What Is Doxxing And How To Avoid Getting Doxxed?

Doxxing is revealing and publishing someone’s personal information. This information is collected through various means and is combined together to create a complete profile of personal data. Though this is a popular technique used by hackers for more than a decade but doxxing is not limited to hackers only. What is Doxxing? Doxxing is a […]

2019 CyberScout Global Insights Report Finds That Ransomware Continues to Be a Major Cyber Threat and Provides Tips For Business And Consumers To Guard Against Hacks And ID Theft

From rising identity theft and fraud to large-scale enterprise breaches, the news in 2018 was full of cybersecurity nightmares. With cyber incidents now commonplace, consumers have become fed up and are demanding business data privacy regulations. Governments have been responding with a wave of new legislation. In 2018, CyberScout received a record number of incident […]

Glamoriser Vulnerability Highlights IoT Weakness

It was reported today that security researchers hacked hair straighteners from Glamoriser, a U.K. firm that bills itself as the maker of the “world’s first Bluetooth hair straighteners,” allows users to link the device to an app, which lets the owner set certain heat and style settings. The app can also be used to remotely switch […]

New “Agent Smith” Android Malware And Adware

Malware Ranks First

Agent Smith is the name of a new Android Malware that replaces legitimate apps with clones infested with adware according to a report from Checkpoint who thinks the malware has already infected about 25 million Android users.  Android Malware Agent Smith: Keine Panik! https://t.co/5MeyP3xBt9 pic.twitter.com/uAQ2EPijcj — BlackBerry 10 QNX (@BlackBerry10QNX) July 12, 2019 Yesterday, @CheckPointSW published this excellent […]

Expert comment: Former Tesla Employee Accused Of IP Theft, Uploaded Autopilot Code To iCloud

Earlier this year, Tesla filed suit against former engineering employee, Guangzhi Cao, accusing him of stealing trade secrets (Tesla’s Autopilot source code).  In a court filing from Monday (July 8), Cao admitted to uploading .zip files containing the Autopilot source code to his personal iCloud account.   Additionally, Cao is accused of bringing the code to Chinese […]

Study Finds 92 Per Cent Of Businesses Experience Identity Challenges

LastPass by LogMeIn today announced the results of a new study conducted by Vanson Bourne to offer businesses insights into the state of identity and access management (IAM) and actionable steps to improve their IAM programme. The study, The Guide to Modern Identity, surveyed 700 global IT and security professionals at organisations ranging from 250 to 2,999 employees and […]

FinSpy Strikes Again: New Versions For iOS And Android Targeted Surveillance Revealed

Google Flaw that could Grant Remote Access to Devices

Kaspersky experts have uncovered new versions of the advanced malicious surveillance tool FinSpy. The new implants work on both iOS and Android devices, can monitor activity on almost all popular messaging services, including encrypted ones, and hide their traces better than before. The tools allow attackers to spy on all device activities and exfiltrate sensitive data […]