Web Security

Google fixes Chrome’s critical vulnerability to Android after 3 years

Google has finally fixed three-year security vulnerability in Google Chrome for Android. It is quite surprising that the technology giant took so long to remedy a flaw identified several years ago. The flaw was originally identified by white hat hackers at Nightwatch Cybersecurity in May 2015. It was only now that the security staff of

[ Read More ]

Security companies hacked Twitter accounts (High Profile) to highlight security risks

Insinia Security, a security company, has hacked high profile Twitter accounts to expose the vulnerability of Twitter. The hacked Twitter accounts included Eamonn Holmes, a journalist and broadcaster, Louis Theroux, a British documentary filmmaker, Simon Calder, a travel journalist, and Saira Khan. Insinia Security hacked a number of high profile Twitter accounts to publicize the

[ Read More ]

How to Control API Security Risks – Brief Overview

The company’s use of APIs (application programming interfaces) is exploding, as more and more companies are embarking on digital transformation and finding ways to make money by exposing their data to outsiders through apps, websites and other integrations from outside parties. The disadvantage of all these APIs is that they pose a significant risk to

[ Read More ]

Top 10 Worst Online Scams of 2018

This year 2018, if we have learned one thing, it’s that hackers and scammers are more resourceful than ever. From phishing schemes to scams for text messages, these smart criminals have turned the digital world into a minefield of malicious links and seedy behavior. Fortunately, we looked for you by keeping an eye on scams

[ Read More ]

8 common Mobile Application vulnerabilities

1.Binary protection: insufficient detection of Jailbreak / Root. The rooting or jailing of a device bypasses the system’s data protection and encryption systems. When a device is compromised, any form of malicious code can run on the device that can change the intended behavior of the application logic significantly. Recovery and forensic data tools usually

[ Read More ]

Bitcoin Scam Alert – Criminals request BTC Call Off Hit Man payment

In the last few years, scam artists have tried almost every trick in the book to relieve people of their bitcoin. However, the most recent effort in the sophisticated department is rather lacking. A Bleeping Computer report states that people receive emails apparently from the owner of a dark website that offers various illegal services.

[ Read More ]

CIMB Denies Security Breach – Malaysian Bank

Despite thousands of customers complaining about a hack, the Malaysian bank CIMB has denied security breaches affecting its online banking portal. The Kuala Lumpur – based CIMB, the fifth largest bank group in ASEAN and the second largest bank in Malaysia, refuted on Monday all allegations that its online banking portal was affected by a

[ Read More ]

What to do if your computer is attacked by Ransomware?

The file encrypter, ransomware has already infected thousands of computers around the world. In May 2017, 100 000 organizations in 150 countries were infected by Ransomware. Three days after the first release of Ransomware. Isn’t it alarming? What is frightening about the Ransomware attack is that it guarantees loss of data. Once the file or

[ Read More ]