Security

Home Security
LED PC hack

Here Is How An Internet-Less PC Can Be Hacked Via It’s HDD LED Light...

Short Bytes: A paper published by an Israeli team of researchers elaborates a new method of covertly leaking information from an air-gapped computer. Titled...
sha-1 shattered google

Google Just Broke SHA-1 Encryption — One Of The Most Popular Cryptographic Hash Functions

Short Bytes: Google has achieved the first successful SHA-1 collision attack. By creating a specially crafted PDF prefix, the researchers were able to generate...
Indian Goverment Free Antivirus

Indian Government Launches Free Antivirus Software For Smartphones And Computers

Short Bytes: Cyber Swachhta Kendra, a botnet cleaning and malware analysis centre, is a new project led by the Indian government. The project finds its...
kasperskyos 11-11 features

KasperskyOS “11-11” Released After 14 Years Of Development — Here Are Best Features

Short Bytes: Kaspersky has announced the availability of KasperskyOS, which is codenamed 11-11. This secure operating system for network devices and IoT is written...
trump-site-hacked

Donald Trump’s Website Just Got Hacked

Short Bytes: Some hackers, who call themselves Pro_Mast3r, have managed to hack Donald Trump's website and deface a CloudFlare server. The server in question is...
juice jacking risk

What Is Juice Jacking? Can Charging My Phone In A Public Port Lead To...

Short Bytes: Juice Jacking is one of the most underrated security threats around. It can be used by an attacker to take complete control...
zerocoin

How A Typo In Zerocoin’s Source Code Allowed Hackers To Steal $592,000

Short Bytes: Due to a single-letter typo bug in Zerocoin's source code, the hackers were able to exploit the platform and steal Zerocoins worth about $592,000. Zerocoin is...
Google Android Verfiy Apps

Google’s Verify Apps Service Now Kills Harmful Apps From Your Device Automatically

Short Bytes: Verify Apps is a cloud-based security feature in the Android operating system. It regularly scans the device for potentially malicious apps and...
Dark Web Market Price Main

Infographic Shows The “Price Of Your Stolen Credit Cards” On The Dark Web

Short Bytes: Personal information like credit cards, emails, IP address, corporate accounts, and other information are stolen from people and openly sold on the...
Browser Fingerpting Main

Websites Can Now Track 36 Features Of Your Computer, Identify You Even If You...

Short Bytes: A new research conducted at the Lehigh University has taken the browser fingerprinting to a whole new level. They have devised a...