Advantech has published a new version of its WebAccess product to address vulnerabilities that put installations at risk to remote code execution...
Today the federal Government Accountability Office (GAO) finally published its exhaustive report on the FBI’s face recognition capabilities. The takeaway: FBI has...
Mitsubishi’s Outlander Hybrid Car’s Alarm Vulnerable to Hack due to Wi-Fi access point issue Researcher and security expert Ken Munro has revealed...
WiFi-Pumpkin is a security tool that provides the Rogue access point to Man-In-The-Middle and network attacks. Installation Kali 2.0/WifiSlax 4.11.1/Parrot 2.0.5 Python...
We recently came across a cyber attack that used a remote access Trojan (RAT) called Lost Door, a tool currently offered on...
Quantum Computing- No More a Thing of Distant Future — IBM wants us all to use it remotely accessible Quantum Computer… for free!...
Short Bytes: Number of people using the Tor browser for maintaining their privacy and anonymity has crossed one million mark this month,...
The number of people accessing Facebook via the “dark web” now stands at 1 million per month, the tech giant announced today...
iPhone 6s and 6s Plus running the latest iOS version are plagued by a vulnerability that can be exploited to bypass the...
ShortBytes: In a recent find out, it has been revealed how NSA implants trojan firmware in the networking devices being delivered to...
The IDs and passwords of about 18 million Internet users have been found on a computer server set up by a Tokyo...
Android is the most vulnerable OS in the world but the “Accessibility Malware” threatens 65% of the old version Android devices An...
Researchers at threat defense company Skycure have uncovered an Android proof of concept malware that uses accessibility services to allow attackers to...
Apple is the latest in a host of technology players to be requested to allow exceptional access, that is, access in exceptional...
Judge Issues Order to Apple to Unlock iPhone Vital in the San Bernardino Shooting Case — Apple refuses to follow orders The...
Short Bytes: Google has introduced a new online feature where a user can sync its passwords to Google and access Chrome passwords...
Another antivirus maker decides to mess around with Chromium default security features and gets it totally wrong. Just two days after Comodo’s...
A new zero-day vulnerability allows Android or Linux applications to escalate privileges. Security researchers have discovered a new zero-day vulnerability in Linux kernel that...
China’s legislature unanimously passed a controversial anti-terrorsim law on Sunday despite months of objections from major tech firms and Washington alike. Among...
Steam has been caught providing access to one user’s personal account to another user — It is unclear if the service was hacked...
Wesley Wineberg, an independent security researcher, participating in Facebook’s bug bounty program, managed to crack his way through Instagram defenses and almost...