Court Rules the FBI Does Not Need a Warrant to Hack a Computer
In one of the many ongoing legal cases surrounding a dark web child pornography site, a judge has written that the FBI did not require a warrant to hack aRead More →
In one of the many ongoing legal cases surrounding a dark web child pornography site, a judge has written that the FBI did not require a warrant to hack aRead More →
Location services could very useful to find lost devices, but do not do anything silly to find your stolen smartphone, it could be very risky. People underestimate the risk relatedRead More →
Last year, we wrote about how Broadband could be banning porn in the near future, and last month the petrifying news emerged that watching porn on your phone could haveRead More →
Advantech has published a new version of its WebAccess product to address vulnerabilities that put installations at risk to remote code execution attacks. Exploiting the vulnerabilities would be a challenge,Read More →
InMobi ad network, which reaches more than 1 billion devices, settles FTC charges. A mobile advertising company that tracked the locations of hundreds of millions of consumers without consent hasRead More →
A new ransomware was discovered that is written in Python and targets theZimbra enterprise collaboration software. Reported by one of our visitors, this ransomware targets the Zimbra email message store folder and encryptsRead More →
The central banks of Indonesia and South Korea have been hit by distributed denial of service attacks on their public websites, with officials linking the timing of the attacks toRead More →
There’s something fishy about this botnet. Social media and advertising fraud investigations firm Sadbottrue has discovered a botnet of three million Twitter accounts, along with two smaller botnets of 100,000 botsRead More →
In an effort to develop a target base and increase the conversion rate of victims, ransomware perpetrators will try to veer away from well-known families and create new family sportingRead More →
We came across a family of mobile malware called Godless (detected as ANDROIDOS_GODLESS.HRX) that has a set of rooting exploits in its pockets. By having multiple exploits to use, GodlessRead More →