Monday, July 24, 2017

YiSpecter — First iOS Malware that Attacks both: Non-jailbroken and Jailbroken...

Less than a month after Apple suffered one of its biggest malware attacks ever, security researchers have discovered another strain of malware that they...

Warning! Popular Apple Store Apps Infected with Data-Theft Malware

Unlike Google Play Store, Apple App Store is well known for not allowing any malformed apps to enter its Apple ecosystem because of its...

THN Weekly Roundup — 15 Most Popular Cyber Security and Hacking...

We are once again here with our weekly round up based on last week’s top cyber security threats and challenges. I recommend you to read...

Techie Police Officer Builds a Sniffing Tool to Track Stolen Devices...

Ever wonder, How can you Track your Stolen Smartphone, Laptop or any Smart Device? ...With IMEI Number? ...Or IP address? ...Or may be some special types of...

New Rules Require FBI to Get Warrant for Spying With ‘Stingrays’...

Remember StingRays? The controversial cell phone spying tool, known as "Stingrays" or "IMSI catchers," has been used by authorities to track criminal suspects most of...

26 Android Phone Models Shipped with Pre-Installed Spyware

Bought a brand new Android Smartphone? Don't expect it to be a clean slate. A new report claims that some rogue retailers are selling brand-new...

Incomplete ‘Stagefright’ Security Patch Leaves Android Vulnerable to Text Hack

Wanna hack someone's Android smartphone by sending just an MMS message? Yes, you can, because Google's patch for the Stagefright vulnerability in hundreds of Millions...

Facebook Fired An Intern After He Exposes How to Track Users’...

Previously, we posted about a privacy issue in Facebook messenger; Aran Khanna, a Harvard University student, discovered ‘A Marauder’s Map’ that could sense and...

Untethered TaiG Jailbreak Tool for iOS 8.4 [Mac OS X version]...

Good news for iOS 8.4 users! The Chinese jailbreaking team TaiG has finally released its long-awaitedUntethered Jailbreak tool for Apple's iOS 8.4 mobile operating...

Most Vulnerable Smart Cities to Cyber Attack on Internet of Things...

Imagine… You drive to work in your Smart-Car connected to the GPS automatically, but a hacker breaks into your car's network, takes control of the...