Please turn on your JavaScript for this page to function normally.
Malicious Google Chrome clone eFast serves ads, collects info

A Google Chrome lookalike browser dubbed eFast is being actively pushed onto users. The software is at best annoying and unwanted, and at worst can lead users to …

Oracle releases 154 fixes, plugs click-to-play bypass Java flaw used in attacks

Oracle has released its quarterly patch update that contains 154 security fixes for its various products.What will interest end users the most are the fixes released for Java, …

Western Digital self-encrypting hard drives are completely insecure

A team of researchers has decided to check whether the encryption offered by Western Digital’s My Passport external self-encrypting hard drives is effective and …

Criminals hacked chip-and-PIN system by perfecting researchers’ PoC attack

When in 2010 a team of computer scientists at Cambridge University demonstrated how the chip and PIN system used on many modern payment cards can be bypassed by making the POS …

Private email account of CIA Director compromised by teenage hackers?

CIA Director John Brennan apparently got his private AOL email account hacked, and the attackers revealed that it contained information that shouldn’t have been there: …

250+ iOS apps offered on Apple’s App Store found slurping user data

The latest instance of potentially malicious apps tricking Apple App Store’s vetting process comes courtesy of Youmi, a China-based mobile advertising provider whose …

A slew of LTE 4G vulnerabilities endanger Android users and mobile carriers

As an ever increasing number of mobile carriers around the world switches to from using GSM/UMTS networks to Long-Term Evolution (LTE 4G) ones, both carriers and users are …

IS hackers are attacking the US energy grid

The US energy grid is under cyber attack from Islamic State hackers but fortunately, these attacks end up in failure because the hackers are simply not skilled enough to do …

Cops are turning to privately held DNA databases for info to help with investigations

For those people who are worried about privacy and know how these things usually work out, the fact that Ancestry.com and 23andMe offered DNA analyzing services for genealogy …

Emergency Flash update plugs zero-day exploited in the wild

Adobe released a Flash Player update to fix the zero-day vulnerability that has been spotted being exploited by Pawn Storm hackers.The latest version of Flash Player for …

Facebook starts warning users of state-sponsored attacks against their accounts

Facebook will begin alerting its users when their account is being targeted or compromised by an attacker suspected of working on behalf of a nation-state.“While we have …

Point-and-shoot weapon stops drones without destroying them

Unmanned aerial vehicles – so-called drones – can be helpful, malicious, or simply disruptive, depending on the intentions of those who use them.But while regular …

Don't miss

Cybersecurity news