Google HTTP Search, yes, it is still possible

  Google began to implement SSL on its search engine back in 2010. First on its own domain name, then as a mandatory feature for logged in Google users, and after a while for all users on the main Google Search website. Workarounds to use HTTP instead of HTTPS on Google Search existed ever since […]

Fewer IPsec VPN Connections at Risk from Weak Diffie-Hellman

A challenge has been made against one of the conclusions in a potentially blockbuster academic paper on cryptographic weaknesses that may be the open door through which intelligence agencies are breaking encrypted connections. The paper, “Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice,” claims that a massively resourced agency such as the NSA could build […]

Jaguar car hack in New Zealand

A Jaguar XFR may have been stolen using hacking techniques increasingly seen on keyless cars. This unidentified thief did not have the key, which was locked safely away inside the dealership, nor was the car unlocked when it was taken. The car was stolen, it has been concluded, using an electronic device used to hack […]

Anonymous Vows To Leak Personal Information of 1,000 KKK Members

The online hacktivist Anonymous is planning to leak personal information of around 1000 members of the white supremacist Christian organization the Ku Klux Klan (KKK). Last year, anonymous gave a brutal response to Ku Klux Klan when they threatened the Ferguson protestors. Many of KKK’s websites went offline; members were exposed (their identities were made public) and […]

Facebook “Message Requests” Lets You Talk to People You’re Not Friends With

The most common problem you may face on social media platforms like Facebook is receiving unwanted messages from strangers. But, Facebook’s new feature will help you overcome this problem and will make it easier for you to identify the strangers and the people you already know. The new feature that Facebook will be rolling out over […]

US Army Experts Call for military bug bounty program AVRP

US Army Military experts urge the establishment of an Army Vulnerability Response Program (AVRP),  a sort of military bug bounty program. What happen when bug hunters have to work with high sensitive environment? An interesting post published by the Cyber Defense Review raises the discussion about the was way to handle vulnerabilities in the information security infrastructure of the […]

Timing attack vulnerability in most Zeus server-sides

Timing attacks has proven practical since 96′ as shown in a paper by Paul C. Kocher. In his paper Paul demonstrate how, by effectively measuring the amount of time required for private key operation, one could completely uncover the private key. This attack was shown to be effective against widely known crypto-systems such as Diffie-Hellman, […]

Fake Chrome browser replaces real thing and serves up unwanted ads

Does your Chrome browser seem a little “off”, but you can’t figure out why? Maybe it’s eFast. Here’s another reason to slow down when installing software, especially free software. A new Potentially Unwanted Program (PUP) disguised as the Google Chrome browser is sneaking onto users computers bundled with legitimate software, hidden deep within the ‘Custom’ […]

Train rider has his contactless card e-pickpocketed

It could have been just another one of those jostlings that happen on the train: a man bumped into a writer for SC Magazine. Except, as Roi Perez tells it, it all seemed a bit deliberate: the guy slowly bumped into him – and his pocket – for a bit too long. He said that […]

Germany Suspects, Will Investigate Google and Facebook Over Data Transfers

Short Bytes: The European Union has many a times been apprehensive of the US-based tech companies, especially on the matters of privacy and data security. Now, Germany has raised concerns over the illegal data transfers from the EU to the US by the global companies like Facebook and Google. The rift between the European and American […]

FBI Wants You To “Just Pay The Ransom” to Cyber Criminals

The Federal Bureau of Investigation (FBI) has stated that it’s completely fine to pay ransom to cyber criminals.  If you are a fan of Hollywood movies you may be familiar with a statement that FBI  has a very strict policy statement “Never negotiate with the terrorists.” But, the same investigation bureau believes that cyber criminals asking […]

Senate Passes Controversial Cybersecurity Act

Despite its controversial nature, the US Senate has passed the Cybersecurity Information Sharing Act (CISA). Detractors are concerned because CISA would open up an information exchange between the public and the private sectors: government would give companies classified information about potential threats, but the bill also incentivizes companies to funnel information to local law enforcement […]

Hackers Target Video Gamers with Sophisticated Phishing Scam

Video gamers have found themselves the target of a new type of scam. No malware or hacking into the games rather a simple phishing scam which is filling scammers’ pockets. Scammers have been found to be sending emails to the gamers portraying themselves as the officials from the gaming companies claiming that they will take legal […]

New App Aims to Cure Blindness For Visually Impaired

With computers starting to help normal human beings to navigate better around the world, robotics and AI are all set to help the visually impaired to navigate around the world without any help. Scientists from IBM Research and Carnegie Mellon University (CMU) are working on solutions that will turn this into reality. At the moment, […]

Which Antivirus Software Protect Themselves From Hacking Attacks?

Short Bytes: Even though the number of users aware about the basic security practices is increasing day-by-day, most of us are unaware of the fact that the antivirus software can also be hacked. Along the similar lines, AV-TEST has conducted a test and listed the consumer and business versions of the antiviruses based on their […]

FBI Advises Ransomware Victims To Pay The Ransom for Retrieving Data

Short Bytes: FBI has advised ransomware victims to pay the ransom and retrieve their data as there is not much the top law enforcement agency of the USA can do in this matter. It is pretty difficult to decrypt the ransomware so users are at the hacker’s mercy. Getting hacked is so common these days […]

US Freaks Out, Worries Russia Would Cut Undersea Internet cables

Short Bytes: Russia got the US intelligence agencies into a frenzy as its naval submarines and spy ships got too close to the global undersea Internet cables. The US officials panicked as speculations that Russia might be trying to sever the fiber-optic cables came up. The world experienced a déjà vu when reports of the US intelligentsia getting […]

As sites move to SHA2 encryption, millions face HTTPS lock-out

“We’re about to leave a whole chunk of the internet in the past,” as millions of people remain dependent on old, insecure, but widely-used encryption. In 2016, tens of millions of people around the world will face trouble accessing some of the most common encrypted websites like Facebook, Google and Gmail, Twitter, and Microsoft sites. […]

How to completely delete data from Mobile devices

Buying and selling things online are just two of the many activities Internet users are fond of doing. For some, they shop for clothes, bags, shoes, jewelries, and books; for others, they shop for mint condition to used electronics both big and small, such as laptops, tablets, and mobile phones. Among these, the greater risk […]

NSA warns of growing danger of cyber-attack by nation states

The deputy director of the US National Security Agency (NSA), Richard Ledgett, has warned of the increasing danger of destructive cyber attacks by states. He told the BBC: “If you are connected to the internet, you are vulnerable to determined nation-state attackers.” He said nations would need to identify red lines that should not be […]