Over 95 percent of SAP systems assessed had vulnerabilities that could lead to compromised data and disruption of critical business processes. On May 5, 2015, Onapsis revealed the three most common cyber attack vectors used for compromising SAP b...
Italian eyewear company Luxottica Working on Google Glass 2.0
An Italian eyewear company Luxottica said his company is working with Google engineers on not just one, but two new versions of the Google's Internet-connected eyewear device. Luxottica is better known for its two famous brands owns brands Oakley...
China Using ‘Great Cannon’ Program for Cybercensors to Down Internet websites
China's cybercensors have long used a "Great Firewall" to block its citizens from reading critical articles from Western news websites or consuming other content it disapproves. The tool marked a shift by Beijing towards an offensive strategy i...
Facebook Planning to integrate WhatsApp into Facebook Android App
Facebook has started planning to a new update in its 'Facebook for Android' app that includes the first major integration of popular messaging service WhatsApp. According to this update, a year after of acquiring WhatsApp Messenger, Facebook has ...
TrueCrypt Audit Confirms There is no NSA Backdoor Software
The popular encryption software TrueCrypt public audit has concluded that there is no government backdoors or unfixable vulnerabilities that could kill the project flat. TrueCrypt called it quits last year unexpectedly, saying that it "may contai...
Encrypted Communications are Biggest Problem for Security Agencies Tackling Terrorism
Europol police chief Rob Wainwright has warns sophisticated online communications are the biggest problem for security agencies tackling terrorism. Encryption is one of the most basic technique used by tech companies to protect their users' commu...
Facebook’s Building Aquila Drones to Provides Internet Via Lasers
Facebook is building a V-shaped unmanned aerial vehicles (UAVs), also known as drones, to help the company with its Internet.org project that aims to beam Internet access to the 5 billion people that don't have it yet. At the F8 conference Thursd...
Reuters Websites Blocked by China
The New York Times, Bloomberg News and The Wall Street Journal have previously been taken off the grid in China, on Friday they are recently blocked the Reuters news websites. The English and Chinese version were inaccessible but the Chinese clie...
9 Years old Boy Demonstrated How to Hack Android Smartphone
A 9-year-old cyber-security expert Reuben Paul has demonstrated how hackers could steal contacts, call logs and messages within just 15 minutes and he even offered to demonstrate on Friday. On Friday, Harmony School of Science third-grader Reuben...
Stay Away Your Systems From USB Killer
The USB Killer is a booby trap designed to look like an ordinary USB drive, hand-made USB drive that will "burn down" your laptop if you insert it into your USB slot. The “USB Killer” device was created by a do-it-yourself hardware enthusiast who...
UK Intelligence Agency GCHQ Spied on Thousands of People
Britain’s communications intelligence agency GCHQ illegally spied on more than 6,000 people in 24 hours have signed up to a campaign. On Monday, privacy International launched the campaign in the wake of a court ruling this month that said regula...
Helpouts Support Service Shutting Down By Google
Google was announced that they are shutting down its video tutorial service Helpouts on April 20, 2015 because it is not growing fast enough. It has been decided that there just is not enough interest to warrant keeping it running. Google Helpo...
Hackers, Spies and Criminals Can Listen Your Phone Calls and Read Messages
German Security researchers was discovered the massive security flaws that could be hackers, spies and cyber criminals can able to listen private phone calls and intercept text messages on a potentially massive scale. The Cellular company netwo...
Google Introduces New reCAPTCHA System : to find Human or Robot
As Google recently announced reCAPTCHA, this will protects the websites you love from spam and abuse. So, when you go online say, for some last-minute holiday shopping. You won't be competing with robots and abusive scripts to access sites. Captc...
More Than 400 ‘Dark Market’ Websites are Seized by FBI
On November 5, the FBI arrested 26-year-old Blake "Defcon" Benthall of San Francisco, who is allegedly the owner of online marketplace Silk Road 2.0, which was seized and closed down. Silk Road, in the same manner as a number of other darkweb s...
Now We Can Able To Access Facebook in Anonymous Network Tor
Facebook was implemented a new way for users to access its site via Tor “without losing the cryptographic protections provided by the Tor cloud” and disclosing their location. People connect to Facebook in many different ways, which is why we h...
Kmart Data Breach Exposes Credit Card Information
Kmart has been targeted in a data breach that exposed the debit and credit card information of customers. Sears Holding Corp. said in a Friday statement it is working with federal agents and a private security firm to investigate the breach of its...
Hackers’ Attack on JPMorgan Chase Affects Millions
A cyberattack this summer on JPMorgan Chase compromised the accounts of 76 million households and seven million small businesses, a tally that dwarfs previous estimates by the bank and puts the intrusion among the largest ever. The details of the...
New documents show legal basis for NSA surveillance programs
Documents released by the U.S. government show it views an executive order issued in 1981 as the basis of most of the National Security Agency's surveillance activities, the American Civil Liberties Union said on Monday. The NSA relied on Execu...
Is new "Bash Bug" worse than Heartbleed?
Internet security experts are warning that a newly-discovered programming flaw known as the "Bash Bug" or "Shellshock" may pose a serious threat to millions of computers and other devices such as home Internet routers. Even the systems used to run...
Socialize