Last goodbyes for Chrome’s HTTPS security indicators

For years loyal Chrome user’s have been automatically assured with the green padlock when the visited webpage would be using protected and (from 2017) warned about the unsafe HTTP sites with the red warning triangle next to the URL address bar saying ‘Not Secure’. Even though, this seems like a minor thing but has prevented … Continued

DropBox officially reimburses its auto-renew victims

On May 16th Alameda County attorney announced the Consumer Protection Settlement with . The file-sharing company got in trouble for violating California’s state Automatic Renewal Law by extending the paid service to users without asking for the permission and now has to pay the price. If you ever have gotten yourself a DropBox services read … Continued

How to stop Facebook from sharing your private data

Let’s be clear – Facebook doesn’t care about respecting or protecting its users’ privacy. Last year, leaked documents revealed that Facebook had been real-time monitoring its users’ social activity to detect their emotions and then combine this data with their personal information, such as age, gender, relationship status, life events, interests, etc. Detailed profiles of … Continued

Loopholes in Signal’s security

One of the most secure messaging app considered Signal recently discovered a dangerous XSS (cross-site scripting) framework vulnerability in their desktop versions, by the accident. The vulnerability was found when , , and were chatting about the other XSS vulnerability via Signal. Two men were using the desktop version while the third – Signal’s extension for … Continued

Google’s new .App Domain craze

When in 2015 Google spent $25 million dollars on ICANN’s auctioned .app top-level domain (TDL), it raised quite a few eyebrows, wondering whether this deal will actually pay off for Google, when other major companies spent no more than $7 million dollars on their TDLs.  But after almost 3 years on May 1st, 2018 when … Continued

Latest IC3 report: Cyber crime victims lost more than $1.4 Billion in 2017

Yesterday, on May 7th, 2018, Internet Crime Complaint Centre, or simply IC3, released it’s newest annual publication – 2017 Internet Crime Report. There FBI cyber crime specialists compiled data about virtual criminal activity, which internet users reported on IC3 website throughout 2017. Shocking numbers were disclosed – over $1.4 billion loss and 301,580 complaints on … Continued

Malicious Chrome extension FacexWorm crypto-hijacking via Facebook

On April 30th, 2018  cyber intelligence specialists reported a discovery of a malicious Google Chrome extension called FacexWorm using Facebook’s Messenger to target cryptocurrency trading platforms. So far only one successfully hijacked FacexWorm Bitcoin transaction has been identified, however the amount is still unknown. FacexWorm extension has been know for cyber researchers since last August, 2017, … Continued

Trustlook finds almost 26k malicious apps using Facebook API’s

After all the recent personal, medical and call data collecting scandals it seems like Facebook is not planning to leave the headlines. In the end of April, 2018 Trustlook has discovered 25,936 malicious apps that have been and still are using Facebook API’s. Malicious app developers abuse the APIs to access information beyond user’s permission … Continued

Uber updates ‘bug bounty’ policy

After the major 2016 data breach we wrote about in November, when a 20-year-old hacker exposed 57 million user’s credentials, email addresses, phone numbers and other personal data, Uber has finally updated it’s ‘bug bounty’ . Uber finally makes changes to the policy of ‘bug bounty’ program The data leaking incident had raised questions about bug … Continued

Is Alexa spying on you?

A million dollar worth question: is Alexa actually spying on its users? Having someone listen on your private conversations is an uncomfortable reality that many users and security researchers have wondered about. Specialists from Checkmarx have published an article, revealing that , recording users’ conversations and other sounds around it. As far as we are … Continued

Hospitals worldwide targeted by the Orangeworm attack group

Medical information of patients is considered as highly-confidential, and people wish to keep it private. Privacy is a priority for many people who wish to keep their symptoms and medical histories a secret from the outside world. However, cyber criminals have attempted to harvest medical information, and in other instances, hackers have initiated various cyber-attacks … Continued

Recent Posts

Security Guides

Recent Comments