Digital ID

Message Decryption Key for Signal Desktop application stored in plain text

The reverse engineer researcher Nathaniel Suchy discovered that Signal Desktop application leaves message decryption key in plain text exposing them to an attacker.…

6 years ago

Group-IB: 14 cyber attacks on crypto exchanges resulted in a loss of $882 million

Group-IB has estimated that crypto exchanges suffered a total loss of $882 million due to targeted attacks between 2017 and 2018. Group-IB, an…

6 years ago

Project Strobe, what will change after the Google security breach?

Google announced a security breach that may have exposed data of over 500,000 users of its Google+ social network, these…

6 years ago

How Secure Are Bitcoin Wallets, Really?

Purchasers of Bitcoin wallets usually have one priority topping their lists: security. What's the truth about the security of these…

6 years ago

Google was aware of a flaw that exposed over 500,000 of Google Plus users, but did not disclose it

This is a very bad news for Google that suffered a massive data breach that exposed the private data of over…

6 years ago

Facebook: User shadow data, including phone numbers may be used by advertisers

The worst suspect is a disconcerting reality, Facebook admitted that advertisers were able to access phone numbers of its users…

6 years ago

Crooks leverages Kodi Media Player add-ons for malware distribution

Security experts have spotted a Monero cryptomining campaign that abused Kodi add-ons to deliver miner that target both Linux and…

6 years ago

Bitcoin Core Team fixes a critical DDoS flaw in wallet software

Bitcoin Core Software fixed a critical DDoS attack vulnerability in the Bitcoin Core wallet software tracked as CVE-2018-17144. The Bitcoin…

6 years ago

Hackers stole $60 Million worth of cryptocurrencies from Japanese Zaif exchange

Cybercriminals have stolen 6.7 billion yen ($60 million) worth of cryptocurrencies from the Japanese digital currency exchange Zaif exchange. According…

6 years ago

Sustes Malware: CPU for Monero

Sustes Malware doesn't infect victims by itself, but it is spread via brute-force activities with special focus on IoT and…

6 years ago

This website uses cookies.