Amnesty International launches Detekt tool to scan for state surveillance spyware on phones and PCs, it was developed by security expert Claudio Guarnieri. A group of security and technology experts that fight for the respect of human rights experts have launched a new tool dubbed Detekt that allow the detection of the government surveillance malware on […]
Thousands of patient records in UK are vulnerable to cyber fraudsters after up to 20 trusts under the National Hospital Service failed to extend security support for outdated Windows XP with Microsoft. Trusts running on the outdated OS risks reversed engineered attacks from hackers exploiting vulnerabilities on the unsupported OS. Hundreds of Thousands of Patient […]
Facebook and Yahoo have designed an SMTP extension dubbed RRVS, Require-Recipient-Valid-Since, to prevent illegal use of emails with a new  ownership. Last year Yahoo announced the decision to reset any account that has not been used for 12 months, making them available to other users. The decision has raised several doubts for security and privacy issues, […]
New significant software updates Tor Browser 4.0 and Tails 1.2 are available for the popular Privacy Tools used to preserve online anonymity The Tor project has released a new version of the popular free software for enabling online anonymity Tor, Tor Browser 4.0 is the release Tor Browser Bundle available for download. The Tor Browser Bundle is based on an […]
The cyberattack that compromised systems at JPMorgan Chase exposed accounts of 76 million households and seven million small businesses. Data related nearly 76 million households and seven million small business accounts were exposed in the recent hack of the JPMorgan Chase & Co (JPM.N) systems occurred during the summer, making it one of the biggest data breaches in history. […]
The SHA-1 cryptographic hash algorithm has been known vulnerable, Collision attacks against it are too affordable and attacks will get cheaper soon. Many websites today are using digital certificates signed using algorithms based on the hash algorithm called SHA-1. Hashing algorithms are used to ensure the integrity of the certificate in the signing processes, a flawed […]
Copies of the Elcomsoft EPPB tool are circulating in the underground and could have been used in the recent leak of celebrity photos. Recently naked pictures of celebrities have been leaked online, but security experts were particularly interested to the news because they speculate that the images have been stolen from the Apple iCloud service. […]
Location services are considered a serious threat to privacy because data managed by company like Google could be used for online surveillance. Many experts consider privacy a utopia, every activity we make online is constantly tracked and in many cases principal service providers manage much more information than needed. Google company has been accused many times […]
The Russian Prime Minister Dmitry Medvedev has signed a decree that will extend the use of SORM-2 to social network surveillance. Itâs known that the Russian Government is applying a strict surveillance on the Internet within the country, the Kremlin has developed a system code named âSORM-2â to monitor Russian citizens. The Russian Government has […]
Google Security experts have detected and blocked unauthorized digital certificates for a number of its domains issued by the NIC of India. Google announced to have blocked unauthorized digital certificates for different of its domains issued by the National Informatics Centre of India, which holds several intermediate CA certificates trusted by the Indian Controller of Certifying Authorities (India CCA). […]