Security News

Skype to add End-to-End Encryption for Audio, Text messages, Images and Videos

Microsoft to add end-to-end encrypted Private Conversations for Audio, Text messages, Images, and videos and now for available for Skype…

7 years ago

Security Flaws Identified in WhatsApp Could Allow Attackers to Spy on Group Chats

End-to-end encryption is the major security feature of secure instant messengers, among the most popular one is WhatsApp having more…

7 years ago

New Malware Campaign Trick Victims as an Adobe Flash Player Installers

Security researchers from ESET identified the sophisticated hacker group Turla added new malware to its arsenal. It attempts victims to…

7 years ago

Toy Maker Vtech Settles Privacy charges for Violating Child Privacy Law

The most famous electronic toy maker VTech Electronics was charged to pay $650,000 for illegally collecting kids' information and that it had collected…

7 years ago

WPA3 Announced After KRACK Attack to Improve Security for Personal and Enterprise Wi-Fi Networks

Wi-Fi alliance introduced WPA3 security standard with new enhancements to reduce the potential attacks against network misconfiguration and centralized authentication…

7 years ago

Phishing Campaign Targeting Companies Associated with Pyeongchang Olympics

Security researchers from McAfee spotted a Phishing campaign targeting companies associated with Pyeongchang Olympic 2018.The multi-sport event is to take…

7 years ago

CoffeeMiner – Hacking into WiFi Networks to Inject Cryptocurrency Miners

Cryptocurrency Miners are in the raise starting from last year, more than 500 million computers are mining cryptoCurrency in their…

7 years ago

Top 10 Biggest Data Breaches Of 2017

Last year many cyber incidents were reported. Here is the lookback of Top 10 Biggest Data Breaches and leaks reported…

7 years ago

Nearly Every CPU’s Since 1995 are Vulnerable to “Meltdown” and “Spectre” Attacks

A critical vulnerability published by Google which affects almost all the processors since 1995, the vulnerability resides in "speculative execution"…

7 years ago

Intel Processors Vulnerability Allows Normal User Programs To Access The Protected Memory in the Kernel

Intel Processors Critical hardware design flaw that Presented in kernel level mode has been affected both Windows and Linux Kernels…

7 years ago