Uber updates ‘bug bounty’ policy

After the major 2016 data breach we wrote about in November, when a 20-year-old hacker exposed 57 million user’s credentials, email addresses, phone numbers and other personal data, Uber has finally updated it’s ‘bug bounty’ . Uber finally makes changes to the policy of ‘bug bounty’ program The data leaking incident had raised questions about bug … Continued

Is Alexa spying on you?

A million dollar worth question: is Alexa actually spying on its users? Having someone listen on your private conversations is an uncomfortable reality that many users and security researchers have wondered about. Specialists from Checkmarx have published an article, revealing that , recording users’ conversations and other sounds around it. As far as we are … Continued

Hospitals worldwide targeted by the Orangeworm attack group

Medical information of patients is considered as highly-confidential, and people wish to keep it private. Privacy is a priority for many people who wish to keep their symptoms and medical histories a secret from the outside world. However, cyber criminals have attempted to harvest medical information, and in other instances, hackers have initiated various cyber-attacks … Continued

AutoFill bug in LinkedIn

Business and employment services of LinkedIn have been helpful to people from all over the world. Job-hunting can be very stressful and complicated, but LinkedIn has made this process easier. However, given the popularity and success this job-offering service has achived, it is not a surprise that cyber-criminals choose its services as a target. For … Continued

RansSiria ransomware: scams people to “donate” money to Syria

Hackers definitely lack empathy for victims of gruesome events, and they find it appropriate to exploit devastating tragedies for their own benefits. When Hurricane Harvey caused catastrophic disasters in Texas, scammers quickly decided to use this as an opportunity for a new spam campaign. In August, 2017, devious crooks sent around email messages, asking for … Continued

Crypto-miners: more active than ransomware

Just as we have predicted, crypto-mining malware is slowly, but efficiently pushing ransomware viruses from their thrones. After the sudden changes in the crypto-currency world, hackers became more engaged in illegal mining. In some cases, such strategies have proven themselves to be very successful, since the crypto-mining activities can occur right under users’ noses. Since … Continued

Drupal vulnerability: install critical patch!

Researchers frequently reveal new vulnerabilities, and attempt to solve them as quickly as possible. This time, a dangerous flaw in Drupal is causing serious issues for website-owners. At the end of March, researchers from , discussing highly critical remote control vulnerability in several subsystems of Drupal 7.x and 8.x. According to the announcement, the flaw … Continued

Federal Agencies: leaders in data breaches

Researchers from Thales e-Security released an interesting report, explaining the data-breach tendencies in 2018. It might come as a shock but the federal agencies have been indicated as the leading target for hackers. In the , the specialists described the current situation of Federal Agencies and called it the “perfect storm”. It is explained that … Continued

Bug in Outlook allowed hackers to steal passwords

Outlook is a web-based service, allowing users to manage their contacts, tasks, calendaring and webmail. It is a product from Microsoft, and millions of people from all over the world use it to manage their email accounts and keep up with social networks. However, researchers have detected a major flaw in Outlook. This is not … Continued

“FakeUpdates” campaign compromises website platforms

It seems that a sophisticated malware distribution campaign went on for approximately 4 months, and security researchers are now reporting the major features of this evasive plan. Researchers from and other cyber security companies had analyzed multiple infections and their origin, only to find a much bigger surprise. “FakeUpdates” campaign compromised WordPress and Joomla websites … Continued

UK to give funding for the fight against crimes on the dark web

Dark web might be very unfamiliar to people who are used to scrolling the news feed of Facebook while also enjoying coffee and eating breakfast before work. The deepest places of the Internet are not for the light-hearted people. The majority of the Internet surfers have no interest of ordering illegal goods or buying ransomware-as-a-service … Continued

Facebook’s secret operation to access medical records

You would think that the storm for Facebook has passed: it has released a set of new privacy restriction, what else is there left to say? CNBC had a lot to say, especially about the super secretive plan that Facebook had. According to the news report, Facebook had an idea of collecting patients’ medical records … Continued

Mirai version targets financial firms

Security researchers have been aware of the Mirai malware for a while. It is a type of infection which turns Linux operating systems into obedient, remotely controlled zombies called “bots”. According to researchers from McAFee, 2017 were dominated by Necurs and Gamut botnets and together, they delivered 97% of all spam. However, smaller botnets are … Continued

Facebook introduces new privacy rules

With everything going on, it was expected that Facebook would take the matters into its own hands and change the story line to its advantage. After the huge users’ outrage due to Cambridge Analytica scandal, and the stealthy collection of call data, the ridiculously successful social networking site decided it is time to make their … Continued

Recent Posts

Security Guides

Recent Comments