Top Menu

Security

KRACK

Wi-Fi security has been breached, say researchers

We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to […]

Continue Reading 0
CCleaner

Hackers compromised CCleaner free software (CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191)

If you have installed CCleaner recently, you need to uninstall it and reinstall the latest version. Dear CCleaner customers, users and supporters, We would like to apologize for a security incident that we have recently found in CCleaner version 5.33.6162 and CCleaner Cloud version 1.07.3191. A suspicious activity was identified on September 12th, 2017, where […]

Continue Reading 0
blueborne

A Bluetooth exploit – BlueBorne, hackers can enter your phone in 10 seconds

Your phone, computer, smartwatch, and smart home devices are at risk of being hacked whenever Bluetooth is on. The vulnerability, known as BlueBorne, was discovered by security research firm Armis. Armis Labs revealed a new attack vector endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using […]

Continue Reading 0
Windows

Microsoft releases additional updates to protect against potential nation-state activity

On May 12, 2017, the WannaCrypt ransomware served as an all too real example of the danger of cyber attacks to individuals and businesses globally. In reviewing the updates for this month, some vulnerabilities were identified that pose elevated risk of cyber attacks by government organizations, sometimes referred to as nation-state actors or other copycat […]

Continue Reading 0
Lookout_Icon

How to check for Pegasus iOS Spyware on your iPhone or iPad

What is Pegasus Spyware? Pegasus is professionally developed and highly advanced in its use of zero-day vulnerabilities, code obfuscation, and encryption. It uses sophisticated function hooking to subvert OS- and application-layer security in voice/audio calls and apps including Gmail, Facebook, WhatsApp, Facetime, Viber, WeChat, Telegram, Apple’s built-in messaging and email apps, and others. It steals […]

Continue Reading 0
Google_App_Icon

Google made 2-Step authentication easier to use

Google has added a feature to make 2-Step verification easier. Instead entering a verification code, you can get approved by a prompt on your phone. To enable this option, go to My Account, section “Sign-in & Security” and choose “Signing in to Google” followed by “2-Step Verification.” There, choose “Google Prompt” as the default option, […]

Continue Reading 0