privacy

Philips SmartTV susceptible to serious hack according ReVuln expertsPhilips SmartTV susceptible to serious hack according ReVuln experts

Philips SmartTV susceptible to serious hack according ReVuln experts

Researchers at ReVuln firm demonstrated how to exploit the last firmware update for Philips SmartTV to steal user's cookies and…

11 years ago
For Google it is time to encrypt all GMail connectionsFor Google it is time to encrypt all GMail connections

For Google it is time to encrypt all GMail connections

Google has announced to have adopted encrypt mechanisms for all Gmail connections to reply to the increasing demand of privacy…

11 years ago
Tor browser app in the Apple app store is fakeTor browser app in the Apple app store is fake

Tor browser app in the Apple app store is fake

For more than two months is is present in the official App Store a fake version of the Tor Browser…

11 years ago
WhatsApp flaw allows hackers to steal private Chats on Android devicesWhatsApp flaw allows hackers to steal private Chats on Android devices

WhatsApp flaw allows hackers to steal private Chats on Android devices

A security consultant disclosed a security flaw in WhatsApp which can be exploited to gain access to the private chats…

11 years ago
Samsung Galaxy backdoor allows files access on the mobile’s storageSamsung Galaxy backdoor allows files access on the mobile’s storage

Samsung Galaxy backdoor allows files access on the mobile’s storage

Replicant developers Kocialkowski has discovered a backdoor inside Samsung Galaxy which allows file access on the mobile's storage. Android is the open…

11 years ago
HTTPS traffic analysis can leak user sensitive dataHTTPS traffic analysis can leak user sensitive data

HTTPS traffic analysis can leak user sensitive data

A Team of US researchers at UC Berkeley conducted a study on the HTTPS traffic analysis of ten widely used…

11 years ago
GnuTLS flaw in certificate verification exposes Linux world to attacksGnuTLS flaw in certificate verification exposes Linux world to attacks

GnuTLS flaw in certificate verification exposes Linux world to attacks

A serious flaw in the certificate verification process of GnuTLS exposes Linux distros, apps to attack. Another flaw exploitable for…

11 years ago
Optic Nerve, GCHQ intercepted webcam images from millions of Yahoo usersOptic Nerve, GCHQ intercepted webcam images from millions of Yahoo users

Optic Nerve, GCHQ intercepted webcam images from millions of Yahoo users

The Guardian revealed that under the surveillance program Optic Nerve the GCHQ has intercepted webcam images from millions of Yahoo…

11 years ago
FireEye discovered an Apple vulnerability which allows iOS keyloggingFireEye discovered an Apple vulnerability which allows iOS keylogging

FireEye discovered an Apple vulnerability which allows iOS keylogging

Researchers at FireEye have developed a POC that exploits an Apple vulnerability to implement a Background Monitoring on Non-Jailbroken iOS…

11 years ago
Unveiled network of surveillance based on RCS of Hacking TeamUnveiled network of surveillance based on RCS of Hacking Team

Unveiled network of surveillance based on RCS of Hacking Team

Citizen Lab published detailed information on the surveillance network based on RCS spyware designed by the Italian firm Hacking Team.…

11 years ago