DHS, FBI describe North Korea’s use of FALLCHILL malware

The federal government on Tuesday issued an alert detailing the North Korean government’s use of malware known as FALLCHILL, warning that North Korea has likely been using the malware since 2016 to target the aerospace, telecommunications, and finance industries. The alert — issued jointly by the FBI and the US Computer Emergency Readiness Team (US-CERT), […]

DHS, FBI describe North Korea’s use of FALLCHILL malware Read More »

A Vietnamese Security Researcher shows how to hack Apple’s Face ID

A publication on Friday by Bkav, a Vietnamese cybersecurity firm, that it had broken Apple’s Face ID, and A video apparently showing an iPhone being opened when pointed at a mask, was greeted with some skepticism. Ngo Tuan Anh, Bkav’s vice president, gave News several demos, first unlocking the phone with his face and then

A Vietnamese Security Researcher shows how to hack Apple’s Face ID Read More »

OnePlus pre-installed a factory app that allows Root access

Elliot Anderson (mobile security researcher) has found a pre-installed factory app in all OnePlus devices running OxygenOS that could enable anyone to gain root access to the devices.OnePlus devices (most of them) come preinstalled with an app called EngineerMode that can be used to root the device and may be turned into a completely-fledged backdoor

OnePlus pre-installed a factory app that allows Root access Read More »

Security vulnerability in IoT cameras could allow remote control by hackers it

Newly uncovered vulnerabilities in a popular brand of indoor internet connected cameras could be exploited by attackers in order to gain complete control of the device. Security issues with the Foscam C1 Indoor HD Camera could allow hackers to remotely access the device, according to researchers. Read more

Security vulnerability in IoT cameras could allow remote control by hackers it Read More »

How criminals clear your stolen iPhone for resale

Mobile devices, being valuable, expensive, and both thin and light enough for sticky fingers, are a constant target for thieves worldwide. Smartphones and tablets are an investment and over time they have become a key to our digital kingdom with connected email accounts, social media, and cloud services — rendering their value not only in

How criminals clear your stolen iPhone for resale Read More »

Face ID just got Hacked with the help of a mask by a security firm

Apple uses the Tenth Anniversary iPhone X Phone to replace Touch ID. Because the award handset features an edge-to-edge protection and has very slim bezels, Apple had to get up with a way to reinstate the fingerprint scanner that powers Touch ID. So the group in Cupertino decided to use a facial identification system to

Face ID just got Hacked with the help of a mask by a security firm Read More »

Security researchers were able to bypass the iPhone X’s Face ID system using a specially crafted mask

Bkav (security firm) said that it was able to bypass the iPhone X’s Face ID system using a specially crafted mask, although Apple attempts to specifically prevent that fraud, but normal users have no obvious reasons to be concerned about the claimed attempts. Read more

Security researchers were able to bypass the iPhone X’s Face ID system using a specially crafted mask Read More »

How did someone hijack your Gmail? Phishing, keylogger or password reuse, we’re guessing

Google has teamed up with computer scientists at the University of California, Berkeley, to find out how exactly hijackers take over its users’ accounts.The eggheads peered into online black markets where people’s login details are bought and sold to get an idea of the root cause of these account takeovers and the subsequent theft of

How did someone hijack your Gmail? Phishing, keylogger or password reuse, we’re guessing Read More »