-
Archives
- May 2018
- April 2018
- March 2018
- February 2018
- December 2017
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
-
Meta
Monthly Archives: June 2016
Hillary Clinton’s language about encryption echoes Apple
Clinton’s position on “back doors” and encryption appears to mirror Apple’s public statements. Democratic presidential candidate Hillary Clinton’s language about encryption echoes Apple takes part in a discussion during a campaign stop, Saturday, April 23, 2016, at the Orangeside On … Continue reading
Posted in Cyber Security
Leave a comment
IRS Shuts Down e-File PIN Tool After More Attacks
The U.S. Internal Revenue Service (IRS) announced last week that it has decided to shut down the electronic filing PIN tool on its website after detecting more automated attacks. The e-File PIN tool on IRS.gov allowed taxpayers to generate PINs … Continue reading
Apple confirms iOS 10 kernel source code left unencrypted intentionally
Apple confirms iOS 10 kernel code left unencrypted intentionally to improve OS performance and ensures that it will have no impact on security. The news is intriguing, while Apple announced the new release of its mobile operating system, the iOS 10, … Continue reading
Swagger staggered as hacker drops dapper code execution cracker
Silent maintainers put on notice An unpatched remote code execution hole has been publicly disclosed in the popular Swagger API framework, putting users at risk. The client and server hole (CVE-2016-5641) exists in code generators within the REST programming tool, … Continue reading
Malware infections by Locky, Dridex, and Angler drop — but why?
Some of the internet’s biggest malware factories have stopped producing — but the battle is not over. The number of network infections generated by some of the most prolific forms of malware — such as Locky, Dridex, and Angler — … Continue reading
Sirin Labs’ Solarin isn’t for pro-privacy bankers. It’s for rich execs who want bling
‘Advanced technology for those where cost is not an issue’. El Reg got hands-on with the Solarin $14,000 ultra-high-end Android smartphone during a trip to Tel Aviv this week. As previously reported, the Solarin handset is an Android-based smartphone pitched … Continue reading
PMO gets complaint: Essar allegedly tapped Ambani brothers, Suresh Prabhu, Vajpayee PMO staff
During 2001-06, Essar tapped ministers, industrialists, bureaucrats, says SC lawyer; Essar calls it baseless charge. For five years, between 2001 and 2006 — spanning one NDA and one UPA government — the Essar Group allegedly tapped several telephones of VVIPs, … Continue reading
Posted in Cyber Security
Tagged chairman of RIL; Anil Ambani, Mukesh Ambani, Suresh Prabhu
Leave a comment
Cisco wireless kits are affected by a critical bug but no fix is available
A security advisory recently released by CISCO announce that three Cisco wireless kits are affected by a critical bug, but no fix is available at the moment. SOHO devices are among most targeted network components in the wild, they are … Continue reading
Advanced phishing tactics used to steal PayPal credentials
Phishers are back to using an old tactic in a new fashion to get hold of their victims’ credentials. One of the first lessons you will learn during anti-phishing training is to hover over the links in a mail to … Continue reading
‘Hacking Team’ and heterogony of ends: how the hack of Phineas Fisher can lead to unwanted worst consequences for the evolution of the Surveillance Tools and State Spyware.
The “heterogony of end” is a famous expression formulated in 1886 by the German philosopher Wihelm Wundt, what about the Hacking Team case?. After the hack of the controversial government spying and hacking tool vendor Hacking Team by an outside … Continue reading
Posted in Cyber Security, Software Testing company in Mexico
Tagged Hacking Team, Spy
Leave a comment