Two French researchers have created a rig consisting of a USRP (Universal Software Radio Peripheral) radio, an antenna, an amplifier as well as a laptop running the GNU Radio software to test if they can control Siri, Cortana and Google Now remotely. Unfortunately the straightforward answer is yes, although there … |More
The story about Hillary Rodham Clinton’s use of a private email server for purposes that are far beyond the personal level has gone viral. When Mrs Clinton served as US Secretary of State she should have thought her actions through better… Using private, potentially less secure, email when dealing with … |More
Most cybersecurity weaknesses put personal data, company information, or intellectual property at risk of being hacked. The weakness in Chrysler’s Uconnect infotainment feature could lead to people literally being driven off the road.
Fiat Chrysler Automobiles (FCA) has been manufacturing cars of all types for decades. This exploit … |More
Lurking deep in the depths of legitimate online websites is malvertising, a lesser known but just as insidious type of malware. Its tentacles spread deep and wide across the internet. Websites you visit every day have been compromised. YouTube, Yahoo and Spotify – to name a few!
According to the … |More
The global hospitality company, Hilton, is investigating claims of a data breach. Whilst the actual number of properties that might have been affected is not publicised, it is known that a data breach affected a “large number of Hilton Hotels and franchise properties” operating in the United States. Hackers are … |More
One of the most trusted tech giants Apple has recently experienced a cyber attack that affected Apple Store apps used on both iPhones and iPads in China.
Hackers created a genuine looking fake version of Apple’s software for building iOS and MAC apps, Xcode. App developers were a main target … |More
Russian national Vladimir Drinkman has pleaded guilty to participating in a major hacking scheme that resulted in the theft of millions of credit card numbers and millions of dollars in damages. He was arrested in the Netherlands in 2012: Drinkman fought extradition to the United States from a prison there … |More
The correct answer is – LockerPin. LockerPin Ransomware.
You’ve probably faced a situation where you had the last try to enter your PIN when you wanted to withdraw cash from the ATM. You probably forgot your email password after changing it a day before. You might even have lost your … |More
The Android application “Adult Player” contains ransomware. Have you come across it? If you don’t have a straight answer, then probably not. The functionality of the app is more than just viewing a few naughty pictures and videos. You can also become one of the “models” too, although it does … |More
Financial institutions are indeed amongst those sectors that are extensively targeted by cyber criminals, regardless whether cyber thieves want to benefit from stolen data financially or simply intend to make a statement. Remember when Nationwide Building Society received a fine of almost £100,000 because it didn’t have appropriate resources in … |More