How to Connect Android to PC/Mac Without WiFi
Quite a few times, you might need to display Android screen on your PC or Mac to to play games, stream video music, demonstrate the tutorials, share photos by controllingRead More →
Data Security News | Infosec Blog | Information Security Tutorials
Quite a few times, you might need to display Android screen on your PC or Mac to to play games, stream video music, demonstrate the tutorials, share photos by controllingRead More →
Someone hijacked the Transmission BitTorrent client project website to spread ransomware to Mac OS X users. Over the weekend, a malicious party has managed to hack the Transmission BitTorrent client forRead More →
The resurgence and continued prevalence of macro malware could be linked to several factors, one of which is their ability to bypass traditional antimalware solutions and sandboxing technologies. Another factor is the continuousRead More →
Short Bytes: History of hacking always fascinates us as it tells us about the best hackers from the earlier times. But is not interesting to know that what they didRead More →
What’s driving the surge in hidden services—is it government tampering? In recent weeks, the number of “hidden services”—usually Web servers and other Internet services accessible by a “.onion” address on theRead More →
Last summer we shared a story about the SweetCaptcha WordPress plugin injecting ads and causing malvertising problems for websites that leveraged the plugin. When this plugin was removed from the officialRead More →
A group of researchers that analyzed security of a number of smart watches discovered a $17 smartwatch is sold with a backdoor in the pairing app. Be careful of cheap smartwatchRead More →
Sea pirates hire hacker to break into shipping company’s CMS. A curious case reported by Verizon’s RISK Team shows that even those lowly sea pirates chasing after cargo ships with oldRead More →
WinRT PDF exposes users to drive-by attacks. WinRT PDF, the default PDF reader for Windows 10, opens Edge users to a new series of attacks that are incredibly similar to howRead More →
Locky is a new ransomware that has been released (most probably) by the Dridex gang (source). Not surprisingly, it is well prepared, which means that the threat actor behind itRead More →
Short Bytes: Brazilian police have arrested Diego Dzodan, Facebook’s Latin American regional vice-president, for failing to provide WhatsApp messages related to a case of drug-trafficking. In response, Facebook has said that WhatsAppRead More →
Spam posts on Facebook are nothing new. Since videos continue to be a staple form of entertainment—a whopping 8 billion views per day according to last year’s numbers—within the socialRead More →
Until recently, sample wasn’t detected by any of the top antivirus programs. Researchers have uncovered what appears to be newly developed Mac malware from HackingTeam, a discovery that’s prompting speculation thatRead More →
If your corporate network is connected to the Internet, you are doing business on the Internet, you manage web applications that keep confidential information or you are a provider ofRead More →
The journalist Steven Petrow had his computer hacked while on a plane, it was a shocking experience that raises the discussion on privacy. Experts in the aviation industry are spendingRead More →
‘Sybil’ nodes could be used to de-anonymise traffic. The Tor Project is working with Princeton University boffins to try and identify possibly malicious nodes, and prevent them from harvesting traffic byRead More →
Other than an Apple backdoor hack, FBI could use 3 other hacks on killer’s iPhone. According to hardware-security experts, there are at least three ways the FBI could try to removeRead More →
All it takes to hack security cameras and bank accounts is an email, demonstrates a hacker. What happens when you challenge a series of extremely dexterous hackers to hack your bankRead More →
A judge has confirmed that US Departement of Defense funded the Carnegie Mellon University to conduct research on the Tor hacking. In November 2015, the researchers at the Tor Project publiclyRead More →
Journalist gets hacked while writing the FBI vs Apple iPhone hack story. The recent United States court’s order to Apple for hack San Bernardino shooter’s iPhone and providing a backdoor forRead More →