Crypto

Conexant audio driver works as Built-in Keylogger feature in dozens HP devices

A Security researcher discovered that a Conexant audio driver shipped dozens HP laptops and tablet PCs logs keystrokes. Security researcher…

9 years ago

UK Government’s secret programme for mass surveillance on internet and phones leaked

According to a draft document leaked online, UK Government is assigning itself more powers to spy on live communications and…

9 years ago

Information Security Practices of Aadhaar – 135 Million Indian government payment card details leaked

A CIS study estimated number of Aadhaar numbers leaked through 4 gov portals could be around 135 million and 100M…

9 years ago

Turkey banned Wikipedia because its content web contents that represents a threat to national security

The monitoring group Turkey Blocks confirmed that Turkey banned Wikipedia because its content web content that represents a threat to…

9 years ago

Four Essential Security & Privacy Extensions for Chrome

Here are the top four extensions for the Chrome browser to keep your online activity safe, secure and private. The…

9 years ago

Technical issue at the Jharkhand govt website caused the exposure of more than 1.4 million Aadhaar numbers

Personal information associated with more than a million Aadhaar numbers published on Jharkhand govt website due to a technical problem.…

9 years ago

What Is Metadata Retention, And How Do You Maintain Your Privacy?

As Australia's newly approved Data Retention law comes into effect, how does the law actually affect the average coutry internet…

9 years ago

Exfiltrating data from laptop and smartphones via ambient light sensors

A security researcher presented a method to exfiltrate sensitive data from a laptop or a smartphone through built-in ambient light…

9 years ago

Microsoft biannual transparency report – US foreign intelligence surveillance requests more than doubled

Microsoft published the biannual transparency report - The number of US foreign intelligence surveillance requests more than doubled. Microsoft shared…

9 years ago

Hackers can steal PINs and Passwords capturing data from smartphone sensors

A group of researchers has demonstrated that attackers can steal PINs and Passwords capturing data from smartphone sensors. Modern mobile…

9 years ago

This website uses cookies.