This week WikiLeaks published “Vault 7” — a roughly 8,761 documents and files claiming to detail surveillance tools and tactics of the Central Intelligence Agency (CIA).
The leak outlined a broad range of flaws in smartphones and other devices that the agency uses to intercept communications and spy on its targets, making even China and Germany worried about the CIA’s ability to hack all
A group of highly sophisticated state-sponsored hackers is spying on the Israeli military by hacking into the personal Android phones of individual soldiers to monitor their activities and steal data.
A newly released research by Lookout and Kaspersky suggests that more than 100 Israeli servicemen from the Israeli Defense Force (IDF) are believed to have been targeted with spyware.
Those innocent-looking apps in your smartphone can secretly spy on your communications or could allow hackers to do so.
Hard to believe, but it’s true.
Recently, Trustwave’s SpiderLabs analysts discovered a hidden backdoor in Skype for Apple’s macOS and Mac OS X operating systems that could be used to spy on users’ communications without their knowledge.
<!– adsense –>
Have you considered the possibility that someone could be watching you through your webcam? Or Listening to all your conversations through your laptop’s microphone?
Even a bit of thought about this probability could make you feel incredibly creepy.
But most people think that they have a solution to these major issues i.e. simply covering their laptop’s webcam and microphone with tape, just
The world’s largest online professional network LinkedIn could face a ban in Russia after the company has failed to comply with a Russian data localization law that compels companies to keep data on Russian users in their country.
If you are not aware, LinkedIn is the only major social network which is not banned in China, because the company agreed to cooperate with the Chinese government
U.S. representatives are asking Yahoo for clarity around a surveillance program mentioned in reports earlier this month.
Users are still dealing with the Yahoo’s massive data breach that exposed over 1 Billion Yahoo accounts and there’s another shocking news about the company that, I bet, will blow your mind.
Yahoo might have provided your personal data to United States intelligence agency when required.
Yahoo reportedly built a custom software programmed to secretly scan all of its users’ emails for specific
Wikileaks completed its 10 years today, and within this timespan, the whistleblower site has published over 10 million documents, and there’s more to come.
In the name of celebration of its 10th Anniversary, Wikileaks promises to leak documents pertaining to Google, United States presidential election and more over the next ten weeks.
<!– adsense –>
Speaking by video link to an anniversary
If you are using the Internet, there are the possibilities that you are open to attack.
The Transmission Control Protocol (TCP) implementation in all Linux systems deployed since 2012 (version 3.6 and above of the Linux kernel) poses a serious threat to Internet users, whether or not they use Linux directly.
This issue is troubling because Linux is used widely across the Internet, from web
Just stop believing everything you see on your screen, as it turns out that even your computer monitor can be hacked.
You have seen hackers targeting your computer, smartphone, and tablet, but now, it has been proved that they can even compromise your monitor and turn them against by just changing the pixels displayed on the screen.
Although changing pixels is really hard and complicated, a