FREAK security flaw exposes millions of Apple and Google users to Hacking

FREAK Vulnerability

Cryptographers have unearthed a security flaw in OpenSSL that exposes millions of internet users to Man in the middle attacks when accessing secured websites. The Security flaw initially introduced by US government in the 90’s is easy to exploit requiring only an internet connection and few man hours to spare. A FREAK Security flaw in …

Read moreFREAK security flaw exposes millions of Apple and Google users to Hacking

Google Project Zero Strikes Again and Reveals Breaches in Apple OS X

Google Project Zero Reveals Breaches Apple OS X

The thoroughly knowledgeable team of experts in cybersecurity called Google Project Zero works toward identifying vulnerabilities in software and companies’ products altogether. After Microsoft, Apple OS X has been under scrutiny and three vulnerabilities have been found. (Supplied) Google Project Zero is the elite, high-tech team of the prestigious company that has united hackers and …

Read moreGoogle Project Zero Strikes Again and Reveals Breaches in Apple OS X

Looking to the Future; What Becomes of Privacy Online when Everything Goes Online?

What Becomes of Privacy Online

The rate at which internet technology is evolving is very high and now internet experts are concerned what will become of privacy when everything goes online. By everything we mean the house lock to the door bell right to the toilet bowl and everything else that people use on a daily basis. Science fiction? Well, …

Read moreLooking to the Future; What Becomes of Privacy Online when Everything Goes Online?

Switching Your Devices Off Just Might Not Be Enough to Avoid Hacking, GIT

Switching Your Devices Off not Avoid Hacking

Setting your device offline is not enough to prevent leaks, which can lead to the hacking of laptops or mobile phones, according to research from GIT. Experts have discovered that there are enough leaks coming from offline devices, such as laptops or smartphones, which can alert hackers and result in data interception. Studies are being …

Read moreSwitching Your Devices Off Just Might Not Be Enough to Avoid Hacking, GIT

Silk Road Reloded Switches from Tor to I2P, Accepts Alternative Cryptocurrencies

Silk Road Reloded Switches from Tor to L2P

The underground market called the Silk Road Reloaded has moved from the I2P network. The website is also accepting cryptocurrencies like dogecoin, anoncoin and litecoin. The website is a recreation of Silk Road 2 which itself is a recreation of the original Silk Road. The Silk Road was founded with the aim of allowing free …

Read moreSilk Road Reloded Switches from Tor to I2P, Accepts Alternative Cryptocurrencies

Security Predictions for 2015: 8 Major Threats Ahead as we Enter the New Year

Security Predictions for 2015

Now that 2015 is practically on our doorstep, it is worth taking the time and reminiscing on what has already been done in the field of security. There are several breakthroughs that have been made, causing grave changes to the concept of online security. The Internet of Things has become more apparent and the aspects …

Read moreSecurity Predictions for 2015: 8 Major Threats Ahead as we Enter the New Year

People Still a Major Threat in Cyber Security, Study

People Still Major Cyber Security Threat

Similar to most other notable security breaches of 2014, recent email leaks from Sony hack brought the issue of cyber security into spotlight. In the aftermath of the hack, one cannot fail to notice how only when such an event occurs, everybody suddenly seems to become aware of the threat that lies in wait in …

Read morePeople Still a Major Threat in Cyber Security, Study

Companies Absorbing Hackers to Secure the Internet of Things

Absorbing Hackers to Secure the Internet

As Cybercrime grows in complexity and sophistication, the corporate world is increasingly hiring White hat hackers to join the defense side of the cybercrime equation. While the strategy may be a move the right direction, experts believe the war against cybercrime will only be won if these researchers are fully involved in every stage of …

Read moreCompanies Absorbing Hackers to Secure the Internet of Things

Vulnerabilities in Alibaba eCommerce Site Compromised Security of Millions

Alibaba Group Site Vulnerabilities

Numerous vulnerabilities in Alibaba’s eCommerce platform compromised the account details of millions of Merchants and shoppers according to Israel cyber security Experts. Alibaba has patched up the flaws and is urging its customers to update their accounts accordingly. If you can’t afford a $600 product from an online store, why not change the price to …

Read moreVulnerabilities in Alibaba eCommerce Site Compromised Security of Millions

Yik Yak Anonymous Messaging App Easily Hacked by a Young Researcher

Yik Yak Messaging App Easily Hacked

Researcher at SilverSky Labs unearthed a vulnerability in Yik Yak iOS messaging App leveraging on the anonymous feature of the App. Exploiting the vulnerability would allow a hacker to reveal the reveal identity of the Yik Yak user, read previous posts and send new messages. Following a string of embarrassing privacy scandals sparked by Edward …

Read moreYik Yak Anonymous Messaging App Easily Hacked by a Young Researcher