Many smartphone users are surprised when they get a pop up as soon as they leave a place asking them to rate...
IT’S IMPORTANT NOT to overstate the security risks of the Amazon Echo and other so-called smart speakers. They’re useful, fun, and generally have well thought-out privacy protections. Then...
The free VPN of Facebook called Onavo has been dedicated for five years to collect private information of its users, such as...
Alphonso, a startup that retails media-viewing data, provides a plugin that listens for audio signals in shows and movies. Approximately 250 mobile...
Trove included more than 1.8 billion posts spanning eight years, many from US people. A Pentagon contractor left a vast archive of...
Known as USA 276, it looks to be headed for the International Space Station, says one amateur spy satellite tracker. Then again,...
A JavaScript file secretly loaded without your knowledge on a site, or app you load on your mobile device, can access data...
Social engineering employed to distribute ViperRAT malware which uses infected devices to take photos and record audio. Hackers are carrying out surveillance...
A raw intelligence document published last week claims Russian cyber experts have cracked Telegram messaging service to spy on opponents. A raw intelligence...
CAUTIOUS COMPUTER USERS put a piece of tape over their webcam. Truly paranoid ones worry about their devices’ microphones—some even crack open...
Stealth Cell Tower, it is an antagonistic GSM base station concealed in an office printer that could be used for surveillance purposes....
Researchers at the Bellingcat agency have been hit with spear phishing attacks and account takeover attempts while investigating flight MH17 crash. Once...
Privacy is important. If your webcam gets hijacked, hackers can record you with your notice. It’s good to cover your webcam with...
Attackers have been using social engineering to avoid the increasing costs of exploitation due to the significant hardening and exploit mitigations investments...
Crooks also delivering keyloggers and password stealers. A new trojan called BackDoor.TeamViewerENT.1 is using parts of the legitimate TeamViewer application to allow crooks...
Espionage platform with more than 50 modules was almost certainly state sponsored. Security experts have discovered a malware platform that’s so advanced in...
EFF exposes threat group operating for Kazakhstan regime. The Electronic Frontier Foundation (EFF) has released a report today named Operation Manul that details...
F-Secure researchers say parties involved in the South China Sea arbitration case were infected with the data-stealing NanHaiShu Trojan. Hackers have used...
When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public...
Hackers leak 1.4GB database of information after breaching Qatar National Bank.A group of unknown hackers have claimed to have hacked into the...
Dr.Web, a Russian antivirus maker, has detected a new threat against Linux users, the Linux.Ekocms.1 trojan, which includes special features that allow...