hack News ▼

Flaw Found In Amazon Key That Could Disable The Cloud Cam

11/17/2017, A couple of weeks ago, Amazon announced Amazon Key. This is basically a system that allows a courier to enter your home and leave your package in your home, which means that even if you’re not home you will still receive your packages as promised. This...

Report Claims Android Is The Most Targeted By Malware

11/16/2017, Malware, viruses, hacks; those are security issues that aren’t exactly new, but unfortunately it seems that some platforms are more affected than most. According to Nokia’s latest Threat Intelligence Report, it seems that they have discovered that...

Your Google Account Is Most Likely To Be Hijacked Through Phishing

11/12/2017, There are many ways to get hacked on the internet, but it seems that one of the more common ways that people are getting their accounts hacked and taken over is through phishing. This is according to a recent study conducted by Google in an attempt to...

These Groovy Lava Lamps Help Keep Part Of The Internet Secure

11/12/2017, Lava lamps at some point in time were an extremely popular piece of home decoration, but fast forward to today, it seems that these groovy pieces of home furnishing has found a new lease on life: protecting part of the internet. Wait, what? Yup, you read...

Tesla Model S Hacked To Run On Hydrogen

11/10/2017, When it comes to “green” cars or cars that can be powered by renewable forms of energy, it seems that electric cars are more or less the more popular choice, although we have seen companies attempt to create cars that can be powered by hydrogen, in...

Coding Error Leaves Hundreds Of Messaging Apps Vulnerable

11/09/2017, Many messaging apps these days offer users end-to-end encryption for their messages, meaning that these messages are protected from hackers who could still intercept them, but even if they did they wouldn’t be able to read them. However security is only...

Twitter Users Exploit Bug, Posts 35,000 Character Tweet

11/06/2017, The idea behind Twitter is to allow users to make quick and short status updates, as opposed to sharing lengthy blog posts. This is why the character limit imposed by Twitter is still active as of today, but it seems that recently a couple of Twitter...

Adobe Flash Vulnerability Allows Hackers To Plant Malware

10/16/2017, As if the recent revelation that WiFi’s security has been hacked wasn’t enough to scare us as far as cyber security threats are concerned, security firm Kaspersky Labs has revealed that there has been a recent vulnerability discovered in Adobe’s...

Apple Might Have Patched KRACK Vulnerability In Latest Betas

10/16/2017, Recently you might have heard the reports that our WiFi’s WPA-2 might have been hacked which leaves pretty much every device connected on WiFi vulnerable to being attacked. However the good news if you’re an Apple user is that it looks like Apple...

T-Mobile’s Website Bug Let Hackers Steal Data Using A Phone Number

10/11/2017, Whoopsie, it looks like until very recently, T-Mobile’s website had a bug that allowed hackers to exploit it, where they were able to gain access to a user’s email address, account, and a phone’s IMSI network code, and all they needed was your phone...

WhatsApp Exploit Could Reveal Who You Could Be Talking To

10/11/2017, The messenger app WhatsApp comes with a feature that lets you know when someone is online or the last time that person was online. However it also seems that this particular feature could be used to stalk someone where you could potentially find out what...

Malicious Chrome Browser Extension Installed By 37,000 Users

10/11/2017, It is typically advised by companies that users should not install apps from third-party app stores. This is because there is no guarantee that these apps have been properly vetted as to their legitimacy, and whether or not they could be masquerading as...

iOS Phishing Attack Masks Itself As Apple-Style Password Request

10/10/2017, These days phishing attacks are getting smarter and more deceiving. In the past it would be quite obvious to tell when you’ve received an email or visit a website that tries to mask itself as another website, like that of your bank. However a quick...