MENU

Security

UK Wants WhatsApp Backdoor Access Amid Privacy And Security Concerns

The UK's bid to gain access to WhatsApp following the London attack has stirred another round of controversy in the encryption debacle. WhatsApp uses end-to-end encryption to secure communication and a backdoor would create a dangerous security loophole.

Security March 28, 2017

UK Government Wants Access To WhatsApp: 'There Should Be No Place For Terrorists To Hide'

United Kingdom Home Secretary Amber Rudd is calling for WhatsApp and other encrypted communication services to open up their platforms to intelligence teams. Last week, the man behind the London incident checked his WhatsApp account shortly before the attack.

Security March 27, 2017

GiftGhostBot Steals Gift Card Balances From Consumers' Accounts

Distil Networks identified a major threat to online businesses dubbed GiftGhostBot. The bot stole money from customers' gift card accounts and caused distress to retailers.

Security March 25, 2017

Apple On Latest WikiLeaks CIA Documents: No Worries, Exploits Have Long Been Patched

WikiLeaks has dumped a new set of CIA hack documents, detailing how the government breached into Macs and iPhones. Apple has issued a statement in response, arguing that it 'does not condone theft' and those exploits were patched long ago.

Security March 24, 2017

WikiLeaks Exposes CIA Tools Targeting MacBooks And iPhones: Here's What They Do

WikiLeaks has released Dark Matter, the second part of the series of documents containing hacking and surveillance tools developed by the CIA. The tools described in Dark Matter target the Mac computers and iPhones of Apple.

Security March 24, 2017

US To Ban Laptops And Tablets On Flights From African And Middle Eastern Countries, 10 Airports Affected

Passengers coming from select countries to the United States will be required to get their electronic gadgets screened at airports,before boarding. Gadgets bigger than mobile phones will reportedly have to undergo a security check.

Security March 22, 2017

Intel Kicks Off Bounty Program: Reward Of Up To $30,000 For Spotting Hardware Vulnerabilities

Intel has launched its first bug bounty program to secure its hardware, software and firmware. Researchers are encouraged to discover faults in Intel's systems and can get a reward of up to $30,000 for finding vulnerabilities.

Security March 17, 2017

Like McDonald’s, You Could Fall Victim To Hacking: Tips To Protect Your Twitter Account

Twitter has always been an easy target for online privacy breaches, given the large size of its users and the ease at which tweets can be spread. Here are the steps to keep your Twitter account secure.

Security March 17, 2017

WhatsApp And Telegram Allowed Hackers To Hijack Accounts With Just 1 Image: Here's What Happened

WhatsApp and Telegram, two messaging apps renowned for their security, had a severe security flaw that left 'hundreds of millions of accounts' exposed. Check Point Security researchers recently notified the two companies and both WhatsApp and Telegram have since patched the vulnerability.

Security March 15, 2017

4 Hackers To Be Charged For Yahoo Data Breaches, Report Claims: Are They Connected To Russia?

The Department of Justice is accusing four people of being participants in the hacking attacks launched against Yahoo. The data breaches, which affected over a billion users, were previously claimed to be connected with the Russian government.

Security March 15, 2017

Hackers Can Use Sound Waves To Crack Your Smartphones, Scientists Suggest

A study reveals the ways through which hackers can use sound waves to crack a smartphone. A minor mistake can enable someone to easily enter the operating system of electronic devices.

Security March 14, 2017

Stop Reusing Or Rotating Passwords, They Are Easy To Crack

Data scientists found that reusing passwords leaves the user vulnerable to hacking. They also revealed that even the most complex passwords of 10 characters can be compromised in a month using hacking programs.

Security March 14, 2017

New Android Smartphones Found To Be Already Infected By Malware: Are You At Risk?

Cybersecurity company Check Point discovered that 38 new Android devices came pre-installed with malware and ransomware. The findings raised fresh concerns on Android security, and here is what you can do to avoid the risk.

Security March 12, 2017

Worried About Privacy Breaches? Here Are Cybersecurity Tips To Lock Out Intruders

Cyberattacks and privacy breaches have worried many about the safety and security of their IoT devices. Here are a few tips that can ease your worries about cybersecurity.

Security March 12, 2017

Popular Messaging Apps WhatsApp, Signal, iMessage, And More Reportedly Safe From CIA Hacking Tools

The recent string of reports pertaining to a WikiLeaks document dump alleging the CIA’s hacking tools caused a fit of unrest over data security. Reports of CIA being able to bypass encrypted messaging apps, however, are apparently overblown.

Security March 11, 2017

WikiLeaks CIA Hack Leak Raises Privacy Concerns: How To Stay Protected

The WikiLeaks CIA hack reveal raised some serious privacy and security concerns, making us wonder whether any of our devices are safe from spying. If you're worried about hacks, here's how to keep your device protected.

Security March 10, 2017

Fortune 1000 Companies Two Times More Prone To Data Breaches, Says Report

Fortune 1000 companies experience double the security breach compared to its peers. The report from BitSight took into consideration the levels of cybersecurity performance of Fortune 1000 companies.

Security March 9, 2017

WikiLeaks Dump: Should You Be Worried About The CIA Cyber Hacks?

Another spying scandal has hit the CIA, this time with the massive cybersecurity documents exposed by WikiLeaks. The documents contain information regarding spying and hacking efforts done by the agency, an issue that can put it at loggerheads with the tech industry.

Security March 8, 2017

WikiLeaks Exposes CIA Spying Tools: Smartphones, Computers, Even Internet-Connected TVs Compromised

WikiLeaks has uploaded Vault 7, which are thousands of documents that claim to expose the hacking tools used by the Central Intelligence Agency. The general public, however, should not hit the panic button just yet.

Security March 7, 2017

Spammergate: 1.4 Billion Email Addresses And User Details Found Online As Spammers' Backups Leak

A spam operation called River City Media spilled 1.4 billion email addresses and user details because its backups were poorly secured. The collection of files includes real names, physical addresses, IP addresses and even RCM's internal files and chat logs.

Security March 7, 2017

Data From Electronic Toys Leaked, Adds To List Of Hacker Vulnerable Devices

CloudPets join the ranks of toys targetted by hackers. Multiple toy hacking incidents add children's toys to the list of hacker-vulnerable devices along with medical devices and smart home appliances.

Security March 3, 2017

CloudPets Exposes Danger Of Internet-Connected Toys: What Can Parents Do To Keep Safe?

Security researcher Troy Hunt discovered that the internet-connected CloudPets presented a major security threat to parents and children. What can parents do to keep themselves and their children safe?

Security February 28, 2017

CloudPets Toys Expose 2 Million Messages Due To Unsecured Server, Hackers Held Data For Ransom

Hackers successfully accessed and deleted CloudPets user information before asking for ransom to restore the files. The data was reportedly stored in an unsecure server, exposing millions of children's messages.

Security February 28, 2017

Cloudflare Leak: How Bad Is CloudBleed And What You Should Do

You might have heard of the Cloudflare leak and you might be worried if you're affected by Cloudbleed. Here are the details you need to know.

Security February 25, 2017

Cloudbleed: Cloudflare Parser Bug Leaks Passwords, Cookies, IP Addresses, And More Data

Cloudflare has acknowledged that a bug in its code caused a massive data leak, but it acted promptly to address the issues. The company says it found no evidence that hackers exploited the leaked data.

Security February 24, 2017

U.S. Homeland Security Employees Get Locked Out Of Computer Networks, Officials Blame President's Day: Report

Several employees of the U.S. Homeland Security in Washington D.C. and Philadelphia found themselves unable to login to the agency's computer networks. Due to the glitch, information systems could not validate personal identity verification (PIV) cards.

Security February 23, 2017

Bioterrorism Could Kill More Than Nuclear War: Bill Gates

Bill Gates has warned at the Munich Security Conference that bioterrorism could kill more people than nuclear warfare. The next epidemic could originate on the computer screen of a terrorist bent on using genetic engineering, he warns.

Security February 20, 2017

Hackers Used Eavesdropping Malware To Spy On Ukranian Businesses, Security Experts Reveal

A malware named “Operation BugDrop” has been used by the hackers for collecting information and data from Ukrainian business. The bug was first discovered by intelligence firm CyberX.

Security February 19, 2017

My Friend Cayla Is A Spy, Parents Advised To Destroy Doll

The Wi-Fi-connected My Friend Cayla doll could be used by hackers to spy on children, so has been banned in Germany with parents advised to destroy the to

Security February 17, 2017

Android Security: How Google Scans Billions Of Apps To Keep Malware At Bay

Android Security has an overwhelming task to keep the Android Universe free from malware. We look at how the company is able to handle this daunting task.

Security February 28, 2017

How Hackers Used 'Forged Cookies' To Access Yahoo Accounts: No Password Needed [Analysis]

Yahoo reveals new information regarding the 2015 and 2016 data breach, and it should make users really worried. Counterfeit cookies were used to breeze through security protocols.

Security February 19, 2017

Microsoft Chief Now Wants Digital Geneva Convention To Set Rules For Cyberwar

Microsoft's president said that civilians and private companies deserve to be protected amid the escalation of cyberwar. He explained that attacks are no longer perpetrated for financial gain but also with intent to cripple enemy states.

Security February 15, 2017

Vending Machines Lead Attack That Held University Internet Hostage: Verizon Report

A hacker used vending machines and other internet-connected devices to carry out a botnet attack on a still unidentified U.S. university. Using a malware, 5,000 IoT devices were corrupted to do the culprit's bidding.

Security February 14, 2017

Cybersecurity: SonicWall Threat Report Shows Malware Slightly Dropped, But Ransomware Surged In 2016

Cybersecurity company SonicWall released its latest global cyber threat report for 2016, detailing the state of cybersecurity. According to the report, malware saw a slight drop, but ransomware surged tremendously.

Security February 8, 2017

Smart TV Tracking You? Here's How To Stop It From Spying On You

Your smart TV tracking you isn't really a big surprise, but that doesn't mean it's OK. Here are a few ways to stop it from spying on you and keeping tabs on your viewing habits.

Security February 8, 2017

US House Passes Email Privacy Act: Requires Warrant Before Authorities Can Probe Your Emails

The U.S. House passed the Email Privacy Act Monday, which seeks to modernize an age-old an online privacy law permitting probes sans warrants for some emails. It remains to be seen whether the bill stalls in the Senate.

Security February 7, 2017

Credit Card Theft Moves Online As Chip Technology Thwarts In-Store Criminal Efforts

Millions of credit cards in the United States have been turned into 'smart cards' or those equipped with EMV technology. Criminals, however, have easily adapted and moved their operations online.

Security February 2, 2017

What Is The Best VPN?

Tech Times looks into some Virtual Private Networks to determine how good its service is and what makes it a good choice. Find out which VPNs made the cut

Security January 29, 2017

Which Is The Safest Among Microsoft Edge, Google Chrome And Mozilla Firefox?

A study shows that Microsoft Edge is the safer browser to use for Windows 10 users. Read on to find out if this claim is true.

Security January 29, 2017

BEWARE: Hackers Can Crack The Pattern Lock On Your Android Device In 5 Attempts

Android users who are using a pattern lock to secure their device might want to change the way they lock their phones. A group of researchers says that the Android pattern lock system can be dismantled within 5 attempts.

Security January 29, 2017

Watch Out For SpyNote RAT, Poses As Netflix App To Steal Your Data

A new spyware dubbed SpyNote RAT mimics the Netflix app with the purpose of stealing user data. Using the spyware, hackers can eavesdrop on a user's conversations, view contact lists, and files stored on the mobile device.

Security January 27, 2017

Kaspersky Lab Security Investigator Charged Of Treason In Russia

Ruslan Stoyanov, Kaspersky Lab’s head of investigation for computer incidents, was arrested in December 2016 on charges of treason. Kaspersky has stated that this arrest will not affect computer incidents' investigation team in any way.

Security January 26, 2017

Trump Still Uses His 'Old, Unsecured Android Phone,' And That's Just Bad

Assumed into office, President Donald Trump still uses an unsecured Android device, The New York Times reported. Experts said that this opens up a number of vulnerabilities.

Security January 26, 2017

‘Anonymized’ Web Browsing Not Actually Anonymous, Finds Princeton Study

New research showed that online browsing on private mode is, actually, not at all private. Corporations such as Twitter, Google, or Facebook can track the identities of the anonymous users, for third-party advertising purposes.

Security January 24, 2017

SEC Investigating Yahoo Over Data Breach

The SEC has been investigating two data breaches which happened at Yahoo in 2013 and 2014. The agency is also determining whether Yahoo complied with the civil security laws with regard to its data breach disclosure.

Security January 23, 2017

1 2 3 4 5 6 7 8  »
Real Time Analytics