Nearly 18,000 Android apps built using the Taomike SDK, and used in China, have been found to include a malicious SMS stealing library. Bad news for Android users, according to according to Palo Alto Networks, nearly 18,000 Android Applications built using the Taomike SDK have been found to include SMS Stealing Library. The Taomike SDK is one […]
Experts at Netcraft discovered that nearly a million SSL SHA-1 certificates were signed with the potentially vulnerable SHA-1 hashing algorithm. Businesses Using Millions of Flawed Certificates, the news is shocking and refers the adoption of SHA-1 certificates, despite the algorithm is considered no more secure. Many big businesses, including firms like Deloitte, are still using SHA-1 certificates, […]
The German researcher Starbug, has demonstrated that it is possible to extract everyone’s smartphone PIN code from any selfie “image,” is biometrics secure? The German researcher Jan Krissler, aka Starbug, has demonstrated that it is possible to extract everyone’s smartphone PIN code from any selfie “image” … and much more! Jan Krissler is a popular hacker, he […]
A flaw affecting the way encryption software implements the Diffie-Hellman key exchange algorithm allowed the NSA to break trillions of encrypted connections. Edward Snowden has revealed to the world that the NSA was able to crack also the almost encryption to conduct a large-scale online surveillance. According to Snowden, the intelligence Agency was able to decrypt […]
McAfee Labs has analyzed a number of websites and services in the Dark Web used by the criminal communities for the commercialization of stolen data. You know my passion for the Dark Web, I spend a lot of time monitoring activities in the hidden part of the web with a particular interest in illegal activities that […]
Google listens and records our voice searches, but the majority of the users ignores it. I’ll explain how to listen and delete them from your account. Google knows everything of our digital existence and the story that I’m going to tell you confirm it. The fact that Google keeps track of our researchers is not […]
Microsoft web applications, such as Outlook or OneDrive and account pages, expose visitors’ Microsoft Identifier (CID) in plain text. A Chinese developer, which uses the pseudonym of ramen-hero, discovered that Outlook.com, OneDrive, and Microsoft’s account pages use a unique user identifier known, also known as CID, in their web applications. The Microsoft CID is a 64-bit integer used […]
Don’t throw away your old Boarding Pass, it may contain personal information that could allow attackers to run targeted attacks on you! Don’t throw away your old Boarding Pass, it may contain personal information. After finishing your trip, the boarding pass becomes useless, but does that mean that you should throw it in the garbage? […]
The creator of the popular Adblock Extension made a shocking revelation, the company has been sold to an unknown buyer. Who is and which are the risks? The popular Adblock Extension has been sold to an unknown buyer, Michael Gundlach its creator made the shocking revelation. Michael Gundlach doesn’t provide further details on the sale, he kept secret the […]
Sanmay Ved was searching for available .com domains and discovered the availability of Google.com … then he bought it, but something happened … This story is amazing and difficult to believe …. an individual managed to buy the Google.com domain and now I’ll tell you how. The guy is Sanmay Ved, a former Google employee that currently works for Amazon. […]