computer scientists have devised a hack thatRead More →
Researchers have found that smartphone browsers can deliver a powerful flooding attack. Researchers suspect a mobile advertising network has been used to point hundreds of thousands of smartphone browsers atRead More →
Yesterday at the Maker Faire in New York, we had a chance to check out the Rephone, a clever little project that comprises a bunch of modules that let youRead More →
Largest Chat app for Smartphones is now at Risk whatsapp hack that allow user to steal conversation, Israeli security firm Check Point discovered a critical vulnerability of WhatsApp Web that mightRead More →
In case didn’t know or need a reminder, browser cookies aren’t exactly impervious to attack. The DHS-sponsored CERT at the Software Engineering Institute at Carnegie Mellon University this week droppedRead More →
Once again, fully patched iPhone lock screens can be bypassed with a few keystrokes. iPhone users have yet another screenlock bypass vulnerability to watch out for, according to a newRead More →
Symantec’s researchers have discovered a new version of the Kovter trojan, which now mimics the Poweliks malware and is able to live on your computer’s registry, without needing to beRead More →
Lenovo has been caught, yet again, installing apps on its laptops and workstations without the user’s consent or knowledge, as Michael Horowitz from Computerworld reports. This is not the firstRead More →