Massive HIV Data Leak: Thousands of Detailed Records Compromised.
In a recent major data leak in Singapore, thousands of HIV positive people’s records were compromised.One of the victims of this leak was informed via a phone call that her record was out in the open...
View ArticleSoon DNS to protect users from malware
The government will soon launch a public domain name system (DNS) server that could protect users from any malware or phishing with enhanced security features as well as faster response time, a senior...
View ArticleHackers Targeting Retail Websites and Online Shoppers via Formjacking
With the advent of online shopping, the e-commerce market has skyrocketed and by 2022, the figures are expected to touch a whopping $150 billion. The ever-expanding arena of e-shopping has given...
View ArticleApps sending intimate data to Facebook
An investigative report by the Wall Street Journal revealed that many smartphone apps are sending highly intimate data such as body weight, blood pressure, menstrual cycles or pregnancy status to...
View ArticleThe Consular Department of the Russian Embassy in Austria was attacked by...
The Russian Embassy in Austria reported a recorded hacker attack aimed at creating obstacles the normal operation of the Consular Department of the Diplomatic Mission.The Embassy explained that since...
View ArticleMoldovan Parliament Speaker accused Russia of trying to interfere in the...
Andrian Candu, Speaker of the Moldovan Parliament, Vice-Chairman of the Democratic Party, said that Russia tried to interfere in the electoral process in Moldova.As previously stated by the official...
View ArticleFile-less Malware Is Wreaking Havoc Via PowerShell.
File-less Malware Is Wreaking Havoc Via PowerShellAdvanced Volatile Threats (AVTs) also known as the File-less Malware, is another threat which works directly from the memory. PowerShell is a major...
View ArticleCan AI become a new tool for hackers?
Over the last three years, the use of AI in cybersecurity has been an increasingly hot topic. Every new company that enters the market touts its AI as the best and most effective. Existing vendors,...
View ArticleNew attack lets hackers run bad code despite users leaving web page
Academics from Greece have devised a new browser-based attack that can allow hackers to run malicious code inside users' browsers even after users have closed or navigated away from the web page on...
View ArticleThe Dark Side of Kremlin- The Catalogue of Russian Data Leaks: All You Need...
Thousands of Russian emails and documents were leaked online in the late January in a catalogue named “The Dark Side of Kremlin”.The catalogue was published by a “transparency collective” which goes by...
View Article40.8% Smart Homes vulnerable to attacks
Security researchers have found nearly 40.8% of smart homes have at least one device that could be easily breached by hackers as one-third of them have outdated software with unpatched security issues,...
View ArticleNew security flaws in 4G and 5G
Security researchers have found three new security flaws in 4G and 5G, which could be exploited to intercept the phone calls and track the location of a cell phone.Discovery of the flaws is said to be...
View ArticleAround 25 million Home Voice Assistants vulnerable to hacking globally
According to a cybersecurity report of McAfee, over 25 million voice assistants which are connected IoT(internet of things ) devices at home globally are at huge risk of hacking.Raj Samani,...
View ArticleGoogle updates Google Play Protect
Google has made some significant changes to Google Play Protect for protecting Android users from unwanted and malicious apps.The company has launched the Google Play Protect feature in 2017, it...
View ArticleAttackers Launched a Rapidly Changing Malware which uses .DOC Extension
A new malware has been discovered by security experts, they observed that it is constantly altering its behavioral patterns in an attempt to bypass the email security protection.As dissemination of...
View ArticleUS Pressures Its Allies against the Usage of Chinese Firm Huawei’s...
The US pressures its allies to not utilize Chinese firm Huawei's innovation to assemble the new 5G networks as its authorities are worried that China could be utilizing the Huawei products to spy on...
View ArticleIranian Hackers Come Worryingly close To Israel’s Missile Warning System
Israel's military scrambles to protect alerts from being undermined as Iranian hackers came 'worryingly close' to their missile warning system. In the wake of observing them to recognize their intent,...
View ArticleThe Australian Parliament’s Anti –Encryption Law Opening Doors to Potential...
The Australian Parliament recently gave a green light to an "anti-encryption" law i.e. the Assistance and Access Bill, broadly recognized by numerous U.S. tech giants, to give the nation's intelligence...
View ArticleIn-Browser Cryptomining Service, 'Coinhive' to Shut Down on March 8, 2019
Coinhive, an in-browser Monero cryptocurrency miner which was designed to provide web developers a JavaScript will be terminating its operations soon. Officials at Coinhive put the news forth in a...
View ArticleIndian students create an app for detecting fake news
A team of Indian students from Indraprastha Institute of Information Technology (IIIT), Delhi has developed an app WhatsFarzi for verifying a piece of fake news by using a custom logarithm.The app is...
View Article