Is It Possible to Track Smartphone Location By Monitoring Battery Usage?

Data leaks through power consumption? Don’t be surprised because security researchers have discovered a way to track your every move by looking at your Android smartphone’s consumption of the battery power,even if you have GPS access unable.

 

Researchers at Stanford University and Israeli Defense Research Group, Rafael, have developed a new technology, which they have dubbed “PowerSpy”, that have capability to gather the geolocation of Android phones by simply by measuring the battery usage of the phone over a certain time.

 

Read the full article here.

Onion.City — Search Engine for Deep Web that Works From Normal Web Browser

There is an entire section of the Internet that you probably don’t see on daily basis, it’s called the "Darknet" or "Deep Web", where all browsing is done anonymously.

 

Onion.City, a new search engine for online underground markets that makes it more easier to find and buy drugs, guns, stolen credit cards directly from your Chrome, Internet Explorer or Firefox browser without installing and browsing via Tor Browser.

 

Read more.

​Facebook launches ThreatExchange for Sharing Cyber Security Threats

Social Networking giant Facebook has just launched a new platform called ThreatExchange, which is designed to mount a coordinated defense against cybercrime.

 

Many security professionals rely largely on manual methods for collecting, analyzing, and consuming information about latest cyber security threats such as malware and botnets.

 

ThreatExchange is a platform created by Facebook that enables security professionals anywhere to share threat information more easily, learn from each other’s discoveries, and make their own systems safer.

 

Read more

Cybercrime costs in Singapore hit S$2 billion, but insurance adoption low

SINGAPORE: Companies in the Republic lost nearly S$2 billion last year due to data loss or unplanned downtime arising from illicit cyber activities – a fact not lost on insurance companies, which are beginning to offer protection to firms here as cyberattacks become increasingly sophisticated. But as the industry gears up to offer coverage, which can include the cost of investigative work and rectification, market watchers say a general lack of awareness, underestimation of the risks of security threats and few precedents for designing and setting premiums are impediments.

 

Read more

Cisco Annual Security Report Exposes Widening Gulf between Perception and Reality of Cyber Threats

The Cisco 2015 Annual Security Report released today, which examines both threat intelligence and cybersecurity trends, reveals that organizations must adopt an ‘all hands on deck’ approach to defend against cyber attacks. Attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity.

 

For a complete copy of Cisco’s Annual Security Research report go to https://www.cisco.com/go/asr2015.

Cross Site Scripting vulnerability found in IE 11

A new Cross Site Scripting (XSS) vulnerability has been found in IE 11. According to an email sent by David Leo, a researcher with information security company Deusen, to the Full Disclosure mailing list, the vulnerability can allow an attacker to steal anything from a third party domain, and likewise inject anything into a third party domain.

 

Read more