Edward Snowden joins Twitter and follows NSA
Fugitive US intelligence contractor Edward Snowden has opened an account on the social network website Twitter. His opening tweet was: “Can you hear me now?” In his profile, Mr SnowdenRead More →
Data Security News | Infosec Blog | Cyber Security Tutorials
Fugitive US intelligence contractor Edward Snowden has opened an account on the social network website Twitter. His opening tweet was: “Can you hear me now?” In his profile, Mr SnowdenRead More →
Pirate Bay is online and playing a game of cat and mouse with IP regulators. Pirate Bay co-founder Gottfrid Svartholm Warg was released from a Swedish prison Saturday, three years afterRead More →
Technique allows full recovery of 2048-bit RSA key stored in Amazon’s EC2 service. Piercing a key selling point of commercial cloud computing services, computer scientists have devised a hack thatRead More →
Researchers have found that smartphone browsers can deliver a powerful flooding attack. Researchers suspect a mobile advertising network has been used to point hundreds of thousands of smartphone browsers atRead More →
Yesterday at the Maker Faire in New York, we had a chance to check out the Rephone, a clever little project that comprises a bunch of modules that let youRead More →
Largest Chat app for Smartphones is now at Risk whatsapp hack that allow user to steal conversation, Israeli security firm Check Point discovered a critical vulnerability of WhatsApp Web that mightRead More →
Once again, fully patched iPhone lock screens can be bypassed with a few keystrokes. iPhone users have yet another screenlock bypass vulnerability to watch out for, according to a newRead More →
Lenovo has been caught, yet again, installing apps on its laptops and workstations without the user’s consent or knowledge, as Michael Horowitz from Computerworld reports. This is not the firstRead More →
RIPE NCC is building the largest Internet measurement network ever made. RIPE Atlas employs a global network of probes that measure Internet connectivity and reachability, providing an unprecedented understanding ofRead More →
Here’s a treat for hackers and security researchers who don’t mind selling information about zero-day vulnerabilities to the highest bidder: Zerodium, the zero-day vulnerability and exploit acquisition firm recently launchedRead More →