|
Last night, I reached home after a rather long day. One of the only indulgence I can afford in my busy schedule is some online streaming. It's my personal choice to reject piracy, and pay for legal consumption. I don't run pirated software, visit websites that may not be secure, or trustworthy. I follow hygiene
Eli Biham and Lior Neumann from the Israel Institute of Technology have identified a Bluetooth vulnerability that has the potential to allow a nearby hacker to gain unauthorized access to your device. The published research paper on the CERT website says that the encryption vulnerability in the Bluetooth firmware implementation affects devices from vendors like
There were on average five new threat samples every second that resulted in a massive 629 per cent growth in cryptojacking and other cryptocurrency mining malware in the first quarter of 2018, a new report said on Thursday. The coin miner malware grew a stunning 629 per cent to 2.9 million in the first quarter
Mozilla has announced a partnership with HaveIBeenPwned.com (HIBP) for a new security tool for Firefox web browser. The company announced that the details about the security tool Firefox Monitor in a post on Mozilla blogs website. According to the post, the company is testing user interest in the security tool that allows users to check
Wi-Fi devices follow a security protocol that makes it secure, which is to say that it will keep freeloaders that want to steal your internet out. The simplest way to explain this is that it creates a security protocol that only allows people with the key to gain access. For the time being, most home
With more than three million hits globally in the first five months of this year, cryptojacking, a form of cyber-attack in which hackers hijack the infected system's processing power to mine cryptocurrency, is fast emerging as an alternative to ransomware, according to IT security firm Quick Heal. The number of mobile cryptojacking malware variants has
Apple has always been a bit of a fanatic when it comes to the security its devices provide. And this has cost them by attracting more attention from hackers and security experts than most other companies. And primary among these devices are the iPhones, because it is the most prevalent Apple product on the market.
An independent security researcher has discovered a security flaw in the OnePlus 6 that exploits an issue in the bootloader to give a potential hacker access to your phone. Jason Donenfield of Edge Security LLC, a security firm based in the United States, has discovered a vulnerability on the OnePlus 6 that allows anyone with
If you've been under the impression that your secure emails client is keeping you safe, then it's time to rethink your privacy strategy. In case you have been relying on PGP or S/MIME to keep your email safe, then you need to stop using them right away. A group of European researchers have discovered vulnerabilities
Nearly 57 percent Indian IT managers can't identify network traffic while 61 per cent dont know how their bandwidth is consumed, a new report said on Wednesday, adding that the majority of Indian IT managers have legal liabilities when it comes to unidentified traffic at their workplaces. According to British IT security company Sophos' global
Google has released its Android Security 2017 Year in Review report, further highlighting how it is closing gap to Apple's iOS in security aspect of the mobile operating system. This is the fourth annual report on Android security and it details various improvements to Google's security offerings for the mobile operating system. One of the
McAfee, the company behind the popular antivirus going by the same name, has acquired virtual private network (VPN) provider TunnelBear. The terms of the deal were not revealed by the company but it is a major acquisition for the Canada-based VPN company. TunnelBear based in Toronto was founded in 2011 and has gained a strong
Nearly half of the IT security professionals, 46 per cent, failed to change their security strategy substantially even after experiencing a cyber-attack, according to the information by the security company, CyberArk. This level of cyber security inertia and failure to learn from past incidents puts sensitive data, infrastructure, and assets at risk, CyberArk's "Global Advanced
Researchers have developed a new system that uses JavaScript decryption algorithms embedded in web pages to patch security holes left open by web browsers' private-browsing functions. Researchers from Massachusetts Institute of Technology (MIT) described the system "Veil" that makes private browsing more private, at the Network and Distributed Systems Security Symposium in San Diego. "We
Revealing that industrial companies were not moving quickly to adopt cyber security measures to protect their data and operations, a study on Friday said 45 per cent of those surveyed lacked a reliable enterprise leader for cyber security. Software-industrial company Honeywell polled 130 strategic decision makers from industrial companies about their approach to the Industrial
It is nearly impossible to ascertain the number of active devices in the world that features Bluetooth connectivity. All these devices though are at risk, and the reason behind it is a Bluetooth flaw.
Indians on the web cannot resist free Wi-Fi and 51 percent of them log into public networks as soon as they can spot one, says Norton's latest Wi-Fi Risk Report. About 74 percent of India's public Wi-Fi users believe that their information is safe. And they are willing to follow any instruction like clicking on a link or opening an attachment or watching a video to access free public Wi-Fi.
Amid growing concerns around users privacy online, Kaspersky Lab has introduced its new patented technology that prevents someone from snooping through microphone data on Windows devices. The company has included the technology in its home solutions, Kaspersky Internet Security and Kaspersky Total Security.
If you think that the popular pattern lock system in Android smartphones is the best option to safeguard your device, you are mistaken as security researchers have found that it takes just five attempts to break into Android devices. Pattern lock is a security measure that protects mobile phones or tablets. However, users only have five attempts to get the pattern right before the device becomes locked. It is used by around 40 percent of Android device owners.
At a time when privacy has become a major issue, scientists from Germany have developed a Google Glass-based biometric system that uses the skull to provide access to devices. Computer scientists from the University of Saarland and the University of Stuttgart in Germany has introduced a new system "SkullConduct" which uses the skull to provide a digital access code which could be used to secure smartphones.