Critical Internet Explorer zero‑day vulnerability patched by Microsoft
Microsoft releases a fix for a zero-day vulnerability that has already been exploited by hackers in targeted attacks against some organisations. Don’t delay!
Browsing author
Microsoft releases a fix for a zero-day vulnerability that has already been exploited by hackers in targeted attacks against some organisations. Don’t delay!
A tech-firm has amazed the world with its proof-of-demonstration of a remote-controlled “stun copter” that can deliver 80,000 volts of electricity to a hapless target, at the South by Southwest Interactive festival, Austin, Texas, giving an idea how terrifying the consumer grade personal drones can be. The drone, an invention of the Chaotic Moon Studios—an […]
Smartphones such as iPhone 5S rely on buttons to scan fingerprints – but the CEO of biometrics firm CrucialTec says that smartphones with a new hi-tech bezel-free screen which scans fingerprints will go on sale this summer.
A futuristic app uses Google Glass to add an extra layer of privacy for users withdrawing cash from ATM machines – by displaying a one-time personal identification number (PIN) which only the Glass user can see.
Boeing is set to launch a self-destructing smartphone that would aid the spies, diplomats and others keep their data secure, according to media reports. The smartphone is self-destructing if anyone ever tried to temper with it, says the company. There are no serviceable parts on Boeing’s Black phone and any attempted servicing or replacing of […]
A file of material purporting to include detailed information on trades at the Bitcoin exchange Mt Gox, has surfaced online, after attackers targeted the personal blog and Reddit account of CEO Mark Karpeles.
Recently it was announced that Satya Nadella will be Steve Ballmer’s successor as CEO of Microsoft. Of course for the cybercriminals this is the time to dust off and polish the good old Microsoft Lottery scam and update it.
Befriending the wrong person on Facebook can hand a criminal the tools for an identity theft attack – and on LinkedIn, talking to the wrong ‘recruiter’ can lead to disaster.
Maybe it’s time to think twice before rushing to click on a link, next time your favourite celebrity says something bizarre on Twitter.
Cybercriminals ‘manage’ phishing emails using techniques similar to those used by marketing agencies, including the use of ‘test audiences’ to see how effective a particular email is, according to an email security specialist.
University of Berkeley researchers have revealed a technique for identifying individual web pages visited ‘securely’ by users, with up to 89% accuracy, revealing data such as health conditions, financial details and sexual orientation.
A document among the trove leaked by Edward Snowden contains slides showing images of flying saucer as reported by Yahoo News Following a report published by Yahoo News, it was revealed that Edward Snowden has leaked documents containing mysterious UFO images. The Daily Mail however has a different view, according to a UFO experts the mysterious spacecrafts in […]
The telecommunication system of Ukraine has got hit by cyber-attacks through the equipment which have been installed in the Russian-influenced Crimea. These equipment have interfered with the phones lines of the parliament members causing to block them. Some of the telecommunication systems and the telephone services of Ukraine have been severed after the Russian forces […]
If someone rings you up to tell you that your bank card has been compromised, it may be because they want to get their own hands on it.
Android phones and tablets from four different manufacturers are arriving with malware “pre-installed” – a bogus version of Netflix which sends password and credit card information to Russia, according to app security specialist Marble Security.
Ex-NSA tech Snowden leaked documents had yet another element of surprise; it has a set of slides depicting mysterious spacecrafts referring to Flying Saucers or UFO. A document among the trove leaked by Edward Snowden contains slides showing images of flying saucer The slides, part of the powerpoint presentation created by the British spying agency, Government […]
Criminals seeking to kill endangered species and sell trophies online are turning to increasingly hi-tech methods to target their prey – including cyber attacks built to steal information on where animals patrol, according to the World Wildlife Fund’s Wildlife Crime division.
The attackers were able to steal all the bitcoins stored in the bank’s “hot wallet” – the portion of its funds on computers accessible via the internet – due to a transaction flaw in its code.
When someone says “data privacy” most people think about the information that is available on sites like Google and Facebook, or stored away in some marketing database. But when it comes to very private information, there are few things most of us would be more horrified to find floating around on the Internet than our medical data.
An emailed warning and enforced password reset sent out to Twitter users on Monday due to a supposed compromise of their accounts provoked much discussion among site users – before the company admitted the reset had been initiated by mistake.
It is not just the NSA, the infamous snooping authority of the US, that has been collecting data of millions of Americans, many other private companies do the same, according to reports published from theObama administration. On Facebook, there are some 350 million photos uploaded and shared every day.“On YouTube, 100 hours of video is […]