6.5 C
London
Wednesday, January 22, 2020
The Australian government has introduced new telco regulations to fight against phone scams.An action plan to prevent telephone scams is expected to be released in November. With mobile scams exposing personal and financial information to the hackers, the government of Australia has decided to...
There has been no shortage of massive security breaches so far this year. Just last July, Capital One disclosed that it was hit by a breach that affected more than 100 million customers. Also recently, researchers came across an unsecured cloud server that contained the...
Reaserchers Jake posted today two new sites have then been undercover to grab your emails and password. This phishing site deceives you to think then it was real from Microsoft official sites because has the same photo in background as Microsoft. But...
Nation-state hackers are exploiting previously disclosed vulnerabilities in VPNs from Pulse Secure, Palo Alto Networks and Fortinet accourding to a security advisor from NSA. The U.S. National Security Agency warned that nation-state threat actors are actively exploiting several VPN vulnerabilities in products from Pulse...
Twitter announced that the phone numbers and email addresses of some users provided for two-factor authentication (2FA) protection had been used for targeted advertising purposes-though the company said it was 'unintentional'. "When an advertiser uploaded their marketing list, we may have matched people on Twitter...
An ex-Yahoo! employee has pleaded guilty to misusing his access at the company to hack into the accounts of nearly 6,000 Yahoo users in search of private and personal records, primarily sexually explicit images and videos. According to an press note released by the U.S. Justice...
The United States government today filed a lawsuit against Edward Snowden, a former contractor for the CIA and NSA government agencies who made headlines worldwide in 2013 when he fled the country and leaked top-secret information about NSA's global and domestic surveillance activities. And...
The Guardian's SecureDrop whistleblower submission site was targeted with a phishing page the attempted to harvest the unique "code names" for sources who submitted information using the service. SecureDrop is a service that media organizations can install on the Tor network in order...
Beware Apple users! Your iPhone can be hacked just by visiting an innocent-looking website, confirms a terrifying report Google researchers released earlier today. The story goes back to a widespread iPhone hacking campaign that cybersecurity researchers from Google's Project Zero discovered...
In the wake of data abuse scandals and several instances of malware app being discovered on the Play Store, Google today expanded its bug bounty program to beef up the security of Android apps and Chrome extensions distributed through its platform. The expansion in...
Cyber-Security is much more than a matter of IT
It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it