<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>
A severe vulnerability in Signal desktop app allowing hackers to steal chats in plaintext without any user interaction
A severe vulnerability in Signal desktop app allowing hackers to steal chats in plaintext without any user interaction
21 May, 2018

A team of white hat hackers has revealed a code injection vulnerability that could have been exploited by remote attackers to inject a malicious payload inside the signal desktop app running on the recipients' system just by sending them a specially crafted link - without requiring any user interaction.

Read Details
Cambridge Analytica and Facebook Controversy: What happened so far?
Cambridge Analytica and Facebook Controversy: What happened so far?
16 Apr, 2018

The Facebook controversy seems to be a never ending one. Facebook has been facing a tough time for the alleged data leak controversy with Cambridge Analytica from past few weeks now. The allegation is quite serious. Let’s see what this controversy is about and what happened so far.

Read Details
Equifax identifies an additional 2.4 million U.S. consumers affected by the massive data breach of 2017
Equifax identifies an additional 2.4 million U.S. consumers affected by the massive data breach of 2017
06 Mar, 2018

The credit reporting firm Equifax Inc. suffered a massive data breach in 2017 that exposed the identities of about 146 million US consumers. It is still considered as one of the worst data breaches of 2017.

Read Details
Severe flaw in µTorrent can let hackers to control your PC remotely
Severe flaw in µTorrent can let hackers to control your PC remotely
28 Feb, 2018

World's most popular torrent download software µTorrent has been detected with multiple security flaws. If you have this software installed on your computer, it's time to download its latest version for windows as soon as possible.

Read Details
Cyber Criminals are turning into Cryptominers, Dominating Cyber Threat Landscape
Cyber Criminals are turning into Cryptominers, Dominating Cyber Threat Landscape
15 Feb, 2018

According to Check Point, during the period July to December 2017, one in five Organizations are affected by crypto mining malware, tools that enable cybercriminals to hijack the victim's CPU or GPU power and existing resources to mine cryptocurrency, using as much as 65% of the end-users CPU power.

Read Details
Android Banking Trojan targets over 232 banking apps, including Indian banks
Android Banking Trojan targets over 232 banking apps, including Indian banks
30 Jan, 2018

Banks are warning customers of the risk of their mobile banking credentials being stolen by malware masquerading as a Flash player sent to them through unwarranted messages or through pop-ups on websites.

Read Details
Private end-to-end encrypted Whatsapp group chats are not secured anymore!
Private end-to-end encrypted Whatsapp group chats are not secured anymore!
29 Jan, 2018

Security researchers discovered a vulnerability in Whatsapp & Signal which allows anyone who controls the servers to covertly add new members in a private group.

Read Details
Top Cyber Attacks In 2017
Top Cyber Attacks In 2017
21 Dec, 2017

As 2017 is coming to an end, and if you think you have seen it all then you are wrong. Observations and predictions are saying cyber crimes will be proliferating rapidly in the coming years as we are becoming increasingly dependent on technology.

Read Details