Browsing category

Data Security

US Military to Hire 3,000 New Cybersecurity Professionals by 2016

Around 3,000 new security professionals will be added to the United States military’s infosec unit by 2016, according to reports. It says that the move to increase its already overwhelming security workforce comprising of 1,100-personnel has been approved by the government and reportedly 3,000 new hires will be added across multiple disciplines. These include strategic and […]

Vulnerability in WordPress Plugin Allows Hackers to take full control of website

WordPress’s MainWP Child Plugin has vulnerability… and it is very much exploitable. Researchers at Sucuri have identified a vulnerability in the MainWP Child plugin for WordPress, which according to them is potentially exploitable and can allow hackers to fully control any website. Mickael Nadeau, Sucuri’s security and vulnerability researcher, revealed the finding in his blog […]

Cops Need Warrants To Get Phone Location Data

A number of states already have laws preventing the police from prying on your phone’s location history without a warrant, but they just got another big boost from a court ruling. Even if it is a vague information like the whereabouts of cell towers you’ve used, a California-based federal judge has determined that cops need […]

BEWARE: uTorrent Update Installs Bitcoin Mining Software

uTorrent is secretly installing Epic Scale Bitcoin Mining Software on users’ computer to get some bucks – They claim it’s a distributed computing platform, but that’s not true. When you hear the word uTorrent it should remind you of piracy, downloading movies, music or books, but today the popular BitTorrent client uTorrent is in the news for some other reason and […]

Canadian jailed for refusing to unlock his phone at the airport

Alian Philippon, a 38-year-old citizen from Ste-Anne-des-Plaines, Quebec, will be facing up to 24,000 Canadian Dollars fine and one-year jail time for refusing to unlock his BlackBerry smartphone during airport security checking. Reportedly, Philipon has been charged with ““obstructing border officials” for obstructing a detailed and intensive security screening by Halifax airport’s border service officials. […]

This Mysterious Android App Emails Your Whereabouts to Stalkers

Smartphones are seriously wonderful since these have introduced us to some amazing things like Snapchat, Vine, Maps, Shazam and some not-so-amazing stuff too like the threat of being stalked. Malwarebytes researchers claim that a malicious Android app gives your location to an anonymous operator through emails. It is called Spy.MailGPS and it surely is creepy. Before […]

Vulnerability in Blu-ray Players allow hackers to penetrate your network

Unsuspected Blu-Ray Players Vulnerabilities Present Open passage to Cybercriminals. A team of security researchers at NCC Group analyzed different Blu-ray players and found numerous exploitable vulnerabilities in them. Security researchers created a disc for running platform-specific fake executable prior to playing the required media content and they were able to exploit the vulnerabilities of the […]

Phishing Emails & Exploits Used by Attackers to Hijack Routers

ProofPoint researchers released a report on Tuesday, which revealed that cybercriminals are now hijacking the Brazilian internet connections by altering their DNS (domain name system) settings. These kinds of attacks are termed as pharming attacks. Pharming Attakcs: Pharming attacks are designed to attract victims towards fake websites. These fake websites are usually replicas of banks […]

DARPA wants to use Unmanned Surveillance system to monitor The Arctic

To Monitor The Arctic DARPA willing to give $4million for an Unmanned Surveillance System. Ice melting in the Arctic has been the leading issue in strategic plans of almost all government leaders in Northern Hemisphere states. However, the remoteness of this area makes it a difficult entity to be explored or spied on. Thus, the […]

Amazon ‘Order Details’ Email Delivers Malware

Lately, an email from Amazon has been hitting the inbox of unsuspecting users all over the world. This email has been masqueraded as an order notification message from the famed marketplace Amazon.com. In this email, recipients are thanked for placing the order at Amazon and they are informed that their order details can be viewed […]

Windows Defender removes Superfish Malware from Lenovo PCs but not completely

The world renowned Lenovo Computer manufacturing company has been shipping laptops prepackaged with malware that makes you more vulnerable to hackers — all for the sake of serving you advertisements. To get rid of this malware Microsoft has released a signature update for Windows Defender to detect and remove Superfish malware installed on some Lenovo PCs. […]

Protecting Your Smartphone From Government Spies amid NSA SIM Hack

With the recent reports making media headlines about how the NSA and GCHQ have compromised millions of SIM keys manufactured by Gemalto, a Dutch company, one needs to be aware of the security measures that could be adopted to keep their smartphones reasonably protected safe if not unassailable. There are technologies to assist in phone […]

How pervert security guards stalk women via CCTV

Women Stalked by Security Guards via CCTV – “Sleaze File” contains images of pretty women Five security guards of a high-profile shopping complex in Australia followed attractive women roaming around in the mall using surveillance cameras. Guards zoomed-in on them and also captured invasive images of the female customers. These images were later stored in a […]

NSA Hiding Undetectable Spyware in Hard Drives Worldwide

The US National Security Agency (NSA) hid undetectable spying software within the hard drives of computers, be it of any make, says a Moscow-based cyber security researcher and software maker. Several personal computers (more than tens of thousands) in more than 30 countries were infected with one or more of the spying programs, said Kaspersky […]

Visa to track your smartphone location to “prevent” credit card fraud

Visa, famed payment processing company, will be rolling out its new software with location-tracking capabilities this summer. It will allow banks to automatically know the cardholder’s current location through the location-tracking function present in almost all smartphones. This may sound like the bank becoming your “big brother” however, it will be immensely helpful for cardholders […]

Email titled “My New Photo ;)” actually Contains Malware

Email titled “My New Photo ;)” actually Contain Malware – A .Zip file has an attachment Supposedly containing the promised image. Summary: Hackers, in their latest spree, are spreading fake emails with a much alluring subject “My New Photo ;),” which in reality contains a malware. There is a .Zip file harbouring the photo in a […]

16Mn Devices Compromised by Sophisticated Mobile Malware: Study

According to a study by Alcatel-Lucent’s Motive Security Labs, users around the world are being spied upon by extremely sophisticated mobile malware and reportedly, around 16million mobile devices are infected. This means confidential information and data plans are being stolen without our knowledge. The study revealed that in 2014, the rate of malware infectivity in […]

A Bug can remove all your Facebook Photos within no time

Researcher discovered a flaw that could help him Delete photos from Anyone’s account. To delete someone’s pictures from Facebook is certainly not an easy task. However, an Indian web developer Laxman Muthiyah claims that he discovered a flaw with which he can easily remove photos from almost all user accounts on Facebook. He immediately notified […]

Critical Vulnerability Allows attacker to have full control over LG Smartphones

Search-Lab Ltd. discovered a serious security vulnerability in the On Screen Phone protocol used by LG Smart Phones. A malicious attacker is able to bypass the authentication phase of the network communication, and thus establish a connection to the On Screen Phone application without the owner’s knowledge or consent. Once connected, the attacker could have […]