If you try to market a product as “unhackable,” it stands to reason that someone is going to attempt to hack your device to knock you down a peg or two. And that is exactly what happened with eyeDisk, which was first brought to light last year with a successful Kickstarter campaign. eyeDisk was able...Continue Reading
The ruling against China Mobile, which is owned by the Chinese government, comes on the day that a Chinese delegation led by top negotiator Liu He arrives in Washington for talks to end the US-China trade war. US communications regulators on May 9, 2019 voted against a Chinese telecoms company’s application to provide1phone service...Continue Reading
Renowned Password Manager – a LastPass bug has just been fixed as it is rather sensitive and costly vulnerability that would have enabled a noxious site to acquire a user’s previous password entered by the service’s browser extension. The bug as it was originally found was discovered by Tavis Ormandy, a security analyst in Google’s...Continue Reading
World renowned Czech Security firm – Avast, together with one of the largest and most popular virtual private networking (VPN) services provider – NordVPN, suffered a huge and rather extended hacking incident that had a similar cause: unsecured user accounts to their internal systems. Considering itself as one of the largest, if not, the most...Continue Reading
South Korean Tech Giant – Samsung – is currently facing both a controversial and embarrassing issue with one of their latest flagship mobile device, the Samsung S10. They are now scrambling to release the latest software update in order to fix this problem with the S10’s in-display fingerprint sensor technology. Currently, just about anyone...Continue Reading
Cyber Security Analysts have just discovered and documented the birth and development of a downloader that utilizes Microsoft SQL query to acquire and spread malicious malware packages. Just last August, several cyber security analysts found the new, arranged downloader, known as WhiteShadow, which is being utilized to spread an assortment of malware to vulnerable frameworks....Continue Reading
Yes, we have a new kid on the block, for Wi-Fi enthusiasts the better the security the safer they feel, and of course would make them surf more. Internet has been part of our daily lives, therefore securing our activities in the world of the cloud is something more to consider. WPA3 is said to...Continue Reading
The 2017 version of OSX.Dok used a fake Preview icon to disguise an application bundle. The malware apparently targeted mostly European Mac users and was spread via an email phishing campaign that attempted to convince the user there was some problem with their tax returns. A similar trick is used in the new version,...Continue Reading
Scammers are abusing the Google Calendar feature using a sophisticated phishing scams to steal data of 1.5 billion users of Google Calendar, including Gmail users.It was observed recently that there were multiple cases of a sophisticated phishing scams targeting consumers through unsolicited Google Calendar notifications with the purpose of tricking users into sharing their personal...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.