Mobile banking security still a barrier for consumers
Customers are increasingly turning to mobile apps to make simple banking transactions, but a significant portion of those who don’t bank on mobile devices cite security concerns as the reason.
Browsing author
Customers are increasingly turning to mobile apps to make simple banking transactions, but a significant portion of those who don’t bank on mobile devices cite security concerns as the reason.
Researchers have spotted a j.mp shortened URL being shared by fake accounts within Facebook recently targeting users with phishing link. Hackers are sending a spam messages from a phony account stating to be “Facebook recovery” notifying users that their accounts committed abuse and will likely be disabled if they don’t act on given commands. After a […]
The official website of embassy of Nepal in Washington was hacked by a group of Moroccan hacker not happy with American invasion of Iraq and what happened afterwards. On Sunday 24th May, a group of hackers going with the handle of Moroccan Islamic Union-Mail (MIUM) hacked and defaced the official website of Embassy of Nepal for the United States. […]
The IRS has admitted that for more than two months malicious hackers targeted its systems, and managed to gain access to information about more than 100,000 tax payers.
Dubai: If you are living in UAE, you should know the dangers of flipping middle finger at someone as it could land you in prison. Nonetheless, legal experts have now also cautioned that sending an ‘emoji’ finger-flick gesture in a message or on social media could also land you in hot waters. In March, 2015 we reported that using VPN […]
Every Android user should be familiar with pattern lock security system. Every Smartphone has the option called Patter Lock which is very popular security system. Its easy to use, by joining the dots together to form a pattern and lock/unlock the screen. At least 4 dots must be join together for security reasons. If you are […]
Devices using Bluetooth Low Energy (BLE) to transmit their data can be intercepted by hackers, potentially exposing a trove of fitness data from wearables, IT Pro reports.
A malware family that primarily targets Linux-based consumer routers but that can infect other Linux-based embedded systems in its path: Dissecting Linux/Moose.
A new worm is infecting routers in order to commit social networking fraud, hijacking victims’ internet connections in order to “like” posts and pages, “view” videos and “follow” other accounts.
Creating fake social media accounts has been the favorite trick of hackers and scammers for interacting with potential victims. However, thanks to Google Search now you can identify if such an account is real or fake by searching the profile picture. Users are very much familiar with the scenario where friendship requests are received from […]
A high school boy might have to face state and federal charges for allegedly hiring a third party and launching a DDoS attack against the West Ada school district, Idaho, US. A 17-year old high school student (the name cannot be disclosed because of him being a minor) might be accused of launching a distributed […]
From using PCs and cell phones to watch online movies and playing games, wireless technology has advanced greatly and made life easier for us — However, Wi-Fi has a serious drawback that it makes people sick. Wi-Fi signals are different from radio and television signals as these are powerful enough to penetrate concrete walls. This […]
Reportedly BitFinex was hacked but due to strict security measures implementation just minimal amount was lost. BitFinex keeps more than 99.5% of deposits from its customers in highly secure multisig wallets therefore just 0.5% loss was suffered by the Exchange. BitFinex basically is digital currency trading forum that is currently said to be in its […]
It would not be an exaggeration to say that the present age is the age of smartphones. They have invaded our lives to an extent that was hardly conceivable a few years ago! And what is the single biggest reason behind this- Yes you guessed it right or probably wrong – Android. When you think […]
Do you know that not all web sites honor the native Do Not Track feature of your web browser? Even in the incognito mode, websites can still collect some data from you. Recently in a blog post, Mozilla wrote that with the Tracking Protection feature enabled, the decrease in page load time is as high […]
Five reformed hackers who turned their lives around to help in the fight against cybercrime, leaving their blackhat past behind.
Wireless Networking (Wi-Fi) has made it so easy for anyone to use Internet on your computer, mobile phones, tablets and other wireless devices anywhere in the house without the clutter of cables. With traditional wired networks, it is extremely difficult for someone to steal your bandwidth but the big problem with wireless signals is that […]
As a result of a midnight session, the American Senate has voted down the USA Freedom Act- the basis of NSA’s mass surveillance programs. Without its renewal, the National Security Agency won’t be able to collect the bulk phone records of the people. During the session, the Senate debated to reach a consensus to reform […]
The online hacktivist Anonymous breached into the official website of Thailand Senate and Public Health Ministry, ending up leaking login credentials against country’s alleged support for human trafficking. The Anonymous hacker behind the famous World Trade Organization (WTO) hack is back in news with yet another high-profile breach where login credentials of government officials have been leaked. […]
The anti-Bashar Al Assad hacker from Syria hacked into the official website of Uzbekistan Embassy in Kuwait and demanded governments around the world to bring peace in Syria. Dr.SHA6H also known as Free Syrian Hacker is a high-profile hacker from Syria. He is known for hacking top government websites. Now after a break he is back in news by defacing […]
When it’s about performing surgeries on vital organs, today’s advanced imaging techniques such as CT scans, MRIs and ultrasound machinery have made an easy access pass inside patient’s bodies for doctors even before they cut the patient open. This has done wonders for doctors and patients both saving them from unexpected situations. In recent past […]