Technology

Hacked Apps Put on iPhones Using Hijacked Apple Technology

Bad news for iPhone users! Apple technology has been hijacked by software pirates and used to put hacked apps on iPhones. Reuters reports that software pirates, using hijacked Apple technology, have distributed hackers’ versions of some popular apps, including Spotify, Angry Birds, Pokemon Go and Minecraft. As per the report from Reuters, illicit software distributors

[ Read More ]

How to Secure Your ACS (Access Control System)

We live in a world where cybercrime has become a very common thing. Cybercriminals, who are turning more and more sophisticated with evolving technology, are always on the lookout for security holes that they can exploit to access systems, devices and networks to steal all kinds of data, ranging from corporate data to sensitive personal

[ Read More ]

Amazon’s Ring Security System, Beware! You Are Being Watched

An interesting saga that is making rounds on the internet is that Amazon’s Ring devices granted the company’s Ukraine-based research and development team as well as U.S. executives and engineers a free round the clock access to live feeds from some customer’s cameras, obviously, Ring denies the claim. Regardless of whether they needed the information

[ Read More ]

Discussing Cybersecurity Best Practices in the New Year

2019 is just over a week old; we at The Threat Report take this occasion to discuss cybersecurity best practices, stressing on important aspects including importance, training et al. Let’s begin with a proper introduction. Well, as part of the introduction, we’d like to point out that for any business today, especially those that depend

[ Read More ]

Use Security Technology to Improve Business Operations

Security technology would continue to be as important for businesses in 2019 as it was in 2018; in fact, it would be much more important in 2019 than it was in 2018. As we know, security technology today is integral to business operations and contributes greatly to the continuity of any business and its operational

[ Read More ]

User Resistance to UI Changes In Browsers Intensifies Recently

Mozilla Firefox underwent a massive UI change seven versions ago in Firefox 57 under the code name Quantum, its community is divided, but mostly accepted the changes as it provides speed. Google followed Mozilla’s footsteps, as it initiated a UI overhaul for Chrome in version 69 last September. However, compared to Firefox which is lagging

[ Read More ]

Nokia Has Had Enough Of Daring New Malware Threats

If you’re like most people between the ages of 30-50, the Nokia brand probably gives you fond memories of seemingly indestructible pre-iPhone cell phones, which could last for a week on one battery charge. But even though Nokia lost significant phone market share as the iOS and Android wars became a thing, the Finnish corporation

[ Read More ]

Colossal Privacy Risks of Everyday Digital Afterimages

What’s an afterimage, you ask? It is a visual phenomenon where a picture continues to appear in your sight, even after you’ve stopped looking at it. You know the one. If you’ve ever seen a spot of light after a bright camera flash, you’ve experienced an afterimage. Try the following experiment. Stare right at bright

[ Read More ]

Here’s Why Your Voice Is The Best Kind Of Password

Our voices are as unique as each individual snowflake that falls from the sky. This distinction is not only based on the shape and size of our vocal cords but also the build of our body and the structure of our vocal tract. All of these components affect the way we articulate speech, create sounds,

[ Read More ]

Is The Backlash Of China’s Relentless Cyberwar Crippling America?

Times sure have changed.  It used to be, if you were interested in politics, you went into politics—maybe built up credentials in foreign affairs or law. And if you liked technology, you went into science, computer science, or some related discipline. But those idyllic days of relative separation are long gone. Now, we inhabit a

[ Read More ]