Browsing category

Hacked

This Cafe Accepts Your Personal Data As Money

Sick of paying money for coffee at your favorite chain? Well, this Japanese cafe offers free coffee, but for a different currency. At Japanese chain Shiru Cafe, you pay with your personal information, instead of money. Students and faculty members give away their ID which includes personal information like names, dates of birth and work experience. Afterward, they […]

FBI Forces Child Abuse Suspect To Unlock iPhone Using His FaceID

According to a report by Forbes, the FBI recently forced an iPhone X owner to unlock the phone using his face. This is the first known case in which feds used the FaceID feature to get access to some suspect’s smartphone. Last year when Apple launched iPhone X with FaceID feature, legal questions were raised: […]

Mobile Websites Can Access Your Smartphone’s Sensors Without Permission

Your mobile has a swathe of sensors that are used for adjusting your phone’s orientation, movement, detecting IR light, and biometric authentication. While mobile apps require you to grant access if data has to be collected from your phone’s sensors, there are no such rules for mobile websites. And many popular websites are using it […]

16-Year-Old Who Hacked Apple Servers Repeatedly Evades Prison

A 16-year-old Australian teenager who repeatedly hacked Apple servers over a period of two years has evaded jail. He is set to serve a probation period of 8 months. As reported earlier by Fossbytes, the teenager, who cannot be named owing to privacy concerns, hacked Apple servers between June 2015 and April 2017. He stored the collected […]

“OwnMe” Android Spyware Can Access Your WhatsApp Texts, Call Logs, Browsing History

A security researcher from ESET has announced that he has unearthed new Android-based spyware that is capable of accessing the Whatsapp database and features a host of surveillance features. As reported by ZDNet, the spyware has been discovered on Github in a repository named “OwnMe.” It features a MainActivity.class that initiates a new service OwnMe.class, […]

macOS Mojave Has A Security Flaw That Lets Hackers Access Your Contacts

A security flaw has been unearthed in macOS Mojave, Apple’s latest desktop OS update, by a well-known security researcher Patrick Wardle. As reported by Bleeping Computer, Wardle has discovered a bypass flaw in macOS Mojave using which hackers can gain access to contacts data from the address book with the help of an app that does not have […]

This Firefox Bug Can Crash Your Browser On Windows, Mac, And Linux

Security researcher Sabri Haddouche has found a bug in the Firefox web browser that can crash the browser and also the entire operating system running underneath. As reported by ZDNet, this Firefox bug can force the browser to crash on all the three popular desktop platforms — Mac, Linux, and Windows. On a Windows machine, this bug […]

Here’s How Chrome’s New Auto-Login Puts Your Privacy At Massive Risk

Google brought in a bunch of new features in the new Chrome 69 version. While many of them were much appreciated, some didn’t go well with the users. Apparently, there is another less advertised tweak that people are not happy about. Google has introduced an auto-login mechanism from Chrome 69. First covered by ZDNet, whenever a […]

Google Admits: Third-Party Apps Can Still Access Your Gmail Data

Back in July 2018, it was reported that Google shares Gmail user data with third-party apps and US lawmakers had asked the company to explain what it was up to. Now Google has officially admitted to not only giving Gmail account data to third-party developers, but also allowing them to share that data with other […]

DDoS Vulnerability Can Disrupt The Whole Bitcoin Infrastructure

It seems like digital currencies like Bitcoin will never stay out of trouble. And any day could turn out to be the last day for digital money infrastructures. Here, we are talking about the Distributed Denial-of-Service (DDoS) attack. While developers are issuing the patch for anyone running nodes and appeal to update the software, Bitcoin miners don’t […]

New Xbash Malware Is A Deadly Combo Of Ransomware, Botnet, Cryptominer

Researchers at Palo Alto Networks have found a new malware called Xbash which is a lethal cocktail of botnet, ransomware and cryptocurrency mining software combined in a single worm. Xbash targets servers running on Linux or Windows and prey on systems that are protected by weak passwords or devices running with unpatched known vulnerabilities. This new malware behaves […]

This Windows File Might Be Secretly Collecting Sensitive Data Since Windows 8

There is a Windows file named WaitList.dat that covertly collects your passwords and email information, with the help of Windows Search Indexer service. Digital Forensics and Incident Response (DFIR) expert Barnaby Skeggs first discovered the information about the file back in 2016 but wasn’t paid much attention. However, in after a new and exclusive interview with ZDNet – […]

KRONOS Trojan, Known For Hacking Bank Accounts, Gets A New Update

In Greek Mythology, Kronos is known as the father of lightning God Zeus. However, in the real world, “KRONOS” named virus is infamous for hijacking online bank accounts, conducting identity theft and much more. According to Securonix researchers, the $7,000 Banker Trojan, available on the Russian Underground forum, has received a new update. For those who […]

This New Bug Is Exploiting A Security Flaw in ‘Nearly All’ PCs And Macs

A research report published by F-Secure has unearthed a new flaw that makes most of the devices including those that are equipped with disk encryption vulnerable to an attack that could steal personal data within minutes. As reported by ZDNet, F-Secure’s findings say that contemporary security measures are enough to prevent the theft caused by […]

TOR Browser Zero Day Vulnerability Revealed On Twitter; Patched Immediately

A zero-day vulnerability for Tor browser was revealed yesterday on Twitter by Zerodium — a company that buys and sells exploits in software. Zerodium published the details of the vulnerability which was present in the Firefox extension NoScript (built-in to the Tor browser), which prevents web pages from executing JavaScript, Flash, or Silverlight. Advisory: Tor […]

India’s UIDAI Aadhaar System Compromised; Software Hack Available For Rs. 2500

Aadhaar, the unique identification system of India, has got a bad rep all over the world. From personal data being available on Google search to Edward Snowden informing about the dangers of Aadhaar, the “secure” system has gone through a lot of troubles. Now, a new and exclusive investigation from HuffPost India has revealed a software patch […]

Tesla Model S Can Be Hacked In Seconds With This Raspberry Pi-powered Equipment

Tesla is the epitome of innovation combined with unmatched features, including utmost comfort and tight security that provides a completely digitized driving experience. However, it seems that hackers are always a step ahead. Researchers from KU Leuven University in Belgium were successful in hacking the key fob of the Tesla Model S with equipment worth $600. […]