degtech
الأربعاء، 25 مايو 2016
Apple hires Encryption Expert to Beef Up Security on its Devices
The FBI and other law enforcement agencies have waged legal war on encryption and privacy technologies.
You may have heard many news stories about the legal battle between Apple and the FBI over unlocking an iPhone that belonged to the San Bernardino shooter. However, that was just one battle in a much larger fight.
Now, in an effort to make its iPhone surveillance-and-hack
الثلاثاء، 24 مايو 2016
Beware of Fake USB Chargers that Wirelessly Record Everything You Type, FBI warns
Last year, a white hat hacker developed a cheap Arduino-based device that looked and functioned just like a generic USB mobile charger, but covertly logged, decrypted and reported back all keystrokes from Microsoft wireless keyboards.
Dubbed KeySweeper, the device included a web-based tool for live keystroke monitoring and was capable of sending SMS alerts for typed keystrokes, usernames, or
Dubbed KeySweeper, the device included a web-based tool for live keystroke monitoring and was capable of sending SMS alerts for typed keystrokes, usernames, or
Google Trust API plans to replace your Passwords with Trust Score
The importance of increasing online security around personal information has risen due to the increase in cyber attacks and data breaches over recent years.
I find it hilarious people are still choosing terrible passwords to protect their online accounts.
The massive LinkedIn hack is the latest in the example that proves people are absolutely awful at picking passwords. The data breach
Labels:
Android,
Android security,
Android Smart Lock,
Google account security,
Google Trust API,
hacking news,
password hacking,
password security,
Project Abacus,
Trust Score
الاثنين، 23 مايو 2016
Fraudsters Stole ¥1.4 Billion from 1,400 Japanese ATMs in Just 3 Hours
In an era where major data hacks are on the rise, it is no surprise breaches on individuals are also up.
In just three hours, over 100 criminals managed to steal ¥1.4 Billion (approx. US$12.7 Million) from around 1,400 ATMs placed in small convenience stores across Japan.
The heist took place on May 15, between 5:00 am and 8:00 am, and looked like a coordinated attack by an international
السبت، 21 مايو 2016
Top Websites Using Audio Fingerprinting to Secretly Track Web Users
Despite browsing incognito, blocking advertisements, or hiding your tracks, some websites monitor and track your every move online using a new web-tracking technique called Audio Fingerprinting.
This new fingerprinting technique can be utilized by technology and marketing companies to deliver targeted advertisements as well as by law enforcement to unmask VPN or Anonymous users, without even
Bug Hunter Found Ways to Hack Any Instagram Accounts
How to hack an Instagram account?
The answer to this question is difficult to find, but a bug bounty hunter just did it without too many difficulties.
Belgian bug bounty hunter Arne Swinnen discovered two vulnerabilities in image-sharing social network Instagram that allowed him to brute-force Instagram account passwords and take over user accounts with minimal efforts.
Both
Ecuador Bank Hacked — $12 Million Stolen in 3rd Attack on SWIFT System
Bangladesh is not the only bank that had become victim to the cyber heist. In fact, it appears to be just a part of the widespread cyber attack on global banking and financial sector by hackers who target the backbone of the world financial system, SWIFT.
Yes, the global banking messaging system that thousands of banks and companies around the world use to transfer Billions of dollars in
الاشتراك في:
الرسائل (Atom)