Just An SMS Could Let Remote Attackers Access All Your Emails, Experts Warn

Beware! Billion of Android users can easily be tricked into changing their devices’ critical network settings with just an SMS-based phishing attack.

Whenever you insert a new SIM in your phone and connects to your cellular network for the very first … Continue reading Just An SMS Could Let Remote Attackers Access All Your Emails, Experts Warn

New Trojan Turns Thousands Of Linux Devices Into Proxy Servers

“Linux doesn’t get viruses” — It’s a Myth.

A new Trojan has been discovered in the wild that turns Linux-based devices into proxy servers, which attackers use to protect their identity while launching cyber attacks from the hijacked systems.

Dubbed Linux.Proxy.10, the Trojan was first spotted at the end of last year by the researchers from Russian security firm Doctor Web, who later

Continue reading New Trojan Turns Thousands Of Linux Devices Into Proxy Servers

Here’s How Riffle Anonymity Network Protects Your Privacy better than Tor

Online privacy is an Internet buzzword nowadays. If you are also concerned about the privacy of your web surfing, the most efficient way is to use TOR – a free software that lets users communicate anonymously by hiding their actual location from snoopers.

Although TOR is a great anonymous network, it has some limitations that could still allow a motivated hacker to compromise the anonymity of

Continue reading Here’s How Riffle Anonymity Network Protects Your Privacy better than Tor