- Can you trust SSL encryption of your email provider?
- Reddit Is Tearing Itself Apart
- Teen pays for DDoS on school, faces felony charges
- Ransomware Do’s and Dont’s: Protecting Critical Data
- Twiddle your thumbs no more, the Steam Controller is now available in the US and UK
- Microdia introduces 512GB microSD
- Fallout 4 confirmed
- New SOHO router security audit uncovers over 60 flaws in 22 models
- Insane Asus gaming case transform from PC tower to mechanized showpiece
- Batteriser is a $2.50 gadget that extends disposable battery life by 800 percent
- Woman who unwittingly recycled an Apple I has $100k coming her way
- Why eSports is every bit as worthy as traditional sports
- Porn, adware found on former FBI web domains
- Crypto Calamity for Blockchain Android App
- Gaana.com Hacked, Database Exposed
- (ISC)2 Taps CIA, NSA and NYPD for Conference
NZ Government Invests $8M To Keep Residents Safe
The New Zealand Government have announced the release of New Zealand’s Cyber Security Strategy 2019, which sees the government investing $8 million on cyber security. Kris Faafoi, puts an emphasis on partnership as crucial to secure the infrastructure and the residents of New Zealand. “The new Strategy highlights four fundamentals for cyber security in New Zealand: Partnerships are crucial; people are secure and human rights are respected online; economic growth is enhanced, and national security is protected.” – Kris Faafoi. The strategy sets out five priority areas for action...
TLS Pages Used For Phishing
Do not trust TLS pages at face value Everyone has been taught and reminded frequently to trust TLS based websites, look at the padlock sign, https and green bars. Since most people look at only these things and believe the website is secure, it is the same reason it is used for malicious activities by hackers. By trusting the website, hackers abuse the trust between the user and the website and lead them to phishing pages. FBI has issued a warning stating not to simply trust emails, website pages,...
Mental Health App Are Sharing Your Data
Microsoft Support Agent’s Credentials Hacked
Support Agent’s Targeted Microsoft have sent out a letter to it’s affected users regarding the incident which caused “limited” number of accounts being compromised. According to Microsoft, support agent’s credentials were hacked and hackers were able to view folder names, subject lines and the email accounts the account has communicated with in the past. Microsoft urges that hackers were not able to view the content or attachments of the email. “Upon awareness of this issue, Microsoft immediately disabled the compromised credentials, prohibiting their use for any further unauthorized access”...
Are Google And Apple Hosting App which tracks women?
Google and Apple under scrutiny for hosting a plausible tracking app An application called Absher has come under a lot of scrutiny when it was revealed that the app was capable of tracking the women/spouse.By the using the app, “guardians” can register their dependent women and block travel destination to certain countries. Previously women had to present a consent form to the authorities at the airport, but since the launch of Absher, it seems women are trying to evade the restriction by either stealing guardian’s app credential or phone...
Facebook Gets Teens Data Just For $20
Ethical? In recent days, Facebook has been caught secretly paying $20 per month to teens in order to access their data. By connecting through the “Facebook Research” VPN, Facebook was given access to all user data, network traffic and root access to the devices. The age group of the users went from 13-35 years old. The users were also told to screenshot their Amazon history as well. The iOS version of the app has been removed due to the violation of Apple’s agreement. “We designed our Enterprise Developer...
Google To Disturb Human Rights Progress In China
Google and human rights? Google plans to operate its search engine in China. Previously not being accessible by the citizen of China, it is reported by The Intercept that top officials of Google and China are in talks to implement a censored Google Search engine. The official implementation could be less than half a year. Which when implemented will violate numerous human rights. Such as blocking access to books, researchers, political censorship, free speech articles and more. The search engine will acquire the filtered sites through the “Great Firewall”....
Julian Assange To Be Kicked From Ecuador Embassy
Julian Assange Will Be Immediately Handed Over To UK Glenn Greenwald reported that the president of Ecuador is about to, if not already, has finalized an agreement handing over Assange to the UK officials. The ejection of Assange from the embassy can be in the coming weeks. Greenwald suggested that “it appears highly likely that Assange will continue to be imprisoned by British authorities… The only known criminal proceeding Assange currently faces is a pending 2012 arrest warrant for “failure to surrender”” The charge has a prison time of...
Google Secures Chrome Extension Installation
No More Third Party Installation After getting numerous reports from users over deceptive Google Chrome extension installation, Google has decided to block third-party websites to use inline installations. According to Google, the crackdown on deceptive installation will take place in three phase. At first, all inline installation will be made unavailable to all newly published extension. From September 12, 2018, inline installation will be blocked for existing extensions and users will be redirected to Chrome Web Store and final phase, from December 2018, Inline Install API method will be...
US Government Bans Kaspersky Lab
Russian Intelligence and Kaspersky Acting Secretary of Homeland Security Elaine Duke issued a BOD in order to identify and remove any Kaspersky Lab products and related entities. This comes after accusations of Kaspersky Lab handing out data to Russian intelligence. US governments are avoiding any relations with the Russian intelligence after the state sponsored attack which was carried out earlier. Are they? All fronts? But this action does not involve military system, only civil government network, not military. “This action is based on the information security risks presented by...