WhatsApp Delays Controversial ‘Data-Sharing’ Privacy Policy Update By 3 Months

WhatsApp said on Friday that it wouldn’t enforce its recently announced controversial data sharing policy update until May 15. Originally set to go into effect next month on February 8, the three-month delay comes following “a lot of misinformation” about a revision to its privacy policy that allows WhatsApp to share data with Facebook, sparking widespread concerns about the exact kind of information that will be shared under the incoming terms. The Facebook-owned company has since repeatedly clarified that the update does not expand its ability to share personal user…

Read More

Experts Sound Alarm On New Android Malware Sold On Hacking Forums

Cybersecurity researchers have exposed the operations of an Android malware vendor who teamed up with a second threat actor to market and sell a remote access Trojan (RAT) capable of device takeover and exfiltration of photos, locations, contacts, and messages from popular apps such as Facebook, Instagram, WhatsApp, Skype, Telegram, Kik, Line, and Google Messages. The vendor, who goes by the name of “Triangulum” in a number of darknet forums, is alleged to be a 25-year-old man of Indian origin, with the individual opening up shop to sell the malware…

Read More

What Is Password Cracking? And Types Of Attacks?

password cracking

When we think about password cracking we think we really hack the password of that person yes it is right. In the real world, we actually recover the password from that specific computer system. The Password cracking term is a bit different from other terms and very interested. Password Cracking Password cracking techniques are used to recover passwords from the data that have stored in or transmitted by computer systems. Attackers use password-cracking techniques to gain unauthorized access to the vulnerable system. Most of the password cracking techniques are successful…

Read More

Data Breach

Data Breach

“A Data Breach is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve financial information such as credit card or bank details, personal health information (PHI), Personally identifiable information (PII), trade secrets of corporations or intellectual property. Most data breaches involve overexposed and vulnerable unstructured data – files, documents, and sensitive information. Ebay Data Breach One of the real-life examples describing the need for information and network security within the corporate…

Read More