Short Bytes: History of hacking always fascinates us as it tells us about the best hackers from the earlier times. But is...
What’s driving the surge in hidden services—is it government tampering? In recent weeks, the number of “hidden services”—usually Web servers and other Internet...
Last summer we shared a story about the SweetCaptcha WordPress plugin injecting ads and causing malvertising problems for websites that leveraged the plugin....
A group of researchers that analyzed security of a number of smart watches discovered a $17 smartwatch is sold with a backdoor...
Sea pirates hire hacker to break into shipping company’s CMS. A curious case reported by Verizon’s RISK Team shows that even those lowly...
WinRT PDF exposes users to drive-by attacks. WinRT PDF, the default PDF reader for Windows 10, opens Edge users to a new series...
Locky is a new ransomware that has been released (most probably) by the Dridex gang (source). Not surprisingly, it is well prepared,...
Short Bytes: Brazilian police have arrested Diego Dzodan, Facebook’s Latin American regional vice-president, for failing to provide WhatsApp messages related to a case...
Spam posts on Facebook are nothing new. Since videos continue to be a staple form of entertainment—a whopping 8 billion views per...
Until recently, sample wasn’t detected by any of the top antivirus programs. Researchers have uncovered what appears to be newly developed Mac malware...
If your corporate network is connected to the Internet, you are doing business on the Internet, you manage web applications that keep...
The journalist Steven Petrow had his computer hacked while on a plane, it was a shocking experience that raises the discussion on...
‘Sybil’ nodes could be used to de-anonymise traffic. The Tor Project is working with Princeton University boffins to try and identify possibly malicious...
Other than an Apple backdoor hack, FBI could use 3 other hacks on killer’s iPhone. According to hardware-security experts, there are at least...
All it takes to hack security cameras and bank accounts is an email, demonstrates a hacker. What happens when you challenge a series...
A judge has confirmed that US Departement of Defense funded the Carnegie Mellon University to conduct research on the Tor hacking. In...
Journalist gets hacked while writing the FBI vs Apple iPhone hack story. The recent United States court’s order to Apple for hack San...
The security expert Troy Hunt discovered that it is possible to remotely control features of a Nissan Leaf via API. The popular...
Ricochet is the most secure encrypted anonymous messenger that sends no metadata. The security experts have approved a new internet messaging tool...
Google and security firm Red Hat have discovered a critical security flaw in the Internet’s Domain Name System (DNS) that affects a...
Mousejack attack – Researchers at Bastille firm demonstrated how to hack computers by exploiting a flaw in many wireless mouse and keyboard...