Location services are considered a serious threat to privacy because data managed by company like Google could be used for online surveillance. Many experts consider privacy a utopia, every activity we make online is constantly tracked and in many cases principal service providers manage much more information than needed. Google company has been accused many times […]
Experts at F-Secure security firm analyzing the new Xiaomi RedMi 1S discovered that it sends out to a server located in China a lot of user’s data. Xiaomi, one of the most important Chinese smartphone manufacturers is accused for secretly steal usersâ data and send it back to a server in China, despite the company has turned […]
A Hacker claims to have hacked the network of Gamma International firm and he has leaked docs related to the malware-for-government FinFisher. Earlier this week the British company Gamma International appears to have been hacked and a collection of files from its systems have been leaked on the Internet. The security firm is popular because it […]
A report disclosed by Wired suggests that the FBI is using a malware to identify Tor users by infecting machines on a large scale. It’s not a mystery that usage of the Tor network represents a problem for investigators of law enforcement agencies and for government entities that need to track users on the popular anonymizing network. […]
On July 4 2014 Tor Team discovered a group of malicious relays that they assume were trying to deanonymize Tor Network users with confirmation attack technique. Tor network is an excellent technology to ensure users’ online anonymity, thanks to the Tor network users can hide online activities, staying far from the prying eyes of governments and […]
Android devices are affected by a critical vulnerability which allows a malicious app to impersonate a trusted application inheriting its permissions. Researchers at Bluebox Security have discovered a critical vulnerability in millions of Android devices that allow a malicious app to impersonate a trusted application in a stealthy way, allowing a bad actor an attacker to perform different malicious actions. […]
A security researcher disclosed a serious issue on Instagramâs Android Application which could be exploited by an attacker to impersonate a victim. A security issue related to Instagram Mobile App for Android expose the users’ account to serious risks of data breach. A security researcher discovered that the Instagram Mobile App is affected by a Hijacking vulnerability which could be […]
The co-creator of the Tor network confirmed that the Tor Project team is working to identify and fix the bug announced by researchers at Carnegie Mellon. Tor network is a system designed to anonymize user’s experience on the web, allowing the publishing of content in the part of web non indexed by search engines, dubbed DeepWeb. A […]
A researchers at the Exodus Intelligence firm has discovered a series of zero day vulnerabilities in the popular Tails Linux-based distribution. A researcher at Exodus Intelligence has discovered critical zero-day vulnerabilities in the popular Tails live operating system. Tails is considered by security experts an indispensable tool to preserve the privacy and security of users that intend to […]
Indexeus is a new search engine that indexes user account information acquired from data breaches, including hackers’ accounts stolen in the underground. A new search engine for underground hacking dubbed Indexeus has been launched, it retrieves all the available information on user account acquired from hundreds recently data data breaches. The data collected includes information on malicious hackers […]