Google has simplified the authentication process by introducing an updated CAPTCHA that simply asks users whether they are a bot. Googleâs new API simplifies the reCAPTCHA experience, product manager Vinay Shet said. Google has provided a significant update to its reCAPTCHA authentication system with the intent to simplify the process. The CAPTCHA is a type of […]
Xbox Live online service was not available overnight after hackers belonging to the  Lizard Squad hacking team hit it with a DDoS attack. Last night the Microsoft Xbox Live’s online service was interrupted, after Sony Pictures another company suffered a major cyber attack. This time the Xbox Live service was hit by a severe DDoS attack that […]
An Egyptian hacker demonstrated that using a single exploit is possible to take control of any PayPal account due to the presence of a series of flaws . The Egyptian security researcher, Yasser H. Ali has reported three critical vulnerabilities in PayPal website that could be exploited by an attacker to compromise users’ account. The vulnerabilities include a CSRF and an Authentication token […]
Indian researchers have discovered a flaw in WhatsApp that allows anyone to remotely crash the popular mobile app by sending a specially crafted message. A “nice” vulnerability has been discovered in the popular messaging app WhatsApp that could be exploited by an attacker to remotely crash the mobile app just by sending a specially crafted message. The […]
A researcher at Google discovered a critical flaw in Windows Acrobat Reader 11 Sandbox that could be exploited to access a system and gain higher privileges Google security researcher James Forshaw claims that the Acrobat Reader Windows sandbox is affected by critical vulnerability that could allow attackers to compromise a system and gain higher privileges. “The […]
 As we look forward to 2015, itâs had to forget the complex bugs, data breaches and Privacy violations that have marred the Tech world in the ending year. Symantec Security firm now projects doom for 2015, warning that attacks will get Smarter and sharper. Itâs the end of the year, a perfect time to look […]
Experts at Zscaler security firm discovered several websites defaced by AnonGhostTeam hacktivists leading to Dokta Chef Exploit Kit and CVE-2014-6332 Many security experts tend to ridicule the threat of hacktivist groups, in many professionals consider the groups that express political dissent through cyber attacks as a harmless threat. Now cyber experts are warning of a new hacktivist campaign managed […]
A group of researchers at the University of Luxembourg have demonstrated that is it possible to de-anonymize Bitcoin users from its transactions. The majority of Bitcoin users consider the virtual currency absolutely anonymous, but researchers at the University of Luxembourg have demonstrated that is it possible to de-anonymize clients in a Bitcoin P2P network. In the paper written […]
High profile global websites using the customer management platform Gigya suffered a traffic redirection attack operated by the Syrian Electronic Army. A significant number of popular websites belonging to media organizations appeared to has been hacked by the hacking collective of Syrian Electronic Army on Thursday. The apparently hacked website, including The Independent, Telegraph e […]
TrendMicro explained the mechanisms behind the hacking of RFID payment smartcards, explained how to do it with an Android App. Security experts recently spotted an Android app used to hack the NFC based electronic payment system used in Chile, the âTarjeta BIP!â. The malicious Android app detected as ANDROIDOS_STIP.A was designed to attack NFC devices and distributed online through forums and blogs. […]