In our story yesterday on how to get a free VPN trial, we briefly talked about the importance of encrypting your data whilst using public Wi-Fi. In this post, we’ll dig a little deeper into the subject and explain the different methods hackers are using to gain illegal access to your personal computer and how Read More
Well, that didn’t take very long, did it? Only a few short months after its release, the team behind Apple Pay is already working to clean up a series of hacks that have rendered their premier mobile payment service vulnerable to hackers skilled in the art of social engineering.
According to a report this week from Glenn Greenwald’s leak-happy publication The Intercept, new documents out of the Snowden archive suggest that the NSA and GCHQ have been actively hacking the world’s largest provider of SIM cards in order to eavesdrop on cellphones on a global scale.
Security experts are expecting 2015 to be the year where ransomware and extortionware grows significantly, according to reports. In its 2015 Threats Prediction Report, McAfee Labs says that this year we will see an increase in the use of cyber espionage and cyber warfare tactics, with analysts predicting an increase in ransomware and extortionware, where Read More
Members of Google’s highly-regarded Zero security team have released details about a new privilege exploit they discovered buried deep in the central architecture of Windows 8.1.
A new report released by security firm Sophos has raised alarms about the growing popularity of a botnet-based malware model called Vawtrak.
On Wednesday, the SEA (Syrian Electronic Army) penetrated the website of business news site International Business Times, breaching the publication’s CMS (content management system) and threatened to wipe out the entire site if it continues to publish ‘false news’ about Syria. The anonymous hacking group also deleted an article pertaining to Syrian violence.
OpenVPN has fixed a major denial of service (DoS) vulnerability that allows authenticated clients to attack its servers. Researcher Dragana Damjanovic was the first to discover this vulnerability, which has been labeled as CVE-2014-8104.
Uber has been forced to comply with rules in India that state it must use two factor authentication for online transactions, despite the ride sharing company’s protestations.
UK Internet users are reusing passwords and exercising poor password practices, which is putting their data at risk, according to a new study. In a survey conducted by TeleSign of more than 2,000 consumers, the mobile identity company discovered that 62 percent of consumers risked compromise of their online accounts and other similar credentials because Read More