Security researchers have discovered multiple flaws in the Samsung Smart Home automation system that could be exploited by remote attackers. Security researchers from the University of Michigan have discovered multiple flaws affecting the Samsung Smart Home automation system that could be exploited by remote attackers for several attacks, including making keys for connecting front door locks. […]
A security vulnerability in AlphaBay, one the most popular black markets, could expose private messages and data of its users. One of the most popular black marketplaces, the AlphaBay, is affected by a serious flaw that could expose the private messages of its users. One year ago the operators behind the black market launched a fully automatic credit […]
Developers often ignore that they are exposing sensitive data when they publish code containing their Slack access tokens on GitHub. It was the year 2015, the month of March when Slack officially posted the following statement on their corporate blog: “there was unauthorized access to a Slack database storing user profile information. We have since […]
Employee monitoring is a complex and controversial topic that can often become the source of discontent between employers and their staff. It is not a secret that most employees have a negative opinion about modern monitoring practices, such as PC monitoring. It is often viewed as an invasion of privacy and employer overstepping their authority. […]
Security Experts at Bleeping Computer have discovered a new adware dubbed Faster Internet that takes a screenshot of victims’ computers. Security Experts at Bleeping Computer have spotted a new strain of adware, known as Faster Internet, that takes a screenshot of victims’ PCs. Lawrence Abrams, a computer security expert at Bleeping Computer, explained in a blog post […]
The Defense Advanced Research Projects Agency is calling for the development of a hacker-proof encryption App for the U.S. military. The US Defense Advanced Research Projects Agency (DARPA) is calling security experts to create a hacker-proof “messaging and transaction platform.” The project for a hacker-proof encryption App was proposed under the rules of the Small Business Technology Transfer […]
Two security researchers from Cornell Tech discovered that web URL shorteners operate in predictable way exposing sensitive data. The security researchers Vitaly Shmatikov and Martin Georgiev from Cornell Tech discovered that web URL shorteners operate in predictable way, and this could result in the disclosure of sensitive information. The duo analyzed the most popular URL shorteners, […]
During the Q&A session at Kenyon College last week, the FBI Director explained that he uses tape to mitigate the danger of cyber espionage. Privacy and security are top priorities for some security experts that are aware of threat actors’ capabilities, so I’m not surprised that the FBI Director James Comey uses to cover his laptop webcam […]
Whatsapp now implements end-to-end encryption for all versions of the most popular messaging and voice calling application. Great news for privacy advocates and WhatsApp users, the software now implements end-to-end encryption for all versions of the most popular messaging and voice calling application. On Tuesday, the company announced the significant improvement to its 1 billion users with a blog […]
Delft Dynamics conducted a successful test, where a drone was taken out of the air by another unmanned aerial vehicle named DroneCatcher. The drone industry is growing at a rapid pace. Aerospace research company Teal Group has estimated that sales of military and civilian drones will total over $89 billion in the next 10 years. […]