Tag Archives Identity Theft

With every gap pronounced, Whatsapp is releasing updates to close them and ensure a seamless user experience. Currently, WhatsApp is all set to introduce a new feature which will allow you to recall messages that were sent by mistake. As part of this update, Whatsapp will also allow live location tracking to know your contacts’ whereabouts in real-time. Interesting, isn’t…

The news is going to come down like double jeopardy for the Indian public who are already coping with Demonetization. The ATMs currently in use are susceptible to data breach and hacking because they run on outdated Microsoft software. To understand the situation better, imagine the software as a sentinel. Without upgradation and continuous improvement, the ATMs running on outdated…

When most 22 year olds are partying and picking up less lethal challenges. Javed Khatri decides to storm up things a bit. In a streak of positive patriotism, the young App developer from Mumbai hacked into the PM’s app. He claims that his intent was not malicious. It was a constructive effort to point out the loopholes in the current…

Xcode Ghost is a new type of malware, uniquely created and executed in cracked versions of Xcode, Apple’s tool for iOS and OS X app development. This malware is loaded onto apps, and works in the background of the application, seizing user information, which possibly included usernames and passwords. Apple has long been known to maintain an app store that’s…

Yes that is all it takes a $100 bill to purchase electronic gadgets that can unlock iPhone passcodes. Recently,  a computer scientist from Cambridge was able to clone the iPhone's memory chips and thus be able to bypass the limitation on attempts to guess the passcode. And this comes after the so called attempts by FBI to not being able…

When one trusts someone or something, there is little hesitance in sharing in the real world but in the virtual world, things could be quite different as users of OnLogin discovered recently. OneLogin in a recent blog post came out with an advisory for it's customers notifying them that a serious flaw in their logging system enabled hackers to steal…

The Backhat Hat / Def Con conference demonstrated a variety of attacks through the browser one of which is called the H.E.I.S.T attack which again stands for "HTTP Encrypted Information can be Stolen through TCP windows",. This is a new way hackers have discovered to find out a way for JavaScript to determine the size of data being sent through…

All the time we can fabulous email offers purportedly from familiar sources, be it your bank or  the IRS or even an online service such as Twitter. And all one needs to do is sign into their account to avail of the offer. Generally these offers are time limited so that you need to hurry and fill up the details…

The first person to have been killed by playing a game has finally happened. Thanks to Pokemon Go. The virtual reality mobile game that has caught frenzy among millions of people across the world. According to the New York Post, Jerson Lopez de Leon and his cousin tried to break into a home in Chiquimila, a town about 100 miles…

Close