Please turn on your JavaScript for this page to function normally.
A slew of LTE 4G vulnerabilities endanger Android users and mobile carriers

As an ever increasing number of mobile carriers around the world switches to from using GSM/UMTS networks to Long-Term Evolution (LTE 4G) ones, both carriers and users are …

IS hackers are attacking the US energy grid

The US energy grid is under cyber attack from Islamic State hackers but fortunately, these attacks end up in failure because the hackers are simply not skilled enough to do …

Cops are turning to privately held DNA databases for info to help with investigations

For those people who are worried about privacy and know how these things usually work out, the fact that Ancestry.com and 23andMe offered DNA analyzing services for genealogy …

Emergency Flash update plugs zero-day exploited in the wild

Adobe released a Flash Player update to fix the zero-day vulnerability that has been spotted being exploited by Pawn Storm hackers.The latest version of Flash Player for …

Facebook starts warning users of state-sponsored attacks against their accounts

Facebook will begin alerting its users when their account is being targeted or compromised by an attacker suspected of working on behalf of a nation-state.“While we have …

Point-and-shoot weapon stops drones without destroying them

Unmanned aerial vehicles – so-called drones – can be helpful, malicious, or simply disruptive, depending on the intentions of those who use them.But while regular …

Data dump points to a breach at Electronic Arts

Account details of some 600 Electronic Arts (EA) customers have apparently been leaked on Pastebin. The company has yet to confirm whether the leak is genuine. “At this …

Cyber warfare fears spur US Navy to teach celestial navigation again

After Sony was hacked and the stolen emails leaked, some US companies began urging workers to revert to using phone calls and face-to-face meetings for sensitive discussions. …

Attackers can use Siri, Google Now to secretly take over smartphones

A team of researchers from the French Network and Information Security Agency (ANSSI) has devised a way to covertly exploit the Siri and Google Now voice activated personal …

USB Killer 2.0: A harmless-looking USB stick that destroys computers

Plugging in random USB sticks in your computer has never been more dangerous, as a researcher who goes by the name Dark Purple has demonstrated his new device: USB Killer …

Microsoft fixes critical flaws in all versions of Windows and Office

This month’s Microsoft Patch Tuesday brings fixes for 33 vulnerabilities. Nearly half of those are found in Internet Explorer, and most of them are critical as they …

Hackers are exploiting zero-day flaw in fully patched Adobe Flash

Adobe has released on Tuesday security updates that address multiple vulnerabilities in Reader, Acrobat, and Flash Player. Unfortunately, among the holes plugged in Flash …

Don't miss

Cybersecurity news