Researchers at ETH Zurich discovered several critical flaws in the MEGA cloud storage service that could have allowed the decryption of user data MEGA has addressed multiple vulnerabilities in its cloud storage service that could have allowed threat actors to decrypt user data stored in encrypted form. Data on Mega services is end-to-end encrypted client-side […]
Experts reported that the AWS S3 storage containing subscriber data was left open by freelancers who handled web applications for the Time Warner Cable. A few days ago, researchers discovered of thousands of resumes of US Military and intel contractors left unsecured on an Amazon server, now roughly four million Time Warner Cable customers in the US were […]
A researcher has discovered a series of security issues in the newborn iOS Outlook app that allows Microsoft to access user emails and credentials. Security researcher and Head of Development at midpoints GmbH and IBM Champion RenĂ© Winkelmeyer has published a blog post to warn about security issues in the newborn iOS Outlook app. According to […]
 As we look forward to 2015, itâs had to forget the complex bugs, data breaches and Privacy violations that have marred the Tech world in the ending year. Symantec Security firm now projects doom for 2015, warning that attacks will get Smarter and sharper. Itâs the end of the year, a perfect time to look […]
Experts from Cyphort Labs have discovered an extensive data theft campaign named Nighthunter that has been active since 2009 stealing victim’s credentials. Security experts at Cyphort firm have recently uncovered a five-year-old attack campaign dubbed NightHunter arranged to steal user credentials for Dropbox, Facebook, and other web services. The malicious campaign is cross sector, every industry […]
Researchers at last USENIX security symposium presented a new method and consolidated techniques for reversing Dropbox code to bypass Dropboxâs two factor authentication, hijack Dropbox accounts and intercept SSL data. Reversing Dropbox analysis allowed researchers to crack its open cloud storage service, reverse engineering the encryption protecting the client it is possible to open it up […]