Pro-Palestine activists Hacked Ha’aretz Newspaper’s Twitter Account and Posted: “Our martyrs’ mothers will drink your soldier’s blood.” The Twitter feed of Israeli...
Short Bytes: Baidu, the Chinese analogous to Google has distributed a software development kit (SDK), Moplus, which has reportedly made over 100...
Short Bytes: Attackers are now using an android malware app which camouflages itself as a Microsoft Word document. The malware once triggered, scans...
Short Bytes: The Tor Project has announced the release of the beta version of its Tor Messenger that allows you to chat...
A group of researchers have demonstrated how locations of Facebook and WhatsApp users can be exposed by a security flaw in 4G networks....
Short Bytes: The European Union has many a times been apprehensive of the US-based tech companies, especially on the matters of privacy and...
Short Bytes: Mira Modi, an 11-year-old girl, has started a business of selling cryptographically secure passwords for $2 each. She generated Diceware...
TalkTalk (UK’s largest broadband and mobile phones service provider) has possibly faced one of the biggest breaches in the history of cyber...
For those who seek privacy while working online, you now have a solution in “Warble,” an Anonymous calling app for Android, iOS...
Short Bytes: Internet of Things are constantly being targeted by attackers to get the better off of the companies or individuals. CCTV...
Microsoft announced the launch of a new transparency website in order to provide free access to the transparency reports published by the...
Facebook accounts are notorious for being hacked, either through poor passwords or phishing scams. So to help keep its users safe, the...
Short Bytes: 1Password, a password manager feature has been found to leak traces of the user account’s metadata which could be exploited...
Microsoft’s Windows 10 is known for collecting personal data of its users, but who thought the firm will be forcefully displaying ads...
Extremely secretive spy vehicles equipped with X-ray facility, Z Backscatter, will now be seen patrolling the city streets — NYPD hasn’t disclosed...
Short Bytes: Continuing our “steps to effective security” series, we are here with a true story that tells about the basic security...
Short Bytes: Crypto backdoor entry isn’t the only way for the cops to access your data. You think your iPhone is the...
Researchers identified a flaw in Cisco’s WebVPN — Hackers managed to install backdoors via two methods on the service — This weakness...
The Subway system at the heart of Seoul, South Korea was hacked in 2014 and a local lawmaker claims that the culprit...
For hackers, routers are an easy target, perhaps because they are seldom updated and virus-scanned and are also easily cracked. But shockingly,...
Security researchers Chris Valasek and Charlie Miller helped the world understand that late-model vehicles are vulnerable to cyber attacks. We have read...