News Clipping

The Problem with Mobile Phones [source: ssd.eff]

Mobile phones have become ubiquitous and basic communications tools—now used not only for phone calls, but also for accessing the Internet, sending text messages, and documenting the world. Unfortunately, mobile phones were not designed for privacy and security. Not only do they do a poor job of protecting your communications, they also expose you to new kinds of surveillance risks—especially location tracking. Most mobile phones...

Read More


New Bug Allows iPhone Passcode to be Hacked [source: interestingengineering]

Apple pushed back on the researcher’s demonstration calling the method an error. The company was proven to be correct when the expert double-checked his testing. A security researcher took to his Twitter account on Friday to reveal a bug on iOS devices that can allow passcodes to be bypassed through a brute force attack. The video demonstration caused Apple to push back calling the finding...

Read More


A hacker devised a method to unlock any iPhone and iPad device [source: securityaffairs]

A security researcher has devised a method to brute force a passcode on every Apple iPhone or iPad, even the up-to-date ones. Since iOS 8 rolled out in 2014, iPhone and iPad devices are protected with encryption, without providing passcode it is quite impossible to unlock the device. If the user enters more than 10 times a wrong passcode, the Apple device is wiped. Now the...

Read More


Wireless system can power devices inside the body [source: news.mit]

MIT researchers, working with scientists from Brigham and Women’s Hospital, have developed a new way to power and communicate with devices implanted deep within the human body. Such devices could be used to deliver drugs, monitor conditions inside the body, or treat disease by stimulating the brain with electricity or light. The implants are powered by radio frequency waves, which can safely pass through human...

Read More


New RedEye Ransomware Attack Destroy Computers [source: gbhackers]

Newly Discovered RedEye Ransomware spreading via Twitter and target the victims to encrypt the data and lock the file to demand the ransom amount in Bitcoin. Also, RedEye Ransomware is capable of destroying the victim’s computer after the warning time to pay the ransom amount. This New Ransomware variant created by the same author who is behind the Annabelle ransomware that was actively spreading earlier of this...

Read More


Page 45 of 123« First...102030...4344454647...506070...Last »