Tags archives: security

Network security firm, Palo Alto Networks has discovered a new malware, monikered YiSpecter that infects iOS devices by abusing private APIs. Most affected users live in China and Taiwan. Once YiSpecter infects a phone, it can install unwanted apps; replacing genuine apps with ones it has downloaded, send user information back to its server. It can force apps to show full-screen advertisements, change default search engines and bookmarks. The malware automatically reappears even after users manually delete it from their iOS devi...
Following weeks of investigation, editors who work on the English version of Wikipedia blocked 381 user accounts for “black hat” editing. The accounts were engaged in “undisclosed paid advocacy” – a term used for editors who create fake pages and promotional articles using misinformation on existing pages on Wikipedia, and promise to protect those pages in exchange for a free without revealing their affiliation, in violation of Wikimedia’s Terms of Use. Essentially, hackers were hired to spread misinformation across pages on Wikipe...
ICANN the arbiter and overseer of the entire Internet’s domains and web addresses has been hacked, potentially compromising names, email addresses, passwords, and more info. ICANN short for the Internet Corporation for Assigned Names and Numbers wrote in a blog post usernames and encrypted passwords for profiles on its ICANN.org site have been compromised by an unauthorized party. The global internet authority revealed in an email to Motherboard that investigations are currently going on. Accounts containing usernames, email add...
Since last 15 years, the Internet revolution has redefined the definition of business to consumer industries. These industries include financial services, media and retail marketing. In the coming 10 years, it will fix its paws over manufacturing, transportation, energy, agriculture and other industrial sectors. Together the industrial sector economy for IoT accounts for almost two third of the overall GDP. It will fundamentally transform the interaction between humans and machines. Named by British entrepreneur, Kevin Ashton in th...
Google Tone is most likely not what you think. It has zero to do with music, for one, or for doling out in any way to which we’re used to. Okay, it’s pretty much based on sound, but not sound that we as being can hear. There are no locations, digital handshakes, or encryption keys involved here. Ironically, network security is amusingly naked, on the other hand, blocking out wire tappers is as easy as pie. There are no locations, computerized handshakes, or encryption keys. Google Tone is a Chrome browser extension that is confined...