Zoom Faces More Legal Challenges Over End-to-End Encryption
The video-conferencing specialist has yet to roll out full encryption, but it says it’s working on it.
The video-conferencing specialist has yet to roll out full encryption, but it says it’s working on it.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
We’ve been hearing rumors Apple may try to integrate its various subscription services for nearly a year, but a report by Bloomberg today provided more information on the potential launch. According to the report, the subscription will be called ‘Apple One‘ and could launch alongside the iPhone 12 in October. The report comes courtesy of…
The APT is becoming more sophisticated over time.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Oh dear, oh dear, today has been very exciting for Fortnite fans. Apple has banned the game from the App Store, and developer Epic Games has now retaliated with a lawsuit. Even that’s not doing the acidity of this feud between the two justice. And now Google has also banned Fortnite from the Google Play Store. What the heck…
A never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
A revamped version of England‘s troubled contact-tracing app is beginning trials today, but the new system has got problems of its own. The app uses Bluetooth to detect if people have recently been close to someone who’s tested positive for COVID-19. The government says the system’s “designed with user privacy in mind so it tracks…
A team of academic researchers—who previously made the headlines earlier this year for uncovering severe security issues in the 4G LTE and 5G networks—today presented a new attack called ‘ReVoLTE,’ that could let remote attackers break the encryption used by VoLTE voice calls and spy on targeted phone calls. The attack doesn’t exploit any flaw in…
China-based lending company Moneed’s unprotected database has exposed the names and phone numbers of millions of Indians, putting them at risk of identity theft. Security researcher Anurag Sen found this database on an open elastic server that had more than 389 million phonebook records. Moneed has offices in Hangzhou, New Delhi, and Hong Kong. Sen told…
Attention! If you use Amazon’s voice assistant Alexa in you smart speakers, just opening an innocent-looking web-link could let attackers install hacking skills on it and spy on your activities remotely. Cybersecurity researchers today disclosed severe security vulnerabilities in Amazon’s Alexa virtual assistant that could render it vulnerable to a number of malicious attacks. According…
Twitter‘s had a rocky relationship with third-party developers creating apps on top of the service. Over the years, it has introduced limitations for apps such as the active number of tokens and the number of actions (you know, tweets, retweets, likes, and DMs) within a time frame, making it difficult to craft things like alternative Twitter clients. But…