Security

Smartphone in Hand

Academics Utilize NFC to Generate Fake Taps on Android Phones

Researchers from Tokyo have managed to generate fake taps on Android devices. By using a signal generator, they could induce electric signals that tricked the screen into registering ghost taps. The...
Microsoft Notepad UI

Microsoft Notepad Zero-Day Vulnerability Can Lead to Remote Shell Access

A Google researcher has discovered a way to exploit Notepad remotely. The researcher claims that his method is perfectly doable but can’t reveal anything before it’s been fixed. Other researchers believe...
ATM

A Decade of ATM Malware Evolution and Deployment

ATM malware has been around for ten years now, and it's growing stronger. Attackers can trick the machine into dispensing all their cash out or steal card data. The number of...
checkers

Checkers and Rally’s Restaurants Announced Security Incident

Many Checkers and Rally’s restaurants were infected with POS malware. The malicious software stole hundreds of credit card information and details. Customers are urged to check the dates of exposure and...
protonmail-corporate-server

Lawyer Accuses ProtonMail of Sharing Information with the Authorities

ProtonMail under fire by Swiss lawyer who claims they voluntarily give away user metadata. The service dismisses the claims and says they’ll only do this when ordered by a court. The...
nordlocker

NordVPN to Launch the ‘NordLocker’ File Encryption Service

NordVPN has announced their plans to launch a file encryption service called “NordLocker”. The new tool will be straightforward to use even by people who understand little about encryption. NordLocker will...
Firefox

A New Wave of Firefox Add-Ons Infected with Malware

Three fake Firefox extensions have found their way into the Mozilla store. The add-ons are malicious data loggers that capture keyboard input and send it to the C&C server. The extensions are...
malware ridden laptop

Malware Ridden Laptop ‘The Persistence of Chaos’ Sold for $1.345 Million

The work of contemporary artist Guo O Dong has reached a high final bid. The laptop named “the persistence of chaos” was infected with six dangerous malware samples. The piece holds...
Nahal Shahidzadeh Acceptto

Nahal Shahidzadeh, Acceptto: Imagine a World With No Passwords, Using Your Behavioral Pattern for...

We may think that our data is safe and that our devices are safe, but that's not always the case, even with many precautions taken, if our passwords have been stolen by criminals. Working...
amazingco website

‘Unique Experiences’ Company Exposes 174000 Customers

Australian company who organizes unique experiences has exposed 174000 of their customers. The data that was exposed includes several types of personal identification information. The company has not released an official...

Most Popular