Browsing category

Geek

6 Pieces of Tech Every Office Needs

Before you start buying any technology or furniture for your office, you must put in some planning and research time. There are so many options to consider and each one will have a direct impact on the functionality of your workspace and, as result, how productive you and your team are on a day to […]

Most & least radiation emitting smartphones in 2019

Smartphones are a utility in our lives more than any other thing. The addiction has increased to a level that most of us keep our smartphones by our side whether we are at the office, home or even while we are on the bed. According to the research by Cellular Telecommunication and Internet Association, there […]

Website uses Artificial Intelligence to create utterly realistic human faces

A new way for cybercriminals to create fake social media profiles and carry identity scams using Artificial Intelligence powered tool? A couple of months ago it was reported that NVIDIA has developed a tool that uses Artificial Intelligence to create extremely realistic human faces which in reality do not exist. Now, there is a website that […]

Hacked versions of popular iOS games available on App Store

Software pirates are distributing hacked and infected versions of iPhone apps by hijacking Apple’s enterprise developer program. Reportedly, the hacked apps include versions of Minecraft, Spotify, Angry Birds, and Pokemon Go. These apps have been modified for making paid content/features available for free to deprive the original developers and Apple of their due revenue share […]

Russian to shut down Internet to test its cyber deterrence

To test the security of its data, Russia is considering disconnecting its Internet service for a short period of time. The test will affect all the data sent by Russian citizens or organizations as Internet access would be limited only within the national territory, meaning that they will not be routed internationally. The test has […]

Clipper malware on Play Store replaces users BTC & ETH wallet address

This is the first ever Clipper malware found on Play Store. Another day another Android malware on Google Play Store – This time the IT security researchers at ESET have discovered a malware known for replacing the content of clipboard on the targeted device. This type of malware is called Clipper malware. The malware was targeting Android […]

These iOS apps have been secretly recording your screen activities

Apple has vowed to remove iOS apps that record screen data. User data recording has become an issue of concern among the cyber-security community as the data is used to launch a variety of scams, identify customer demographics, and targeted marketing gimmicks. Mobile phone manufacturers are trying to ensure that apps that indulge in sneaky […]

Flaws in RDP protocols leaving machines prone to remote code execution

Major Security Flaws Identified in RDP Protocols making Machines Prone to Remote Code Execution and Reverse RDP Attacks. Check Point researchers have identified that three remote desktop protocol (RDP) tools, which are probably the most popular ones for Windows, macOS, and Linux systems, are plagued with not one or two but twenty-five CVE-listed security flaws. […]

Crypto exchange loses access to $145M after CEO dies without giving password

The Canada-based cryptocurrency exchange QuardigaCX has suffered a major setback after the untimely death of its founder and CEO Gerald Cotten. Apparently, Cotten had exclusive and crucial information about the exchange’s password. Now that the CEO is no more, the exchange claims to have lost access to an exorbitant virtual currency amount that totals around […]

Rock Pi 4 B Review: A Swiss Army Knife Of Single Board Computers

The Rock Pi 4 B, while having no official affiliation with the Raspberry Pi, is a single board computer whose intention it is to provide all the features Raspberry Pi fans would like in the now dated Rasberry Pi 3 B+ model, and are hoping to see in the 4 B+ model. The Rock Pi 4 B has a […]

New Mac Malware steals iPhone text messages from iTunes backups

The IT security researchers at Palo Alto Networks’ Unit 42 have discovered a dangerous new Mac malware capable of targeting devices for multi-purposes including stealing cryptocurrency. Dubbed CookieMiner by researchers; the Mac malware is a variant of OSX.DarthMiner, another nasty piece of malware known for targeting MacOS. But, CookieMiner aims at much more than its predecessor. According to researchers, […]

Selfie stealing malware found in popular Android beauty camera apps

We all want to look perfect in the pictures that we post online and beauty camera apps are our best bet in order to fine-tune our pictures. However, according to the findings of Trend Micro researchers, these kinds of applications are performing more functions than what we think they are. Reportedly, some of the Android […]

FaceTime bug exposes live audio & video before recipient picks call

FaceTime bug is exposing calls and videos – Here’s how to disable FaceTime until this issue is fixed. According to reports, there is a major bug in iPhone FaceTime’s video calling function that lets users hear audio from the call even before the recipient has accepted the video call. Moreover, the flaw also lets people see […]

Meet Aztarna, a tool to find vulnerable Internet connected robots

The company behind Aztarna is Alias Robotics, a cyber-security startup. Manufacturers and users of IoT robots should breathe a sigh of relief that the cyber-security startup Alias Robotics has developed a robot scanning tool that can track any robot connected to the internet and powered by any robotic technology such as ROS or SROS. Dubbed Aztarna […]

Hackers abusing Google App Engine to spread PDF malware

The Cobalt Strike advanced persistent threat (APT) group is using Google App Engine to spread PDF malware against financial firms. The IT security researchers at Netskope have discovered a sophisticated malware campaign in which cybercriminals are abusing Google App Engine (GCP), a web framework and cloud computing platform to deliver malware via PDF decoys. According to researchers, the malware campaign is currently […]

Google Maps help Police catch serial masturbator after 4-year hunt

An alleged “serial masturbator” who has been causing disturbance among citizens around Brisbane’s inner-city for the past four years has finally been caught by the Queensland Police thanks to Google Maps.  Google Maps: Hubby divorces wife after finding her on Street View with another man The 43-year old masturbator was wandering around the streets of […]

Attackers successfully hide Mac malware in ad images

Malware campaigns have become quite regular on Apple devices and as per the new report from Confiant, a cyber-security firm, there’s a new group on the block called that is specifically targeting Apple users through malvertising. The group called VeryMal has employed steganography technique this time to prevent detection and hide the malicious code in […]

Hacker demonstrates how to remotely Jailbreak iPhone X

A China-based security researcher associated with the Qihoo 360 Vulcan Team has published a proof-of-concept exploit for a kernel vulnerability, which he claims to be the second stage of an exploit chain that he was successfully able to jailbreak iPhone X remotely. The researcher Qixun Zhao posted the PoC on Twitter from his Twitter handle […]

Google URL Inspection Tool flaw lets anyone inspect URLs without authorization

Last year, Google launched its URL Inspection Tool for webmasters using Search Console. The purpose of this tool is to provide information about Google’s indexed version of a specific page. However, now, a UK-based Search Engine Optimization (SEO) specialist Oliver HG Mason has discovered that the URL Inspection Tool contains a flaw that allows anyone to check URLs which […]

How To Improve Your Online Processes

In today’s internet-driven world, every business relies very heavily on the internet for their operation. There will be various online processes that a company uses no matter what industry they are in and you may find that there are ways that you can improve these processes. While this can require a little bit of effort, […]

Malicious apps deploy Anubis banking trojan using motion detection

Google has left no stone unturned in preventing malware and banking trojan from invading the applications uploaded on its official Play Store. Despite having anti-malware protection, shady applications somehow make it to the platform. In fact, malware developers have become so advanced in their skills and tactics that they are now using motion detection technology […]