Hello everyone!! Today I’m gonna tell about a cool & funny hacking technique named Shoulder Surfing. Mostly among you would’ve use this technique before too, but never knew about its name, so let me clear what is shoulder surfing in brief:
Shoulder…
House Moves to Sever Crypto-ties Between NSA and NIST
An amendment to the FIRST Act looks to restrict NSA access to standards process.
New Web Vulnerabilities Expose eBay User Data Again
Internet giant eBay is hit with fresh revelations over preventable flaws in its website.
Kali Linux 1.0.7 Release
Kernel 3.14, Tool Updates, Package Improvements
Kali Linux 1.0.7 has just been released, complete with a whole bunch of tool updates, a new kernel, and some cool new features. Check out our changelog for a full list of these items. As usual, you don&rs…
Lowe’s Warns Of Cloud-related Data Compromise
An insecure backup incident affects 35,000 employees over a period of nine months.
Outlook for Android Leaves Private Messages Wide Open for Stealing
The flaw in mobile app development plagues many messaging apps.
(ISC)² Announces GISLA Award Finalists for Government Security
(ISC)² will honor excellence in advancing the nation’s public-sector cybersecurity posture on June 3.
New Security Fears Over Keyboard and Trackpad Data Retention
Privacy International warns that various PC components could retain data, raising concerns over recycled IT kit.
Slick $5K Malware-as-a-Service Takes Over Android to Steal Financial Data
The powerful iBanking Android malware spreads beyond Russian cyber-gangs.
Über-Secure ProtonMail Beta Maxes Out Servers in Just 60 Hours
Lavabit heir built by CERN boffins sees huge demand for its NSA-proof email capabilities.