Stagefright 2.0: Security Flaw in Android Puts 1 Billion Devices at Risk

The risk of remote hacking is triggered through the faults in the media processing components that may be misused by malicious websites. Experts have identified some major flaws in the way media files are handled by Android which may eventually trap its users by automatically visiting malicious sites. A report by Zimperium (a cyber-security company) […]

Was Oregon Shooting Predicted on 4chan?

Someone used 4chan to post about Oregon college shooting in the US before it actually took place. The sudden increase of Internet users has connected humanity worldwide. Some use it for good,  others use it as a tool to spread fear and propaganda. This is exemplified by what happened on Thursday when a gunman in Oregon, California […]

What is Free and Open Source Software (FOSS) and Why You Should Use it?

Short Bytes: FOSS (Free And Open Software) is the modern day result of the free software movement that draws its philosophies from the 1970s hacker culture of the love of programming and excellence. It hasn’t changed much since then. Read the article to know more about FOSS. Apart from being an important part of the […]

Dangerous resurgent banking malware hits UK

Bank trojan twin pivots to smash supply chain biz. The formidable Dyreza and Dridex banking malware are back in renewed and rejigged macro-based campaigns that includes a shift by the former to target industrial supply chain organisations and by the latter to smash the UK. Both malware instances are dangerous. Dyreza is a powerful man-in-the-browser […]

Android Malware Disguises as PayPal App

A recent spam campaign is leading users to a fake PayPal app which steals their real credentials, but also comes hard-coded to target other mobile banking applications. With more and more smartphones being produced and sold around the world, users are changing their daily habits, and instead of checking bank accounts from their desktops, laptops, […]

FBI Caught Paedophile By Infecting Tor Web Browser

Do you think that using anonymity software like Tor will protect your online presence from spies? A new spyware has been developed by the FBI, having the ability to track and catch the suspects of child pornography even if they are using Tor to access, view and download sexually explicit images of children. For those […]

Patreon was warned of serious website flaw 5 days before it was hacked

Even worse: Thousands of other sites are making the same facepalm-worthy mistake. Five days before Patreon.com officials said their donations website was plundered by hackers, researchers at a third-party security firm notified them that a serious programming error could lead to disastrous results. The researchers now believe the vulnerability was the entry point for attackers […]

Samsung Decides Not to Patch Kernel Vulnerabilities in Some S4 Smartphones

Two kernel vulnerabilities were left unpatched on older devices running Android Jelly Bean and KitKat. QuarksLAB, a security research company based in Paris, France, has stumbled upon two kernel vulnerabilities in Samsung Galaxy S4 devices which Samsung has decided to patch, but only for recent devices running Android Lollipop, and not for those with Jelly Bean […]

WordPress Jetpack Plugin Patched Against Stored XSS Vulnerability

After a few critical bugs were recently discovered and patched in the core WordPress engine—a rarity with WordPress-related security issues—order has apparently been restored with the discovery of a critical vulnerability in a popular plugin. Insecure plugins have been at the heart of numerous attacks launched from compromised WordPress site. One was patched this week in […]

Edward Snowden Gets Bombarded With 47GB of Twitter Notifications

Short Bytes: Former NSA contractor and a newbie to Twitter, Edward Snowden, forgot to turn off the email notifications on Twitter and got bombarded with 47GB of notifications. Did you recently follow one of the world’s most wanted men on Twitter? Yes, I’m talking about Mr. Edward Snowden, who joined the microblogging site earlier this […]

Hackers Can Exploit Security Flaws In Drones To Hijack Flight Controller

Security flaws have been found in drones that could allow hackers to target and attack the flight controller which includes numerous sensors as well as the processing unit, reveals a research conducted by Oleg Petrovsky, Senior AV researcher of HP Security. We all know that there have been number of recent developments in the manufacturing […]

Experian Hack Leads To Data Breach of T-Mobile Customers

Experian, a major credit reference agency has suffered a huge data breach. Around 15 million T-Mobile users (who signed up for T-Mobile’s service last month) suffered as their information was leaked by hackers. T-Mobile used Experian to process its credit applications and perform credit checks on its customers. It is reported that any user who […]

Facebook Becomes Livelier with a 7-sec Video Profile Pic

On Tuesday, Facebook announced that tests are being conducted which will allow users to change their static profile pic to a 7-sec video clip. Facebook is now introducing 5 changes to user profiles that will help make the social networking website more attractive and interactive. This change is to stay ahead in the ‘graphics’ competition as Twitter’s auto-play video (just like Facebook’s) and Snapchat’s […]

15 Million T-Mobile Users’ Data Stolen From Experian Hack

Short Bytes: T-Mobile CEO John Legere has confirmed that its 15 million users’ database has been hacked as its credit vendor Experian experienced the latest security breach. In yet another case of security breach, T-Mobile CEO John Legere has notified its users that the personal records of approximately 15 million people have been compromised. The […]

Hackers Spreading New Router Malware That Actually Makes Routers More Secure

Short Bytes: Linux.Wifatch not only prevents further attacks from router malware, it also shows a message telling the people to change passwords and update the firmware. When you combine the two words router and malware, the end result is just scary. Commonly router malware sneaks into your network and deploys attacks on your systems. Hacked home routers […]

Microsoft Reconsiders Privacy Policy, Windows 10 Will Continue To Pull Data

Since the official public launch of Microsoft’s new operating system Windows 10 and the announcement of the company’s revised all-in-one privacy policy, allegations against the privacy settings of Windows 10 and the user data being unwantedly spied by Microsoft have been levelled all over the Internet. The scale of finger-pointing at Microsoft have ultimately forced them to reconsider their privacy […]

15 million T-Mobile customers affected in Experian hack

SCHAUMBURG, Ill. — Credit-reporting agency Experian said on Thursday that hackers accessed the Social Security numbers, birthdates and other personal information belonging to about 15 million T-Mobile wireless customers. T Mobile hacked T-Mobile uses Experian to check customer credit. Experian said T-Mobile customers who applied for wireless service between Sept. 1, 2013, and Sept. 16, […]

Hackers Release Gigabytes of Stolen Data From Patreon Donation Site

Short Bytes: Hackers have released potentially damaging 15GB worth of private data after attacking Patreon, a crowdfunding website for artists. On an account of another hack, this time targeted towards the Patreon donation site on Wednesday, hackers have reportedly released 15 GB worth of data. The latest cyber security breach involves pilfering of the passwords, […]

Apple swiftly closes hole in iOS 9 Lock screen

Apple just released iOS 9.0.2. This new version claims to close the well-publicised Lock screen hole that lets anyone view and edit your contacts, send text messages, and rummage through your photos – without entering your passcode. Apple IOS 9.0.2 If you had an iOS 9 or 9.0.1 device with Siri accessible from your lock screen, […]

Meet Sanmay Ved, the Indian who owned Google.com for a minute

Ex-Googler Sanmay Ved was lucky enough to grab Google.com domain, but only for a minute. google.com purchase screen In a detailed post on LinkedIn, the former Google employee said he was learning more about the Google domains interface and that’s when he discovered the availability of Google.com domain. To his surprise, the most trafficked domain was […]

How to use Google Maps in Offline mode

The moment your phone reads “No service,” Google Maps suddenly drops out.That is, unless you’ve saved your maps for offline access. With this feature, you can store large map areas for guidance, even when you’re stuck without reception. The process is identical on both iOS and Android. Before we dive into the process, take a […]