The ÎŒTorrent team announced its community ÎŒTorrent forum has been hacked. Hundreds of thousand records belonging its users have been exposed. Are you a Torrent user? Are you one of the users of the popular ΌTorrent Forum? You might be in trouble because the ÎŒTorrent Forum was hacked. ÎŒTorrent is one of the most popular BitTorrent clients, […]
The potential of IoT devices connected over cloud networks is breathtaking, opening opportunities that will forever change societal culture. Itâs a buzzword that has been around the past decade and has often been portrayed in futuristic visions of a society where man and technology has integrated into one. The potential of IoT devices connected over cloud […]
A new collection of documents leaked by Edward Snowden and analyzed by The Intercept reveals that MI5 collected significantly more data than it can use. A lot of documents leaked by Edward Snowden revealed that the British Security service MI5 confirmed it was collecting “significantly more than it is able to exploit fully.” The facts date back to 2010, […]
The FTCâs chief technologist gets her mobile phone number hijacked, she shared her experience of a victim of such kind of Id Theft. The incident that I’m going to tell you is worrisome, the US Federal Trade Commission’s chief technologist Lorrie Cranor gets her phone number hijacked. The FTC’s chief technologist was hacked by someone posing […]
Boffins released a paper describing how computer processors can be programmed to give elevated privileges to hackers and run fabrication-time attacks. A team of researchers from the University of Michigan recently released a paper describing how computer processors can be programmed to give elevated privileges to hackers. The paper titled, âA2: Analog Malicious Hardware,â describes […]
Security experts discovered a security vulnerability in the Facebook Messenger App that allows hackers to replace the content of the messages they send. Security experts from Check Point early this week reported a serious vulnerability in the Facebook Messanger App that could be exploited by attackers to replace the content of the messages they send […]
The FBI has issued a warning that individuals should be on their guard against extortion email scam linked to recent high-profile data breaches. The FBI states that its Internet Crime Complaint Center (IC3) has identified this new variety of extortion through the increased instance of reports to the Centre from individuals who have fallen victim […]
Security experts from FireEye have observed attacks leveraging on Angler EK to deliver exploits capable of evading the Microsoft EMET security Tool. Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) is a free security tool designed by Microsoft to implement a supplemental security layer of defense against the exploitation of vulnerabilities affecting applications running on Windows Systems. […]
Hackers discovered it is possible to remotely control features of Mitsubishi Outlander PHEV by hacking the mobile applications designed by the car vendor. A team of experts from the UK security firm Pen Test Partners has demonstrated that it is possible to remotely control some feature of the popular SUV Mitsubishi Outlander plug-in hybrid electric vehicle […]
Experts from Kaspersky Lab have conducted an experiment to demonstrate the risks for charging mobile devices with untrusted USB charging points and PCs. A simple operation like charging mobile Smartphone could expose users at serious risks. It is not a novelty, mobile devices could be hacked while owners are charging them by using a standard […]