Apple Pay Competitor CurrentC Hacked
Recent news reports that Apply Pay and Google Wallet payment options in many US stores are being dropped to support a competing service. Those who are currently CurrentC, the service...
Recent news reports that Apply Pay and Google Wallet payment options in many US stores are being dropped to support a competing service. Those who are currently CurrentC, the service...
For the majority of users that have experienced it, losing a mobile phone whether due to accidental reasons or theft is a rather troublesome (and traumatic) experience - all the lost...
New iPhone owners in China have apparently been subject to a dedicated man-in-the-middle (MITM) attack from their own government. Users have been reporting that all connections to iCloud.com are currently...
A series of data breaches over the last year has caused the South Korean government to reconsider the national identification system. This is due to the fact that so many...
Cyber-security company iSIGHT has revealed the details of a Russian cyber-espionage campaign conducted against NATO countries that has been conducted over the last year. The attacks were perpetrated by using...
Another day, another leak: hundreds of users name and password belonged to Dropbox users have been posted online earlier today on Pastebin by an anonymous user. It just a small...
Apple has just started sending emails to users with two-step verification activated for their iCloud, reminding then that starting tomorrow, iCloud will require app-specific passwords. This is part of the...
News of a piece of malware infecting Mac OS X computers surfaced over the weekend as some 17,000 systems fell prey to the unusual attack. First noticed by Dr.Web, the...
Two months ago, security researcher Karsten Nohl demonstrated an attack he called BadUSB. Nohl showed that it was possible to corrupt any USB device with undetectable malware; because of the...
Pro-democracy protest continue in Hong Kong, and it appears that a different problem has been spreading among the demonstrators. Lacoon Mobile Security has reported the existence of a fake mobile...
The Unix Bash shell vulnerability that appeared recently is now actively being used by hackers to attack systems. Security firms have been issuing warnings and reports of attacks happening only...
A new security vulnerability has been uncovered in one of the most installed Linux utilities. The problem stems from a bug in the Bourne again shell, or Bash, which serves...
©2026 VIJANDREN RAMADASS. ALL RIGHTS RESERVED.