FBI May Have Hacked Innocent TorMail Users
Back in 2013, the FBI seized TorMail, one of the most popular dark web email services, and shortly after started to rifle through the server’s contents. At the time, researchersRead More →
Back in 2013, the FBI seized TorMail, one of the most popular dark web email services, and shortly after started to rifle through the server’s contents. At the time, researchersRead More →
Highly privileged account could be used to hack customers’ networks, researchers warn. A company that supplies audio-visual and building control equipment to the US Army, the White House, and otherRead More →
GCHQ insists on shooting itself in the foot with backdoored VoIP encryption protocol, developed in-house by CESG. Britain’s intelligence agency, GCHQ (Government Communications Headquarters), has already developed a phone encryptionRead More →
Malvertisers are once again abusing ad technology platform AdSpirit and exposing visitors of the MSN homepage to malware. These attacks appeared to have been primarily focused on Germans users viaRead More →
Apple fixes vulnerability 2.5 years after receiving private report. Apple has squashed a bug in its iOS operating system that made it possible for hackers to impersonate end users whoRead More →
For a little over a month, researchers and previous victims have been quietly helping TeslaCrypt victims get their files back using a flaw in the TeslaCrypt’s encryption key storage algorithm. The information thatRead More →
Nasty trojan found in the Android OS system loader. Some Phillips s307 Android smartphones come with a pre-installed trojan (Android.Cooee.1) that shows ads and animations on the user’s main screen, andRead More →
Intel-powered laptops are safe again. So are desktops. Intel has released version 2.4 of the Intel Driver Update Utility, fixing a critical security flaw (CVE-2016-1493) that enabled attackers to interceptRead More →
Cyber-crooks secretly develop new Asacub Android malware, deploy it for the first time this Christmas. Over the past six months, security experts from Kaspersky have observed the slow evolution of theRead More →
Exploit takes a long time to cook Windows, but gives hackers a menu of evil options. Shmoocon Foxglove Security bod Stephen Breen has strung together dusty unpatched Windows vulnerabilities toRead More →