Renowned Password Manager – a LastPass bug has just been fixed as it is rather sensitive and costly vulnerability that would have enabled a noxious site to acquire a user’s previous password entered by the service’s browser extension. The bug as it was originally found was discovered by Tavis Ormandy, a security analyst in Google’s...Continue Reading
World renowned Czech Security firm – Avast, together with one of the largest and most popular virtual private networking (VPN) services provider – NordVPN, suffered a huge and rather extended hacking incident that had a similar cause: unsecured user accounts to their internal systems. Considering itself as one of the largest, if not, the most...Continue Reading
South Korean Tech Giant – Samsung – is currently facing both a controversial and embarrassing issue with one of their latest flagship mobile device, the Samsung S10. They are now scrambling to release the latest software update in order to fix this problem with the S10’s in-display fingerprint sensor technology. Currently, just about anyone...Continue Reading
Cyber Security Analysts have just discovered and documented the birth and development of a downloader that utilizes Microsoft SQL query to acquire and spread malicious malware packages. Just last August, several cyber security analysts found the new, arranged downloader, known as WhiteShadow, which is being utilized to spread an assortment of malware to vulnerable frameworks....Continue Reading
Yes, we have a new kid on the block, for Wi-Fi enthusiasts the better the security the safer they feel, and of course would make them surf more. Internet has been part of our daily lives, therefore securing our activities in the world of the cloud is something more to consider. WPA3 is said to...Continue Reading
The 2017 version of OSX.Dok used a fake Preview icon to disguise an application bundle. The malware apparently targeted mostly European Mac users and was spread via an email phishing campaign that attempted to convince the user there was some problem with their tax returns. A similar trick is used in the new version,...Continue Reading
Port tweeking summary This might not be new as peoples’ testimony regarding this type of attack on mobile phone numbers has been alarming since this will make your digital life worse than ever. CYBER criminals are using a simple trick to steal people’s mobile phone numbers, move them to a different carrier and use the...Continue Reading
Businessman/ spy / hacker? It marks the first time that the FBI has issued an arrest warrant for a foreigner charged with an act of cyber espionage via a network attack that has until now been attributed exclusively to state actors like the PLA (Chinese People’s Liberation Army).Su Bin, 51, a Chinese national who also...Continue Reading
The US Government’s fraud management efforts appear to have made the world go hysterical as it had ordered Alphabet’s Google to revoke the license of Android and Google proprietary apps from Huawei. In a sudden turn of events the Department of Commerce has given Huawei a temporary general license to maintain its current products.The general...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.