الأربعاء، 25 مايو 2016

Apple hires Encryption Expert to Beef Up Security on its Devices




The FBI and other law enforcement agencies have waged legal war on encryption and privacy technologies.

You may have heard many news stories about the legal battle between Apple and the FBI over unlocking an iPhone that belonged to the San Bernardino shooter. However, that was just one battle in a much larger fight.

Now, in an effort to make its iPhone surveillance-and-hack

الثلاثاء، 24 مايو 2016

Beware of Fake USB Chargers that Wirelessly Record Everything You Type, FBI warns

Last year, a white hat hacker developed a cheap Arduino-based device that looked and functioned just like a generic USB mobile charger, but covertly logged, decrypted and reported back all keystrokes from Microsoft wireless keyboards.

Dubbed KeySweeper, the device included a web-based tool for live keystroke monitoring and was capable of sending SMS alerts for typed keystrokes, usernames, or

Google Trust API plans to replace your Passwords with Trust Score




The importance of increasing online security around personal information has risen due to the increase in cyber attacks and data breaches over recent years.

I find it hilarious people are still choosing terrible passwords to protect their online accounts.

The massive LinkedIn hack is the latest in the example that proves people are absolutely awful at picking passwords. The data breach

الاثنين، 23 مايو 2016

Fraudsters Stole ¥1.4 Billion from 1,400 Japanese ATMs in Just 3 Hours




In an era where major data hacks are on the rise, it is no surprise breaches on individuals are also up.

In just three hours, over 100 criminals managed to steal ¥1.4 Billion (approx. US$12.7 Million) from around 1,400 ATMs placed in small convenience stores across Japan.

The heist took place on May 15, between 5:00 am and 8:00 am, and looked like a coordinated attack by an international

السبت، 21 مايو 2016

Top Websites Using Audio Fingerprinting to Secretly Track Web Users




Despite browsing incognito, blocking advertisements, or hiding your tracks, some websites monitor and track your every move online using a new web-tracking technique called Audio Fingerprinting.

This new fingerprinting technique can be utilized by technology and marketing companies to deliver targeted advertisements as well as by law enforcement to unmask VPN or Anonymous users, without even

Bug Hunter Found Ways to Hack Any Instagram Accounts




How to hack an Instagram account?

The answer to this question is difficult to find, but a bug bounty hunter just did it without too many difficulties.

Belgian bug bounty hunter Arne Swinnen discovered two vulnerabilities in image-sharing social network Instagram that allowed him to brute-force Instagram account passwords and take over user accounts with minimal efforts.

Both

Ecuador Bank Hacked — $12 Million Stolen in 3rd Attack on SWIFT System




Bangladesh is not the only bank that had become victim to the cyber heist. In fact, it appears to be just a part of the widespread cyber attack on global banking and financial sector by hackers who target the backbone of the world financial system, SWIFT.

Yes, the global banking messaging system that thousands of banks and companies around the world use to transfer Billions of dollars in