IETF recognizes .onion as special-use domain name

Calling the formal recognition of the .onion as a Special-use Domain Name by the Internet Engineering Task Force (IETF) “a small and important landmark in the movement to build privacy into the structure of the Internet,” Jacob Appelbaum, a security researcher and developer, privacy expert and a core member of the Tor Project, said in […]

Forget Credit Cards, Now Withdraw Cash With Iris Scan Technology

Short Bytes: Diebold has developed a concept ATM that reduces the use of plastic money for cash withdrawal to zero. The self-serving machine Irving will identify users through their Iris scan and smartphones delivering cash within 10 seconds. With the ever increasing threat of black hats, after ATMs, the credit cards are at the risk […]

Android Malware Hides as MS Word File, Sends Data To Hacker

Short Bytes: Attackers are now using an android malware app which camouflages itself as a Microsoft Word document. The malware once triggered, scans all of the smartphone’s data and sends it to the hacker via email. The Android malware doesn’t uninstall easily as well. Malware is one of the oldest tricks of attacking and stealing data by […]

Now Chat Anonymously with Tor Instant Messenger

Short Bytes: The Tor Project has announced the release of the beta version of its Tor Messenger that allows you to chat anonymously over the Tor network. Built over Mozilla’s Instantbird platform, the Tor Messenger can be used by Windows, Mac and Linux users. With its motto of anonymity and security by default, The Tor […]

European Police Agencies declare war on DroidJack RAT

Authorities in several European countries announced they have coordinated an operation to arrest criminals using the popular DroidJack RAT. Android RATs are becoming very popular in the criminal underground, a recent research conducted by Recorded Future demonstrated that interest in the DroidJack and AndroRAT, especially in the Middle East and Africa. Mobile spyware is widely adopted […]

Thousands stolen identities of Britons available on the Darkweb

600k customer identities have been stolen in 2014 and according to government officials thousands of Britons data available for sale in the DarkWeb. The digital identities of tens of thousands of Britons are available for sale on the darkweb, including data belonging to the government personnel. Many experts speculate that the volume of data represents […]

Chikdos cross-platform DDoS botnet hit SQL servers worldwide

Experts at Symantec have discovered a new variant of  the Chikdos DDoS-Trojan that is targeting MySQL servers worldwide. There is a malware in the wild that abuses MySQL Servers for DDoS Attacks, the experts named it Chikdos. The threat was detected for the first time by the Polland CERT and according to the experts it has […]

Police raid homes across Europe over DroidJack malware

Thirteen homes in Germany were raided as part of the operation – Image by Thinkstock Police have raided homes in five European countries as part of a malware investigation, according to agency reports. Officers in the UK, Germany, France, Belgium and Switzerland raided several properties connected to suspected users of malware known as DroidJack. DroidJack allows […]

Webhosting company loses 13 million plaintext passwords, says “thanks for your understanding”

There’s another data breach to report – and it’s a big one, affecting approximately 13 million customers of the “free” web hosting company 000Webhost. The breached data, which includes customer names, emails and plaintext passwords (in other words, the passwords weren’t securely stored), has reportedly been put up for sale on underground markets. What’s worse, […]

Hacker Leaks 13 million emails and passwords in 000Webhost Breach

A security researcher (Troy Hunt), who owns the website (haveibeenpwned) have discovered a possible breach of webhosting service 000Webhost servers. Basically, hunt’s site provides information on whether a user’s data has ever been breached online. So, an unknown user recently contacted the researcher and told him about a data breach taking place in an attack […]

30 Toughest Questions Asked In Apple Interviews

Short Bytes: Apple boasts one of the best workforces in the tech world with employees ranging from a software engineer to a salesman. As expected, getting a job at the most valuable company of the world isn’t an easy task. Do you want to know what kind of questions are asked in the interviews at […]

Facebook, WhatsApp Users can be tracked down by hackers

A group of researchers have demonstrated how locations of Facebook and WhatsApp users can be exposed by a security flaw in 4G networks. When a user connects to a 4G network what happens is that they are assigned a special TMSI (Temporary Mobile Subscriber Identity), which is an 8 digit number. TMSI only stores the data in […]

The great car hacking debate

Can cars be hacked remotely or is the idea of remotely hackable cars still only a hypothetical threat? Evidence is presented to help answer this question.

How Innocent Copy-Paste Leaks Your Previous Embarrassing Google Searches

Short Bytes: Our innocent habit of copy-paste is reflected when we send the URLs of search pages as some reference to our friends. But, it comes with the risks of exposing your previous searches, if done carelessly. Read the post to know the risk involved and how to avoid it.  Using the Google search to […]

Multi-stage exploit installing trojan

ESET researchers receive and analyze thousands of new malware samples every day. Earlier this year, one of them caught our attention because it was not an ordinary executable file, but a preference file used by a specific program. Further analysis quickly revealed the file actually is malicious and exploited a vulnerability in the software in […]