Great. Now Even Your Headphones Can Spy on You
CAUTIOUS COMPUTER USERS put a piece of tape over their webcam. Truly paranoid ones worry about their devices’ microphones—some even crack open their computers and phones to disable or removeRead More →
CAUTIOUS COMPUTER USERS put a piece of tape over their webcam. Truly paranoid ones worry about their devices’ microphones—some even crack open their computers and phones to disable or removeRead More →
Stealth Cell Tower, it is an antagonistic GSM base station concealed in an office printer that could be used for surveillance purposes. Are you angry with your boss or yourRead More →
Researchers at the Bellingcat agency have been hit with spear phishing attacks and account takeover attempts while investigating flight MH17 crash. Once again cyber security experts warn of a newRead More →
Attackers have been using social engineering to avoid the increasing costs of exploitation due to the significant hardening and exploit mitigations investments in Windows. Tricking a user into running aRead More →
Crooks also delivering keyloggers and password stealers. A new trojan called BackDoor.TeamViewerENT.1 is using parts of the legitimate TeamViewer application to allow crooks to spy on infected systems. The concept isRead More →
Espionage platform with more than 50 modules was almost certainly state sponsored. Security experts have discovered a malware platform that’s so advanced in its design and execution that it could probablyRead More →
EFF exposes threat group operating for Kazakhstan regime. The Electronic Frontier Foundation (EFF) has released a report today named Operation Manul that details attacks with malware on Kazakhstan’s top journalists andRead More →
F-Secure researchers say parties involved in the South China Sea arbitration case were infected with the data-stealing NanHaiShu Trojan. Hackers have used targeted malware to steal data from some ofRead More →
When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the trafficRead More →
Hackers leak 1.4GB database of information after breaching Qatar National Bank.A group of unknown hackers have claimed to have hacked into the servers of Qatar National Bank (QNB), based inRead More →