Archive

Ex-employees told Reuters how the internet company build custom software to snoop on customers. Yahoo cooperated with the US government to scan hundreds of millions of its customers’ email accounts on behalf of the country’s spy agencies, it has been

In August, Motherboard reported that hackers had stolen over 60 million account details for online storage platform Dropbox. The details were from a previously disclosed breach, but the true scale of the hack had not been previously revealed. Now, anyone

An ever-changing security code could prevent credit card fraud and thefts.  In order to combat the rise of online credit card theft, several French banks are partnering with security company Oberthur Technologies to create a credit card with a security

Security by obscurity is real. Sucuri’s CTO found that while IPv4 servers can get compromised in minutes, IPv6 servers are safe from attack because no one is looking for them. Security company Sucuri CTO Daniel Cid recently conducted a small experiment:

Computer Scientists Close To Developing A Perfect, Hack-Proof Computer Code As the world becomes more and more dependent on technology, it also becomes vulnerable to hacking. In order to protect the devices against hacks, the engineers from the Defense Advanced

Israeli company claims it has developed CatchApp tool which can siphon encrypted WhatsApp data from a distance You may have seen in many Hollywood movies in which the main protagonist, an agent from the CIA or FBI placing his/her mobile

Hacker Releases Mirai Botnet Code That Powered A DDoS Attack Of 1 Million Internet of Things Connected Devices. The code that used 1 million Internet of Things connected devices to form a botnet and attack websites with Distributed Denial of

With rapidly growing Internet of Thing (IoT) devices, they have become a much more attractive target for cybercriminals. Just recently we saw a record-breaking Distributed Denial of Service (DDoS) attacks against the France-based hosting provider OVH that reached over one

Researchers have disclosed a critical zero-day vulnerability in the JPEG 2000 image file format parser implemented in OpenJPEG library, which could allow an attacker to remotely execute arbitrary code on the affected systems. Discovered by security researchers at Cisco Talos

The world’s biggest technology companies are joining forces to consider the future of artificial intelligence. Amazon, Google’s DeepMind, Facebook, IBM and Microsoft will work together on issues such as privacy, safety and the collaboration between people and AI. Dubbed the

Hosted desktop and cloud provider VESK is staggering back to its feet after paying 29 Bitcoins (£18,600) in a ransomware attack earlier this week. VESK became aware that one of its environments had been impacted by a ransomware virus on

It is not known where the attack originated from, but North Korea is on the radar of suspicion. The South Korean government has admitted that its cyber military command was hacked last month by injecting malicious codes into one of

Well, there’s some good news for Hackers and Bug hunters, though a terrible news for Apple! Exploit vendor Zerodium has tripled its bug bounty for an Apple’s iOS 10 zero-day exploit, offering a maximum payout of $US1.5 Million. Yes, $1,500,000.00