Security News, Page 16 ▼

Anonymous Releases Guide On How You Can Help Hack ISIS

11/18/2015, As many of you guys have heard by now, the hackers collective known as Anonymous has publicly declared cyberwar on ISIS following the attacks in Paris, France. So far the group has reportedly managed to get multiple social media accounts that are...

Instagram Gets More Strict With Its API Access

11/17/2015, Last week it was discovered that popular third-party Instagram client InstaAgent was found harvesting usernames and passwords. This led to the app being pulled from the iTunes App Store. However while the app might be gone, who’s to say that someone...

Bug On MetroPCS Website Could Have Left Millions Exposed

11/16/2015, When you visit websites belonging to big corporations, you would assume that it is secure to a certain extent. Unfortunately for MetroPCS customers, it seems that a bug was recently discovered on the carrier’s website which potentially could have left...

Security Vulnerability In Chrome For Android Discovered

11/15/2015, As much as developers try to make their apps as secure as possible, from time to time there will be flaws discovered. Sometimes these flaws aren’t particularly serious, but sometimes they can be pretty bad. Recently during the PacSec conference in...

Gmail Will Warn Users Of Emails From Unencrypted Connections

11/15/2015, Sending emails in the business world and in your personal lives is a daily occurrence, and for the most part thanks to the advancements in technology and security, emails for the most part are a secure means of communications. However sometimes things do...

Researchers Demonstrate MITM Attacks On Samsung Phones

11/13/2015, A lot of OEMs like to think that their phones are secure, and for the most part we’d like to think that they have done their due diligence too. However sometimes certain loopholes are overlooked which can sometimes lead to disastrous results. Recently...

Twitch Introduces Two-Factor Authentication

11/10/2015, In the recent years it would seem like the number of websites and databases that have been hacked are on the rise. This has prompted companies to introduce new methods of authenticating oneself, such as using a fingerprint or using their iris. There have...

iOS 9.1 Update Breaks Touch ID For Some Users

11/06/2015, A couple of weeks ago we reported that iOS 9.1 had a bug that basically disabled the alarm clock for some users. As is the case with updates, sometimes it fixes certain things and sometimes it breaks certain things. While a disabled alarm clock might be...

Microsoft Envisions A Future Without Passwords

11/06/2015, Right now passwords are pretty central when it comes to products and services. For example we need a passcode to take out money from the ATM, passwords to log into our email accounts, passwords for our online banking, passwords for our phones, cloud...

BlackBerry Details How They Plan Keeping The PRIV Secure

11/04/2015, Following the discovery of the stagefright vulnerability several months ago, it prompted companies like Google, Samsung, and LG to introduce a new program in which they would issue monthly security updates for their devices so as to stay on top of things....

1Password For Teams Announced

11/04/2015, For those who are bad at remembering passwords, you might require a password manager like 1Password. This is great when you want to remember your own individual passwords, but what if you’re working in a team and you want to password protect certain...

Project Zero Discovers Security Flaws In The Galaxy S6 Edge

11/04/2015, For those unfamiliar with Project Zero, basically this is an effort from Google to attempt to find all kinds of security flaws, vulnerabilities, and exploits on the internet and in software that could compromise your identity or financial information and...

New UK Law Could Force Tech Companies To Hand Over Encryption Keys

11/03/2015, Love or hate Apple, if there is one thing that the company is doing right that most would agree on, is that they are giving its users the keys to the device’s encryption. This is what other companies such as Google have done as well, where basically...