Category Archives: News

blog-3

Chinese facial recognition database exposes 2.5m people

16/02/2019 / by

A company operating a facial recognition system in China has exposed millions of residents’ personal information online. Shenzen-based SenseNets is an artificial intelligence company that uses a network of...

Read more
blog-3

Linux user? Check those patches! Public exploit published for systemd security holes…

01/02/2019 / by

A pair of recent bugs in a very widely used Linux system tool called systemd have just been “weaponised” by a US cybersecurity company called Capsule8. The systemd project is a large, complex...

Read more
blog-3

Matrix under the microscope: what a niche ransomware can teach us

01/02/2019 / by

In the world of computer security, a great deal of time and column inches are devoted to the extremes. At the extreme of simplicity, we have the immortal mystery...

Read more
blog-3

Change your password! VoIP provider leaves huge database exposed online

18/01/2019 / by

A researcher has discovered an exposed database containing gigabytes of call logs, SMS data, and internal system credentials belonging to US Voice-over-IP (VoIP) service provider VOIPo.com. It’s become a familiar story...

Read more
blog-3

Don’t fall victim to the Chromecast hackers – here’s what to do

05/01/2019 / by

If you ever used dial-up networking to access the internet, you probably remember it mostly for being cumbersome and slow. But it was also astonishingly insecure, because your computer...

Read more
blog-3

Security company claims it can access data from locked iPhones with 100% success rate

16/12/2018 / by

Despite Apple’s best efforts, it appears that security researchers are still coming up with ways to access data on an otherwise locked iOS device. Most recently, a data recovery...

Read more
blog-3

Does wiping your iPhone count as destroying evidence?

19/11/2018 / by

Police are accusing a 24-year-old woman, arrested in connection with a drive-by shooting, of remote-wiping her iPhone and thereby destroying evidence – a felony offense. Her defense: I don’t...

Read more
blog-3

How one man could have taken over any business on Facebook

06/11/2018 / by

The flaws in Facebook’s social network just keep coming. The latest one, luckily discovered and reported by a white hat researcher, enabled anyone on Facebook to make themselves (or...

Read more
blog-3

Attackers use voicemail hack to steal WhatsApp accounts

08/10/2018 / by

Another online account hijacking attack has emerged, this time targeting WhatsApp. The Israeli agency responsible for cybersecurity has warned its citizens about the attack, which can often be conducted...

Read more
blog-3

Android password managers vulnerable to phishing apps

30/09/2018 / by

Researchers have discovered that several leading Android-based password managers can be fooled into entering login credentials into fake phishing apps. Password managers can be used to create, store, enter...

Read more