Your Headphones can act as a spyware

8 years ago

To listen a Audio we need headphones, whereas to record we need Microphones. But Security researchers at Israel’s Ben Gurion University…

Final countdown for SHA-1 SSL certificates

8 years ago

SHA-1 SSL certificates which are more popular and an sucessor of MD5 algorithm are now in the final days of what…

Twitter mistakenly suspended its own CEO’s Twitter account

8 years ago

Twitter co-founder and CEO Jack Dorsey found his account on the micro-blogging site briefly suspended Tuesday. For about 30 minutes, starting…

A USB dongle can hijack all your Web accounts and router in 30 seconds, even if your computer is locked

8 years ago

A proof of concept from security researcher and software developer Samy Kamkar shows that macOS, Windows, and Linux computers can…

Hacked Cameras, DVRs Powered Today’s Massive Internet Outage

8 years ago

A massive and sustained Internet attack that has caused outages and network congestion today for a large number of Web sites…

Locky Ransomware spreading through Facebook Messenger Via SVG File

8 years ago

SVG(Scalable Vector Graphics) send by your friend may have Locky Ransomwares, avoid clicking it. By appending the Ransomware to an…

Most Important Vulnerability test methods for application security assessments

8 years ago

Many security Experts are thrust into the uncomfortable position of dealing with a huge portfolio of potentially insecure applications, limited…

A6-Sensitive Data Exposure

8 years ago

Sensitive Data Exposure is difficult to exploit wheres prevalence and detect-ability is less common, but the impact is severe. Clearly…

One Million Fraud Attempts Per Day – Facing UK Retailers

8 years ago

The UK’s retailers have been warned to brace themselves for a barrage of fraud attempts this busy festive shopping season,…

Unlock Iphone with Siri – Without password

8 years ago

Unlock Iphone with Siri : Password are the basic level of validation with smartphones, it will acts as a defence for…