MENU

Security

Watch Out For GiftGhostBot: Steals Gift Card Balances

Distil Networks identified a major threat to online businesses dubbed GiftGhostBot. The bot stole money from customers' gift card accounts and caused distress to retailers.

Security March 25, 2017

Apple On Latest WikiLeaks CIA Documents: No Worries, Exploits Have Long Been Patched

WikiLeaks has dumped a new set of CIA hack documents, detailing how the government breached into Macs and iPhones. Apple has issued a statement in response, arguing that it 'does not condone theft' and those exploits were patched long ago.

Security March 24, 2017

WikiLeaks Exposes CIA Tools Targeting MacBooks And iPhones: Here's What They Do

WikiLeaks has released Dark Matter, the second part of the series of documents containing hacking and surveillance tools developed by the CIA. The tools described in Dark Matter target the Mac computers and iPhones of Apple.

Security March 24, 2017

Intel Kicks Off Bounty Program: Reward Of Up To $30,000 For Spotting Hardware Vulnerabilities

Intel has launched its first bug bounty program to secure its hardware, software and firmware. Researchers are encouraged to discover faults in Intel's systems and can get a reward of up to $30,000 for finding vulnerabilities.

Security March 17, 2017

Like McDonald’s, You Could Fall Victim To Hacking: Tips To Protect Your Twitter Account

Twitter has always been an easy target for online privacy breaches, given the large size of its users and the ease at which tweets can be spread. Here are the steps to keep your Twitter account secure.

Security March 17, 2017

McDonald's Twitter Account Compromised: Posts Offensive Anti-Trump Tweet

McDonald's official Twitter account was compromised and hackers posted offensive anti-trump tweets. The security breach has now been resolved and the offending tweet has been taken down.

Security March 17, 2017

WhatsApp And Telegram Allowed Hackers To Hijack Accounts With Just 1 Image: Here's What Happened

WhatsApp and Telegram, two messaging apps renowned for their security, had a severe security flaw that left 'hundreds of millions of accounts' exposed. Check Point Security researchers recently notified the two companies and both WhatsApp and Telegram have since patched the vulnerability.

Security March 15, 2017

4 Hackers To Be Charged For Yahoo Data Breaches, Report Claims: Are They Connected To Russia?

The Department of Justice is accusing four people of being participants in the hacking attacks launched against Yahoo. The data breaches, which affected over a billion users, were previously claimed to be connected with the Russian government.

Security March 15, 2017

Samsung To Roll Out Monthly Security Patches To Unlocked Smartphones In US

Samsung will soon launch monthly security updates for its unlocked devices. This news may come as a surprise for users who are waiting for the Android Nougat update to hit their unlocked Galaxy S7 and Galaxy S7 edge smartphones.

Security March 14, 2017

Hackers Can Use Sound Waves To Crack Your Smartphones, Scientists Suggest

A study reveals the ways through which hackers can use sound waves to crack a smartphone. A minor mistake can enable someone to easily enter the operating system of electronic devices.

Security March 14, 2017

Stop Reusing Or Rotating Passwords, They Are Easy To Crack

Data scientists found that reusing passwords leaves the user vulnerable to hacking. They also revealed that even the most complex passwords of 10 characters can be compromised in a month using hacking programs.

Security March 14, 2017

New Android Smartphones Found To Be Already Infected By Malware: Are You At Risk?

Cybersecurity company Check Point discovered that 38 new Android devices came pre-installed with malware and ransomware. The findings raised fresh concerns on Android security, and here is what you can do to avoid the risk.

Security March 12, 2017

Worried About Privacy Breaches? Here Are Cybersecurity Tips To Lock Out Intruders

Cyberattacks and privacy breaches have worried many about the safety and security of their IoT devices. Here are a few tips that can ease your worries about cybersecurity.

Security March 12, 2017

Popular Messaging Apps WhatsApp, Signal, iMessage, And More Reportedly Safe From CIA Hacking Tools

The recent string of reports pertaining to a WikiLeaks document dump alleging the CIA’s hacking tools caused a fit of unrest over data security. Reports of CIA being able to bypass encrypted messaging apps, however, are apparently overblown.

Security March 11, 2017

WikiLeaks CIA Hack Leak Raises Privacy Concerns: How To Stay Protected

The WikiLeaks CIA hack reveal raised some serious privacy and security concerns, making us wonder whether any of our devices are safe from spying. If you're worried about hacks, here's how to keep your device protected.

Security March 10, 2017

WikiLeaks Want Apple, Google, Samsung To Come Together Against CIA

Vault 7, the codenamed program used by CIA to spy on normal people in the name of security was hacked by WikiLeaks. To stand against it, the organization is hoping to join hands with Apple. Google and Samsung.

Security March 10, 2017

Fortune 1000 Companies Two Times More Prone To Data Breaches, Says Report

Fortune 1000 companies experience double the security breach compared to its peers. The report from BitSight took into consideration the levels of cybersecurity performance of Fortune 1000 companies.

Security March 9, 2017

WikiLeaks Reveals CIA Can Spy On You: Are Samsung And Windows Phones And Tablets Affected?

Microsoft and Samsung released statements assuring consumers that their devices would not be vulnerable to hacking and that they take cybersecurity very seriously. These statements were made after the Wikileaks report which exposed illegal hacking operations by CIA.

Security March 9, 2017

WikiLeaks Dump: Should You Be Worried About The CIA Cyber Hacks?

Another spying scandal has hit the CIA, this time with the massive cybersecurity documents exposed by WikiLeaks. The documents contain information regarding spying and hacking efforts done by the agency, an issue that can put it at loggerheads with the tech industry.

Security March 8, 2017

WikiLeaks Exposes CIA Spying Tools: Smartphones, Computers, Even Internet-Connected TVs Compromised

WikiLeaks has uploaded Vault 7, which are thousands of documents that claim to expose the hacking tools used by the Central Intelligence Agency. The general public, however, should not hit the panic button just yet.

Security March 7, 2017

Spammergate: 1.4 Billion Email Addresses And User Details Found Online As Spammers' Backups Leak

A spam operation called River City Media spilled 1.4 billion email addresses and user details because its backups were poorly secured. The collection of files includes real names, physical addresses, IP addresses and even RCM's internal files and chat logs.

Security March 7, 2017

Data From Electronic Toys Leaked, Adds To List Of Hacker Vulnerable Devices

CloudPets join the ranks of toys targetted by hackers. Multiple toy hacking incidents add children's toys to the list of hacker-vulnerable devices along with medical devices and smart home appliances.

Security March 3, 2017

CloudPets Exposes Danger Of Internet-Connected Toys: What Can Parents Do To Keep Safe?

Security researcher Troy Hunt discovered that the internet-connected CloudPets presented a major security threat to parents and children. What can parents do to keep themselves and their children safe?

Security February 28, 2017

Leaked Document Reveals New York Airport Unable To Screen 'No-Fly' List, Security Lapses In Server To Blame

A data exposure has leaked the information that passengers flying in, out or within U.S. were not properly checked against U.S. governments 'no-fly list' in recent years. TSA is yet to comment on the leak.

Security February 28, 2017

CloudPets Toys Expose 2 Million Messages Due To Unsecured Server, Hackers Held Data For Ransom

Hackers successfully accessed and deleted CloudPets user information before asking for ransom to restore the files. The data was reportedly stored in an unsecure server, exposing millions of children's messages.

Security February 28, 2017

100 Percent IE And Microsoft Edge Vulnerabilities Can Be Mitigated By Removing Admin Rights, Says Study

All security vulnerabilities in Internet Explorer and Microsoft Edge can be prevented if the admin rights are removed per a new report. Removing admin rights results in 94 percent lesser vulnerability in Windows 10 as well.

Security February 27, 2017

Cloudflare Leak: How Bad Is CloudBleed And What You Should Do

You might have heard of the Cloudflare leak and you might be worried if you're affected by Cloudbleed. Here are the details you need to know.

Security February 25, 2017

Cloudbleed: Cloudflare Parser Bug Leaks Passwords, Cookies, IP Addresses, And More Data

Cloudflare has acknowledged that a bug in its code caused a massive data leak, but it acted promptly to address the issues. The company says it found no evidence that hackers exploited the leaked data.

Security February 24, 2017

Spyslide, The 'Elegant' Webcam Cover That Protects Your Privacy

A company from the Netherlands has developed a way of ensuring webcam security. It has created Spyslide that can attach to the webcam, letting the user open and close the lens of of the device at will.

Security February 23, 2017

U.S. Homeland Security Employees Get Locked Out Of Computer Networks, Officials Blame President's Day: Report

Several employees of the U.S. Homeland Security in Washington D.C. and Philadelphia found themselves unable to login to the agency's computer networks. Due to the glitch, information systems could not validate personal identity verification (PIV) cards.

Security February 23, 2017

Kaspersky Announces KasperskyOS Aimed At Industrial Control Systems, Network Devices And More

To curb cyberattacks, Kaspersky has come up with a new solution. KasperskyOS, the operating system from the cyber security and anti-virus provider, would help users safeguard their devices from cyberattacks.

Security February 21, 2017

Bioterrorism Could Kill More Than Nuclear War: Bill Gates

Bill Gates has warned at the Munich Security Conference that bioterrorism could kill more people than nuclear warfare. The next epidemic could originate on the computer screen of a terrorist bent on using genetic engineering, he warns.

Security February 20, 2017

Hackers Used Eavesdropping Malware To Spy On Ukranian Businesses, Security Experts Reveal

A malware named “Operation BugDrop” has been used by the hackers for collecting information and data from Ukrainian business. The bug was first discovered by intelligence firm CyberX.

Security February 19, 2017

My Friend Cayla Is A Spy, Parents Advised To Destroy Doll

The Wi-Fi-connected My Friend Cayla doll could be used by hackers to spy on children, so has been banned in Germany with parents advised to destroy the to

Security February 17, 2017

Android Security: How Google Scans Billions Of Apps To Keep Malware At Bay

Android Security has an overwhelming task to keep the Android Universe free from malware. We look at how the company is able to handle this daunting task.

Security February 28, 2017

How Hackers Used 'Forged Cookies' To Access Yahoo Accounts: No Password Needed [Analysis]

Yahoo reveals new information regarding the 2015 and 2016 data breach, and it should make users really worried. Counterfeit cookies were used to breeze through security protocols.

Security February 19, 2017

Microsoft Chief Now Wants Digital Geneva Convention To Set Rules For Cyberwar

Microsoft's president said that civilians and private companies deserve to be protected amid the escalation of cyberwar. He explained that attacks are no longer perpetrated for financial gain but also with intent to cripple enemy states.

Security February 15, 2017

Vending Machines Lead Attack That Held University Internet Hostage: Verizon Report

A hacker used vending machines and other internet-connected devices to carry out a botnet attack on a still unidentified U.S. university. Using a malware, 5,000 IoT devices were corrupted to do the culprit's bidding.

Security February 14, 2017

NSA Contractor Steals Over 50 TB Of Government Data

An NSA Contractor who reportedly stole more than 50 TB of highly classified data over a period of 20 years has been indicted by a jury. The accused faces up to 10 years of imprisonment for each of the 20 counts against him.

Security February 9, 2017

Cybersecurity: SonicWall Threat Report Shows Malware Slightly Dropped, But Ransomware Surged In 2016

Cybersecurity company SonicWall released its latest global cyber threat report for 2016, detailing the state of cybersecurity. According to the report, malware saw a slight drop, but ransomware surged tremendously.

Security February 8, 2017

Smart TV Tracking You? Here's How To Stop It From Spying On You

Your smart TV tracking you isn't really a big surprise, but that doesn't mean it's OK. Here are a few ways to stop it from spying on you and keeping tabs on your viewing habits.

Security February 8, 2017

US House Passes Email Privacy Act: Requires Warrant Before Authorities Can Probe Your Emails

The U.S. House passed the Email Privacy Act Monday, which seeks to modernize an age-old an online privacy law permitting probes sans warrants for some emails. It remains to be seen whether the bill stalls in the Senate.

Security February 7, 2017

Samsung Smartphone Battery Safety Efforts To Be Monitored By South Korea Government

The South Korean government will be strictly monitoring battery safety inspections for Samsung and other OEMs to ensure that the Galaxy Note 7 debacle is not repeated. Inspections would be conducted by the government before launch of any device.

Security February 6, 2017

Credit Card Theft Moves Online As Chip Technology Thwarts In-Store Criminal Efforts

Millions of credit cards in the United States have been turned into 'smart cards' or those equipped with EMV technology. Criminals, however, have easily adapted and moved their operations online.

Security February 2, 2017

What Is The Best VPN?

Tech Times looks into some Virtual Private Networks to determine how good its service is and what makes it a good choice. Find out which VPNs made the cut

Security January 29, 2017

1 2 3 4 5 6  »
Real Time Analytics