Apple is generally considered reliable in making safe and secure software. It is widely believed that the company works really hard to...
Give Orbit a blockchain based crypto wallet address and it will crawl 3 levels deep in transaction data to plot a graph...
The security agency is eliminating millions of phone calls and text messages records dating for technical failures. The U.S. National Security Agency (NSA)...
On May 23rd, The American intelligence agency NSA started the process of deleting the call records it has obtained from US telecom companies since 2015....
The Intercept, the publication known for its groundbreaking reports, has come up with another revealing piece (via TechCrunch) about the National Security Agency....
Recently cryptojacking attacks have been spreading like wildfire. At Imperva we have witnessed it firsthand and even concluded that these attacks hold roughly...
Teensafe is a monitoring app used by parents for keeping a check on the activities of their children. The app allows parents...
The new Annual Statistical Transparency report published by the Office of The Director of National Intelligence (ODNI) gives the highlights of NSA’s...
It is a fact that a MacBook cannot be easily hacked and to pull off this incredible feat, the attacker either needs a...
The IT security researchers at Fortinet have discovered a dangerous new malware that not only mines Monero cryptocurrency but also disables security features...
Hansa was once the second largest dark web marketplace after AlphaBay selling everything from illegal drugs to stolen databases, credit card information and...
Another day, another malware – This time TrickBot’s variant is stealing Bitcoin by hacking cryptocurrency transactions. TrickBot malware, which emerged in late...
Probably, the most famous of the NSA tools leaked by the hacker group Shadow Brokers was EnternalBlue which gave birth to dangerous malware...
Security researcher tweaks exploits stolen from the NSA last year to affect nearly all versions of Windows. Exploits that were stolen from...
Forget WannaCry and welcome WannaMine, a fileless cryptojacking malware using leaked NSA exploit called EternalBlue. We cannot ignore the fact that cryptocurrencies are...
Another day, another Monero mining malware – This one uses two NSA exploits and so far it has mined over 8,900 Monero. It looks...
You might be able to recall the NSA exploit called EternalBlue which was leaked by the hacker group in April last year....
For years, the ex-NSA (National Security Agency) whistleblower Edward Snowden has been raising awareness about so-called secure messaging applications or programs and publically...
Due to the unprecedented and unexpected increase in the value of cryptocurrencies like Bitcoin, there has been a sudden rise in cyber-attacks...
A new sophisticated malware campaign dubbed “Zealot” leveraging NSA exploits targeting Windows and Linux systems to mine Monero on Internal Networks. Security...
A new sophisticated malware campaign dubbed “Zealot” leveraging NSA exploits targeting Windows and Linux systems to mine Monero on Internal Networks. Security...