Mobile security: flaw allows hackers to read texts and listen to calls
Hackers can eavesdrop on your phone calls and text messages even with cell networks using “the most advanced encryption available” according to The Washington Post.
Browsing author
Hackers can eavesdrop on your phone calls and text messages even with cell networks using “the most advanced encryption available” according to The Washington Post.
A Freedom of Information request to the UK’s Office of Communications has revealed exactly how persistent hackers are at attacking government departments in the country.
On the morning of February 10, 2014, the Las Vegas Sands casino, something was not right. Computers were flat-lining, telephone lines stopped working, emails were down, and several IT systems came to a halt and it wasn’t even time for the gamblers to be up yet. The $14 billion casino operation came to a standstill […]
The famous Pakistani hacking group going with the handle of MadLeets has hacked the official blog of the U.S based online transaction company Payza (previously known as AlertPay). Hackers involved in the attack are MindCracker and H3ll D who announced the hack on their official Twitter handle just few minutes ago. Payza website blog has been left […]
The Target hack that was revealed one year ago today brought new levels of awareness to the problem of cybercrime. Today we review the case and its impact. To go straight to the lessons learned, click here. The Big One: Target “Nationwide retail giant Target is investigating a data breach potentially involving millions of customer
The nonprofit organization that looks after name and internet domains has been hit by a spear phishing hack that has compromised company data, reports The Register.
The ride-sharing app Uber has unveiled new security plans to screen drivers, helping ensure passenger safety, Engadget reports.
Our tips will help you hacker-proof anything from baby monitors to surveillance cameras – and keep your home private.
Within the modern digital era that we live in today, we are constantly connected to the Internet either through a desktop PC, laptop, tablet or mobile phone.It has become easier than ever for government authorities, businesses and also hackers to track your movements online. An example is the use of tracking cookies by social media […]
A Dutch university has reportedly made great steps towards making the dream of a ‘fraud-proof’ credit card a reality by utilizing quantum physics.
Today, we are publishing research on ransomware that emerged in 2014. We have posted blog articles about this threat before, to raise awareness when we realized the criminals were targeting the United Kingdom and Spain.
A new Facebook scam is doing the rounds promising users of the social network the chance to win a brand new car, if they only like and share a photo of the car tied up with a stylish gift ribbon.
Security experts at ESET have released their latest research into the notorious TorrentLocker malware, which has infected thousands of computer systems around the world, taking data hostage and demanding a ransom be paid to ensure its safe return.
US energy, defense and educational institutions are the top targets of a possible sophisticated cyber attack from the Iranian hackers, says a confidential document from the Federal Bureau of Investigation (FBI). Cylance Inc, a cyber security firm, had also flagged this cyber hacking operation last week aiming critical infrastructure worldwide. Dubbed as “Operation Cleaver”, it […]
When ‘several thousand’ payment terminals across the country stopped working last week, it would be easy to jump to the conclusion that some malicious malware was on the loose, but the truth had nothing to do with cybercriminals, Brian Krebs of Krebs on Security explains.
Recent events have steered the national focus onto aggressive law enforcement and the public is not at ease with the situation. Physical and aggressive police behavior has people wondering what else is in store for them. Well, they didn’t have long to wonder as new information is emerging regarding a different type of aggressive policing. […]
Researchers from Blue Cat Labs are calling it the Inception attack framework, in reference to the movie “Inception” where a thief entered people’s dreams and stole secrets from their subconscious. They are also describing it as one of the most sophisticated attacks they have ever seen. That, in itself, is saying a lot for the […]
A pro-Palestinian hacker going with the handle of ‘AlFeRoX’ hacked and defaced the sub-domain of United Kingdom’s Department of Education in support of a free Palestine. The targeted domain belongs to the social media page of the department of Education (facebook.education.gov.uk) that was left with a deface page along with a message againstIsrael and the USA. The deface […]
Joseph Demarest, assistant director at the FBI, has been testifying on the threats of cybercrime to a Senate Committee on Banking, Housing and Urban Affairs, and Network World reports that the agency has three specific recommendations of how Congress could assist with the ever-evolving problem.
Two-thirds of young people first learn about major news events via Facebook – but as cybercriminals cash in with hoax stories and links, it can be difficult to tell ‘real’ content from fake. Our tips can help.
Mobile payment platform Charge Anywhere has revealed an exploit in its software that means that five year’s worth of credit card data could be at risk.