I Still Didn’t See What You Did

More tips for detecting and avoiding sextortion scams Vox Emptoris: “Voice of the Customer” In my previous post, we examined a particular example of a sextortion scam, showing several indications that it was...

Google Photos Vulnerability Allows Hackers To Track Location History

A vulnerability exists with the web version of Google photos allows malicious websites to extract the photos metadata information. Google photos will tag your photos automatically based on the metadata information...

Android Q – Beta Released with High Level Privacy and Security Features

Google released a new Beta version of Android Q that brings a number of additional privacy and security features for Android users. Since Android reached a billion users, Google has a...

Google hit with €1.49 billion antitrust fine by EU

The third penalty that Europe has levied on the tech giant in less than two years brings the total to €8.25 billion European Union (EU) authorities have handed down a €1.49...

Fake or Fake: Keeping up with OceanLotus decoys

ESET researchers detail the latest tricks and techniques OceanLotus uses to deliver its backdoor while staying under the radar This article will first describe how the OceanLotus group (also known as...

APT-C-27 Hackers Launching njRAT Backdoor via Word Documents

Goldmouse APT group (APT-C-27) now start exploiting the WinRAR vulnerability (CVE-2018-20250) to hide the njRAT backdoor and targeting users reside in the Middle East via decoy Word document to compromise...

PuTTY 0.71 – SSH Client Updated To Fix a Number of Vulnerabilities

The free and open-source SSH client updated with the fix for a number of Security Vulnerabilities including the one in RSA key exchange and the latest version is PuTTY 0.71. ...

Extensive Ransomware Attack Hits Operation at Norsk Hydro

Extensive Ransomware Attack forced to shut down operations at, Norsk Hydro, one of the world’s largest aluminum producers. The company suffered production outages across Europe and the U.S. The cyberattack shut...

Wireless Fujitsu model hacked –

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan Credits: ABC NEWS Updated A German security researcher has revealed that one model of Fujitsu wireless keyboard will...

You should pick your Android security app wisely, test shows

It’s prudent to get a security solution for your device, but a test by AV-Comparatives shows why you need to choose judiciously A recent test of anti-malware...

APLICATIONS

HOT NEWS