Browsing tag

Security

Flashlight Apps Stealing Personal Information Stored On Your Smartphone

It is our duty to protect our data— but are we ready? No one would have thought that the most practical invention of the past decade will be the Smartphone. It is a reality that we cannot live without these devices at all. Smartphones have become a mandatory part of our life since with few […]

Snowden explains what the NSA can do with your phone even when it’s off

Edward Snowden, ex-NSA contractor and the whistleblower about NSA’s massive surveillance dragnets, says the US government can remotely control a targeted cellphone. In an exclusive interview with Brian Williams of NBC News, who interviewed him in Moscow last week, Snowden spoke about some of the revelations made last year and the reason he chose to […]

Syrian Electronic Army releasing its Private Linux-based Distribution- SEANux

A majority of Linux distributions are sold by companies, individuals and many non-commercial entities for free on the Internet. And now, it has been officially announced that the notorious Syrian Electronic Army or SEA will launch its private Linux distribution. This will be known as SEANux. The pro-Assad hacking group famous for hacking is now in […]

Windows 10 Technical Preview: A Spy in Disguise?

Windows 10 Technical Preview (TP), a trial version released last week, collects and transmits lots of user data to Microsoft, according to a report published in the Forbes. The daily�referred it as �jaw dropping level of invasion.� Microsoft announces in its privacy policy the kind of information it will be collecting from the users who […]

Hackers breach Yahoo! servers through Bash Bug

Romanian hackers used Bash Bug flaw to hackYahoo servers, according to a recent security news update. Jonathan Hall, President of the IT consulting firm, Future South Technologies and a security researcher, has affirmed that a group of Romanian hackers used the Shellshock vulnerability to compromise Yahoo servers, which was also confirmed by Yahoo! Hall said […]

Shellshock Bash Bug Leaves Almost Every User on The Internet Vulnerable

They call it Shellshock bug, they say it is way more dangerous than the previous Heartbleed bug which left all the secure SSL system vulnerable, but this bug has power to compromise any system and run commands to install malicious softwares on your device or computer. Hackers may already be accessing people’s personal data by exploiting […]

Anti-surveillance mask enables you to pass as someone else

If you are not comfortable with the surveillance cameras, an identity replacement technology that is basically a Surveillance identity prosthetic provides you a new face. If you find all people around you having the same face like you saw the agents in Matrix 3, then Leo Selvaggio is the one to thank. He has designed a […]

Google Image Search Hacked? Search results filled with Russian car crash images

Users witness looking at pictures of Russian car crash regardless of what they searched on Google Images. If someone searched for ‘cat’ the search result came up with a multiple images of the car crash- speculations were that Google Image search result service was hacked. The finding was originally reported by Time Magazine, while searching for an image of […]

Don’t freak out about Facebook messenger app, NSA already has your chats

Privacy concerns over the Facebook Chat App is at an all time high. Increasingly more and more people are voicing their concern and even their anger at the permissions needed from the user in order to use the App. Although the App was released some time ago, it wasn’t until Facebook took away end user […]

BadUSB exploit hacks your computer

A common shortcoming that most of the USB devices possess is one which can be noiselessly made use of to introduce infection into computers. This is done in a fashion which prevents detection and this has been concluded by security researchers themselves. Most of the USB thumb drives have a major dilemma like several other […]

Palestinians and Israelis take battle to social networks

Now, the battle waged by both sides also extends to social networks. Israelis and Palestinians are increasingly using sophisticated methods in an attempt to win support on Facebook, Twitter and YouTube. While Hamas Guides Palestinians to publish photos of wounded on social networks, Israelhas created an application that simulates what if Gaza were in your country. The […]

Israel’s Channel 10 TV Station Hacked by Hamas

Hackers from Hamas military wing in Palestine hacked the satellite communication of the Channel 10 TV station in Israel on Monday for a few minutes. The hackers behind the hack were Izz al-Din al-Qassam Brigades, who took over the satellite broadcast of the TV station and changed the ongoing transmission with images of Palestinian citizens affected and wounded by Israeli […]

Amazon Fire Phone: An Amazing Smartphone (Specifications)

Amazon�s new smartphone launch is all set to fire up the smartphone market and is likely to give a hard time to its competitor. Smartphone�s name itself is a sign of how energetic the phone is, as it�s named �FIRE PHONE�. This smartphone has some of the most compelling feature that smartphone buyer would have […]

Azerbaijani hackers hack Armenian President and Ministry websites

On 26 June, the day of Armed Forces of Azerbaijan -, Azerbaijani hackers from Anti-Armenian Team hacked and defaced the official website of Armenian President and other government Ministries. Hackers left a deface page along with a video message which includes a speech from the Commander in chief of Armed Forces of Azerbaijan Mr. Ilham Aliyev. […]

Snowden receives German Fritz Bauer award for exposing NSA Surveillance

German Humanist Union, an independent civil liberties organization, has awarded Snowdenwith the Fritz Bauer Prize for exposing NSA’s controversial surveillance practices. The prize named after Fritz Bauer, a German prosecutor and judge who played an important role in Oswiecim trials of former SS officers, was instituted in 1968 and is given to people who excel […]

“Riot Control” Drone Will Shoot Pepper Spray Bullets At Protesters

We know how drones are used for surveillance, target killings or in some cases to save human lives, but now a South African company known as Desert Wolf told the BBC they have received orders for their riot drone‘’Shunk’’. The drone fires pepper spray bullets at crowds, that can tackle crowds or protesters “without endangering the lives […]

Exclusive: Linkin Park official Facebook Page Hacked! Spammed with adverts

In an exclusive report, we are updating that the official verified Facebook fan page of  famous rock band Linkin Park (LP) with 62,616,278 fans (https://www.facebook.com/linkinPark?fref=nf) has been hacked by unknown hackers and spamming vulgar images with links. It seems as if the page was hacked a couple of hours ago where hacker started posting links […]

WhatsApp Flaw leaves User Location Vulnerable to Hackers and Spies.

Researchers warn that the highly popular mobile application WhatsApp cannot be trusted blindly. WhatsApp has been one of the most popular mobile applications when it comes to exchanging messages for free. However, a group of budding security researchers at the University of New Haven in Connecticut, USA allege that WhatsApp could not be trusted with the user’s data. The […]

Use LastPass checker to find sites vulnerable to ‘Heartbleed’ and if you’ve to change your password

The password manager, LastPass, allows you to check if the saved sites are affected by the bug through its ‘LastPass Heratbleed Checker. LastPass’s Security Check tells you which sites have updated their certificates, and whether you need to change your password for that site. Image credit: Cnet In the latest attempt to safeguard against the openSSL programming […]