Home Security

Security

Security issues

Google Now & Siri Hack

Siri & Google Now Can Be Hacked From 16 Feet Away

Google Now may be your personal assistant. However your voice isn't the only one it listens to. As a group of researchers from France have found, Siri & Google Now also helpfully obeys the...
Dangerous USB

A USB that can literally destroy your computer!

USB sticks have long been a mechanism for delivering malware to unsuspecting computer users. A booby-trapped flash drive, for example, was the means by which the US and Israel reportedly contaminated...
RIP flash

Flash ads will stop working in Chrome from Sept 1st, 2015

In case your advertisements are not on the search giant's network (Adsense), they better be in HTML5 – or they're lifeless to Chrome. If they are already on the Adsense, then...
flash update

Users of Yahoo hacked because of Flash

Researchers at Malwarebytes, an anti-malware vendor, uncovered a large scale attack targeting Yahoo customers via Yahoo’s advertising network. Malwarebytes notified Yahoo about it and the “malvertising” marketing campaign is now no...
satellite hacking

Russian Spy Team Accused of Hacking Satellite Data

In case you’re a state-sponsored hacker siphoning data from selected computer systems, the very last thing you need is for somebody to find your command-and-control server and shut it down, finishing...
IPPC, Berlin 2016

Next Hacker International Programming Player Competition (IPPC)

Miami, September 16, 2015 Java Programmers Competition 2016 IPPC: $500,000 cash prizes SHOW ME YOUR SPEED! We are already convinced that there are many gifted programmers and ingenious hackers.     Now we want to know...
whatsapp hack

XNSPY – A Software Spy WhatsApp Cannot Fend off

Note: Read the comments before you buy this app. There have been many problems reportedly and the software may not work as advertised and the support may not be there. We...

Researchers can accurately identify people using their brain waves

Yes, Brain Waves. For the longest time, the world has relied on fingerprints as a technique to easily identify individuals. It's because a fingerprint is unique (and permanent) for each individual—so what happens...
qualcomm vulnerable

Once again, a billion plus android devices vulnerable

  Once again, more than a billion Android gadgets are vulnerable to a security hole in Qualcomm's Snapdragon chip that may very well be exploited by any malicious hacker to gain full...
ActiveTracker Campaign Malware

A Malware Called Active VisitorTracker Campaign Infecting WordPress Sites

For the last couple of weeks Sucuri have been tracking a new Malware threat that has gained significant traction over the past forty eight-seventy two hours. The malware they call the “Active...

HOT NEWS