One of the security features of WhatsApp is support for end-to-end encryption. This means that messages sent and received through WhatsApp are encrypted, which in theory means that no one would be able to intercept and read your messages mid-transmission. However, security researchers at Check Point are now suggesting otherwise.
Apple’s official accessories are pretty expensive and that is a reason why many users opt to use cheaper and unofficial accessories that cost a fraction of the price. However, potential safety and compatibility issues aside, there is a good reason to avoid using these unofficial accessories.
The idea of implanting technology into our bodies isn’t exactly new. However, it seems that one particular biohacker by the name of Amie DD has gone one step further by implanting an RFID chip into her arm, which in turn could be used by her to unlock the door to her Tesla Model 3 vehicle.
Banks hold a lot of sensitive information about us, such as our money, where it comes from, who it’s being sent to, our home addresses, credit card numbers, contact information, and so on. This means that should such data ever get out, it could spell big trouble for both the bank and their customers.
Law enforcement agencies have been trying to find a way to get into Apple’s products, such as their iOS devices and iCloud. This is because they believe that some suspects could be hiding evidence on their devices, but unfortunately due to the way Apple has created their products, it is rather difficult for law enforcement to get in.
If you’ve ever seen photos of people’s laptops with their webcams covered or taped up, it is because there is a legit concern about how the webcams on our laptops can be hijacked to be enabled without our knowledge. Given that they’re built into the display, it’s not as if we can point it away or unplug it so easily.
Cellebrite, for those unfamiliar, is an Israeli mobile security company who gained attention when it was revealed that they had managed to crack Apple’s iPhones, allowing them to gain access to the contents of the device without needing the passcode or biometric authentication from the owner of the device.
There is a good reason to choose strong and secure passwords and also to enable 2FA whenever you can. Sure, it might be more troublesome, but the trouble now might be worth it in the future compared to trying to recover a stolen account. For anyone who has experienced trying to recover a hacked account, you know what we mean.
As some of you might have heard, Telegram had recently experience some connectivity issues in which a DDoS attack was to blame. However, it seems that this was more than just a regular DDoS attack, it was one that could have been orchestrated by a country, or at least that’s what Telegram’s CEO, Pavel Durov is implying.
Whenever you travel to a new country, you usually need to hand over information about yourself, such as your passport. Some countries might even require you to scan your fingerprints, take a photo, and if you’re driving, you might also need to submit the license plate of your vehicle.
Your password can be stolen in a variety of ways. The most common way is by using a very easy-to-guess password in which hackers won’t even need to try too hard to break into your account. Other more complex ways involve phishing, where hackers create a website that mimics the website of a service you use and once you enter your credentials, that information is stolen.
We all sign up for a variety of services, both online and offline, and usually these services require us to provide personal information, such as our names, phone numbers, home addresses, personal identification numbers, and so on. It is usually assumed that the information will be stored safely and securely, but unfortunately, that isn’t always the case.
In recent years, we have been hearing reports of how some major hotel chains have had their databases hacked which exposed a ton of customer information in the process. Unfortunately, it seems that a new leak has been discovered which could potentially be worse than the previous leaks.
For the most part, hacking is considered an illegal activity. Unfortunately, despite its illegal nature, many still go about doing it. Sometimes, and only sometimes, those efforts pay off where there are some companies and organizations who are so grateful and/or impressed with the hackers that they offer them a job instead of pursuing legal charges against them.