Fitbit health trackers can track your health but not only! A vulnerability in a device that was reported back in March is still open, allowing…
Category: Threat
Cyber-Warfare: Offensive Versus Defensive Balance
Cyber-warfare is an ever-evolving form of global conflict which involves the use of computer networks and technology to conduct offensive or defensive operations. With the…
Siri and Google Now Hack: Hackers Control Your Virtual Assistants
Siri and Google Now Hack – a report comes from french cyber security researchers who discovered a way to control Siri and Google Now from…
Samsung Pay Technology Stolen by Chinese Hackers
Samsung Pay acquired Loop Pay, a company behind Samsung Pay technology, in February of this year for $250 mil. But months before the Massachusetts subsidiary…
Android Malware Infects 20 Countries
Android malware is on the rise and today another malicious player was uncovered by FireEye. Originated from China, Kemoge, the new evil adware is capable…
Multi Million Dollar Angler Ransomware Shut Down by CISCO
Cisco has shut down an Angler Ransomware Exploit distributor who was making estimated $30 million per year using a viral campaign. The exploit was encrypting user’s…
