News Clipping

Facebook’s iOS app might be opening the camera in the background [theverge]

Facebook’s iOS app appears to be activating the camera in the background of the app in some situations without a user’s knowledge. However, Facebook tells The Verge that it’s submitting a fix to address these issues to Apple today. There are a couple ways that this has been found to happen. One person found that the camera UI for Facebook Stories briefly appeared behind a video when...

Read More


1.3 Million Indian Payment Card Details Up For Sale On Dark Web [ndtv]

Nearly 1.3 million debit and credit card data of Indian banking customers that can fetch up to $130 million for cybercriminals are available on Dark Web for open sale. According to ZDNet, the cards’ details is available on Joker’s Stash — one of the oldest card shops on the dark web which is known to be the place where major hackers sell card dumps. The...

Read More


Over 15 Indian States Have Been Infected By The Dtrack Malware [mashable]

We’re already aware that data breaches are on a constant rise these days. Hackers are making use of stealthy creative ways to get access to our sensitive data. Kaspersky, a Russia-based cybersecurity firm, revealed recently that it has discovered samples of ‘Dtrack’ malware from enterprises across Indian states including Maharashtra, Karnataka and Telangana, according to a report by IANS. The Dtrack malware is kind of a...

Read More


NordVPN confirms it was hacked [techcrunch]

NordVPN, a virtual private network provider that promises to “protect your privacy online,” has confirmed it was hacked. The admission comes following rumors that the company had been breached. It first emerged that NordVPN had an expired internal private key exposed, potentially allowing anyone to spin out their own servers imitating NordVPN. VPN providers are increasingly popular as they ostensibly provide privacy from your internet provider...

Read More


Wi-Fi Bug in Millions of Amazon Echo and Kindle Devices [gbhackers]

The KRACK attack was published by two Belgian researchers in October 2017. The attacks are based on the weaknesses in the WPA2 protocol used in modern Wi-Fi devices. The weakness can be exploited by the attackers using key reinstallation attacks if the victim resides within the network. Successful exploitation of the attack allows attackers to steal sensitive details such as credit card numbers, passwords, chat...

Read More


Page 19 of 123« First...10...1718192021...304050...Last »