Category: Security
-
Webinar for Consumers on Tax Identity Theft | Federal Trade Commission
During tax time, there are a lot of clever people who use their powers for evil waiting to take advantage of you. Here is one tool to fight back. As part of National Tax Identity Theft Awareness Week, AARP’s Fraud Watch Network and AARP Foundation Tax-Aide are joining forces with federal agencies to highlight the…
-
Beware! This Is The Smartest Gmail Phishing Attack You’ll Ever Encounter
Gmail phishing is one of most common methods used by hackers to compromise the online security of naive users. But, a recent Gmail phishing attack, uncovered by Wordfence, mimics your past conversations and succeeds in fooling the tech-savvy netizens. …. How does this scary Gmail phishing attack work? This phishing attack first compromises a victim’s…
-
Rule 41 — FBI Gets Expanded Power to Hack any Computer in the World
You just think this doesn’t apply to you. It will in the very near future… Are you LGBT, a person of color, have a religious preference other than Christianity, an advocate, a social reformer, a community leader, in the government, or ??? You will be losing your privacy rights. Hacking multiple computers across the world…
-
Dangerous Rootkit found Pre-Installed on nearly 3 Million Android Phones
Luckily, not many US Android phones. Just a matter of time before manufacturers install rootkits as a matter of course. Nearly 3 Million Android devices worldwide are vulnerable to man-in-the-middle (MITM) attacks that could allow attackers to remotely execute arbitrary code with root privileges, turning over full control of the devices to hackers. According to…
-
iPhone Secretly Sends Your Call History to Apple Even If iCloud Backups are Turned Off
In the fight against encryption, Apple has positioned itself as a staunch defender of its user privacy by refusing the federal officials to provide encryption backdoors into its products, as well as implementing better encryption for its products. However, a new report from a security firm suggests Apple’s online syncing service iCloud secretly stores logs…
-
Adobe Flash Hacked in 4 Seconds, Safari Pwned In Less Than Half Minute
Most software vendors do not take security very seriously. This was a huge wake-up call to the world at large. PwnFest 2016 has become a death call for many software vendors. The hackers have managed to take down Apple’s Safari web browser in 20 seconds using a root privilege escalation zero-day. Another team managed to compromise Adobe…
-
Shadow Brokers reveals list of Servers Hacked by the NSA
Please take note of the following line: “A few target domains were based in Russia, and at least nine domains include .gov websites.” Yes, the NSA is hacking our own government… At what point is an agency deemed out of control? The hacker group calling itself the Shadow Brokers, who previously claimed to have leaked…
-
Google discloses Critical Windows Zero-Day that makes all Windows Users Vulnerable
Users are advised to update their Flash software now and apply Windows patches as soon as they become available. Google has once again publicly disclosed a zero-day vulnerability in current versions of Windows operating system before Microsoft has a patch ready. Yes, the critical zero-day is unpatched and is being used by attackers in the…
-
“10 Immutable Laws of Security” That Every Geek Must Know
More than a 10 years ago, Microsoft shared its Ten Immutable Laws of Security that outlined Microsoft’s security principles. These laws were considered its basic security primer for newbie computer users. Because of changing technology, in 2011 Microsoft released its version 2.0. Feel free to share with anyone you know who is unclear about basic security principles. Do you know about…