Computer security news, opinion, advice and research from anti-virus experts & New Technologies for Computer Security, Sharing the crazy for the betterment of online security

Get 8-Course Online Hacking Training Package For Just $39

Get 8-Course Online Hacking Training Package For Just $39
Due to recent highly publicized hacks and high-profile data breaches, ethical hackers are in huge demand and being hired by almost every industry to help them keep their networks protected.So, it comes as no surprise that ethical hackers, penetration testers, and information security analysts are one of the most well-paid employees in the IT workforce today.There's a growing number of jobs for people with ethical hacking skills. But if you lack behind in this field, you need a good computer h…
Rate this blog entry:
Continue reading
143 Hits
0 Comments

YouTube users be aware: Your viewing habits can be tracked

YouTube users be aware: Your viewing habits can be tracked
It's important to know that video encryption is not as secure as once thought. Google, YouTube's parent company, is not likely to patch the gaps, since it would be prohibitively expensive to create a traffic obfuscation mechanism for every user's every video request.…
Rate this blog entry:
Continue reading
148 Hits
0 Comments

US Charges Two Russian Spies & Two Hackers For Hacking 500 Million Yahoo Accounts

US Charges Two Russian Spies & Two Hackers For Hacking 500 Million Yahoo Accounts
The 2014 Yahoo hack disclosed late last year that compromised over 500 million Yahoo user accounts was believed to be carried out by a state-sponsored hacking group.Now, two Russian intelligence officers and two criminal hackers have been charged by the US government in connection with the 2014 Yahoo hack that compromised about 500 million Yahoo user accounts, the Department of Justice announced Wednesday.According to the prosecutors, at least 30 million accounts were accessed as part of a sp…
Rate this blog entry:
Continue reading
158 Hits
0 Comments

Quantum key system could make mobile transactions far more secure

Quantum key system could make mobile transactions far more secure
For the first time, researchers have demonstrated a prototype device that can send unbreakable secret keys from a handheld device to a terminal.…
Rate this blog entry:
169 Hits
0 Comments

New approach to the quantum measurement problem

New approach to the quantum measurement problem
Quantum mechanics is a probabilistic theory that does not describe individual events. Yet when we perform a single measurement, we find a well-defined outcome. This apparent contradiction, known as the measurement problem, has a long history going back to the early days of quantum mechanics. A research collaboration involving the Institute of Physics proposes a new approach to this problem. The collaboration consists of Armen Allahverdyan (Yerevan Physics Institute, Armenia), Roger Balian (CEA S…
Rate this blog entry:
Continue reading
205 Hits
0 Comments

How One Photo Could Have Hacked Your WhatsApp and Telegram Accounts

How One Photo Could Have Hacked Your WhatsApp and Telegram Accounts
Next time when someone sends you a photo of a cute cat or a hot chick on WhatsApp or Telegram then be careful before you click on the image to view — it might hack your account within seconds.A new security vulnerability has recently been patched by two popular end-to-end encrypted messaging services — WhatsApp and Telegram — that could have allowed hackers to completely take over user account just by having a user simply click on a picture.The hack only affected the browser-based versions of…
Rate this blog entry:
Continue reading
164 Hits
0 Comments

Early warning system for mass cyber attacks

Early warning system for mass cyber attacks
Mass attacks from the Internet are a common fear: Millions of requests in a short time span overload online services, grinding them to a standstill for hours and bringing Internet companies to their knees. The operators of the site under attack can often only react by redirecting the wave of requests, or by countering it with an exceptionally powerful server. This has to happen very quickly, however.…
Rate this blog entry:
Continue reading
127 Hits
0 Comments

Hundreds of High-Profile Twitter Accounts Hacked through 3rd-Party App

Hundreds of High-Profile Twitter Accounts Hacked through 3rd-Party App
In a large-scale Twitter hack, thousands of Twitter accounts from media outlets to celebrities, including the European Parliament, Forbes, BlockChain, Amnesty International, UNICEF, Nike Spain and numerous other individuals and organizations, were compromised early Wednesday.The compromised Twitter accounts is pushing a disturbing spam message written in Turkish comparing the Dutch to the Nazis, with Swastikas and a "#NaziHollanda" or "#Nazialmanya" (Nazi Germany) hashtag, and changed some of th…
Rate this blog entry:
Continue reading
175 Hits
0 Comments

Microsoft Finally Releases Security Patches For Publicly-Disclosed Critical Flaws

Microsoft Finally Releases Security Patches For Publicly-Disclosed Critical Flaws
After last month's postponement, Microsoft's Patch Tuesday is back with a massive release of fixes that includes patches for security vulnerabilities in Windows and associated software disclosed and exploited since January's patch release.Meanwhile, Adobe has also pushed out security updates for its products, releasing patches for at least seven security vulnerabilities in its Flash Player software.Microsoft patched a total of 140 separate security vulnerabilities across 18 security bulletins…
Rate this blog entry:
Continue reading
153 Hits
0 Comments

Sonic cyber attack shows security holes in ubiquitous sensors

Sonic cyber attack shows security holes in ubiquitous sensors
Sound waves could be used to hack into critical sensors in a broad array of technologies including smartphones, automobiles, medical devices and the Internet of Things, new research shows.…
Rate this blog entry:
Continue reading
148 Hits
0 Comments