Category: Surveillance

  • Google: “Google Hire” Won’t Share Browsing History with Employers

    Google is known to be in the spotlight for its success mostly, but this wasn’t the case last night. Yesterday, some prominent media outlets including Daily Mail, RT, and an Australian news site reported that Google would share search history of the users with potential employers under a new project “Google hire.” What is Google […]

  • How a man’ life was ruined due to a typo in IP address by Police

    You probably remember Amazon’s engineer who’s typo messed up the entire AWS (Amazon Web Service). But what happened in the United Kingdom ruined a man’s life. The man in question is Mr. Nigel Lang, a UK resident who in 2011 got arrested at his home because, according to the police, he was a suspect for keeping child pornographic content […]

  • Hacked Nude Photos of Rosario Dawson, Miley Cyrus, Kate Hudson Leaked

    It’s just another day and just another privacy breach. This time hackers have leaked nude pictures and explicit videos of celebrities including Sin City’s Rosario Dawson, Miley Cyrus, British actress Suki Waterhouse, How to Lose a Guy in 10 Days’ Kate Hudson and Dexter’s Yvonne Strahovski. The content was leaked and uploaded on a so-called celebrity gossip site Celeb […]

  • Attackers can guess our passcode “just from the way we tilt our phone”

    Just yesterday we reported that fingerprint scanner on smartphones can be bypassed with the help of a new technique called MasterPrint. Now, hackers have developed a new way to figure out your smartphone’s passcode. You might be thinking that they can do this by using sophisticated methods or tools, but no! This is where you […]

  • New tech allows researchers to bypass fingerprint scanner on smartphone

    It’s a common perception that we’re kind of safe by setting up fingerprints scanners on our smartphones. After all, what are the chances that someone in the world has the same fingerprint, and will try to break into our smartphones, right? Well, things are about to change after the researchers from Michigan State University, and […]

  • Hackers Leak Passwords to NSA’s “Top Secret Arsenal” against Trump’s Policies

    You may remember Shadow Brokers hacking group for selling a trove of hacking tools and exploits stolen from the NSA’s Equation Group last year. Although three months ago the group announced about quitting its operation since they failed to find a buyer for listings the group is back in the news and this time for leaking […]

  • IXmaps Map reveals if your Internet traffic is being monitored by the NSA

    A new interactive online tool named Internet Exchange Mapping (IXmaps) appeared earlier this week, and it shows if your data traffic passes through the NSA or not. Many prying eyes are out there, trying to discover everybody’s secrets and take a peek into everyone’s life. That’s why a team of faculty and students from the […]

  • US ISPs to Snub Users Privacy by Collecting Personal Data

    US legislation is about to pass a law that will allow the Internet service providers to share user’s personal information to advertising agencies. As per reports, House of Representatives voted for a bill which will allow the internet service providers to share user’s personal information to third parties without their consent. The only thing that […]

  • Encrypted Email Service Tutanota Celebrates 2 Million Users

    Tutanota, an email encryption service is gaining popularity all across the globe and has seen a rapid growth since the start of 2017. In the past month, the company has gained over half a million users and is now celebrating 2 million users in total. After the Snowden leak, it became abundantly clear that different […]

  • WikiLeaks: CIA hacking tools infiltrate iPhones, MacBooks – Apple: It’s an old story

    WikiLeaks have been known to publish classified documents for a long time, and Thursday was no different the whistleblower organization revealed a new set of documents called “Dark Matter” from the “Vault 7” leak stating that the CIA has been infecting Apple products with a series of tools to spy on the US citizens. According […]

  • Idaho Department of Labor hacked; personal data of 170,000 people at risk

    A hacking incident that occurred on March 12 and March 13 compromised more than 170,000 job-seeker accounts, as reported by Idaho Statesman. The accounts in question, active and past, are a part of a much larger group of 530,000 accounts registered with Idaho Department of Labor. The system under the attack, America’s Job Link, is a […]

  • Twitter suspended 377,000 accounts for promoting terror and extremism

    Twitter announced on Tuesday (20th) that it has deleted 377,000 accounts in the second half of 2016 as part of its fight against content related to extremism and terrorism. The number is 60% higher than the profiles deleted in the first half of last year, according to its transparency report. In total, the social network […]

  • WWE’s Paige X-Rated Photos Leaked – ‘Total Divas’ Star Comments on Scandal

    At the moment, rumors are going around about the possible hacking of WWE female superstar Paige. This is after x-rated photos, and videos of her found their way online. Paige is also a member of the cast of E! Entertainment’s show Total Divas in which she stars alongside other WWE celebs. As one of the […]

  • Security Flaw Allowed Hackers to Compromise WhatsApp, Telegram Accounts

    CheckPoint, an Israeli security firm, unveiled this Wednesday a security flaw in encrypted messages that could affect the web version of WhatsApp and Telegram. The platforms were alerted about the vulnerability on March 8th and have already fixed the issue in both messengers by changing the file upload validation protocols to protect against the attack. The flaw […]

  • Private Photos of Amanda Seyfried, Emma Watson and others Leaked

    It is 2017, but it’s still happening. The latest victims of this campaign include top celebrities, Amanda Seyfried, Emma Watson, Rhona Mitra, Alyssa Arce, Jillian Murray, Analeigh Tipton, Iliza Shlesinger and others. The leaked pictures and or videos were leaked yesterday on a celebrity gossip website “Celeb Jihad” ranging from nude selfies, explicitly sexual photos of intimate moments. The […]

  • Maybe Microwaves can be hacked but turn them into cameras? Nah

    In her recent interview with Bergen Record columnist Mike Kelly, the Counselor to the President for Donald Trump Kellyanne Elizabeth Conway stated that there was an article talking about how we can all be spied upon by “microwaves that turn into cameras.” She went on to explain that it is “just a fact of modern life.” Q: Do […]

  • Notepad++ Issues Fix After CIA Attack Revealed in Vault7 Documents

    On 7th Match 2017, the whistle-blowing organization Wikileaks published a series of new documents code-named “Vault 7” allegedly belonging to the U.S. Central Intelligence Agency (CIA). These documents not only revealed the existence of a large-scale cyber espionage campaign but also show how the agency used zero days security flaws in Windows, macOS, Linux, iPhones, Android devices, several […]

  • Wikileaks Vault 7: CIA hacked Smart TVs, Phones, Trucks and Computers

    Wikileaks, the famed whistleblowing platform, recently revealed a lot to the public. Titled Vault 7, Part 1, the documents show a grim view of government surveillance as we know it. Among the disturbing pieces of information was that of the CIA’s efforts to breach the security of Apple’s iPads and iPhones. The Central Intelligence Service […]

  • Android Password Manager You Trust Could be Exposing Login Data

    According to the latest findings from TeamSIK, a group of security researchers associated with Darmstadt, Germany-based Fraunhofer Institute for Secure Information Technology, a majority of the popular Android password managers are plagued with serious security flaws. As per the information revealed by TeamSIK (technical details), these weaknesses are so severe that user credentials can easily be […]