Please turn on your JavaScript for this page to function normally.
Chrome plugin aims to thwart user profiling efforts

Inspired by a piece of fictional software described in Cory Doctorow’s book Little Brother, developer Ben West created a browser plugin that should, in theory, make it …

New Zeus variant creates bogus Instagram accounts

If you are familiar with the results of a recently finished study regarding online content popularity that concluded that “likes” beget “likes”, the …

LastPass bug leaks plain text passwords

Users of popular password manager LastPass have been advised to update to the latest version of the software, which incorporates a patch for a recently discovered bug that …

Lavabit owner risks arrest for not complying with surveillance order

The incessant revelations fueled by the documents leaked by NSA whistleblower Edward Snowden have made people reevaluate their expectations of privacy and their beliefs on …

Firm found using browser plugins to inject unauthorized ads on YouTube

Sambreel, a California-based firm that nearly two years ago has been found using browser plugins to deliver ads by injecting them into Facebook and Google pages, is up to its …

NSA internal audit reveals thousands of privacy violations

An internal NSA audit document and several other seen by The Washington Post journalists prove that there have been over a 1,000 violations of FISA and presidential executive …

Google delivers patch for Android SecureRandom implementation

An Android security engineer has again confirmed the existence of the vulnerability that made the most popular Bitcoin wallet apps for the platform open to attack, and offered …

Cross-platform Frutas RAT delivered via targeted emails

The cross-platform Frutas RAT is being used in a new email phishing campaign targeting high-profile finance, mining, and telecom companies as well as governments in Europe and …

Practical Anonymity: Hiding in Plain Sight Online

With the recent surveillance scandals tied to the NSA, you can no longer be deemed paranoid or believe yourself to be overreacting if you want to find a way of keeping your …

Joomla exploit doing rounds, users advised to update

Users who run their sites own sites and use the Joomla CMS but haven’t updated it in a while should do so immediately if they don’t want to see their sites …

Cyber crooks misuse Google service to control Android Trojans

Cybercriminals have been spotted using a novel method of controlling Android mobile malware: a legitimate service called Google Cloud Messaging. GCM has been created to allow …

Hacker hijacks baby monitor camera, terrorizes family

A Houston, Texas couple got a great shock this weekend when they heard a male voice coming from a room where their two year old was sleeping. They heard the man shouting to …

Don't miss

Cybersecurity news