400

How to keep WhatsApp account safe when one looses phone

Losing your phone is not just an unpleasant experience but it makes one worried about the important and personal details which are stored in your handset. A lot of people use Whatsapp as one of their primary apps these days, and they get confused and wonder about what to do in case of their phone being stolen since one cannot deactivate the app remotely. So, here we are with a few steps rolled out by Whatsapp on how to keep your account safe when your phone is broken, stolen or lost.

Get your SIM locked: The very first step here is to lock your SIM card which can be easily done by calling up the customer care number of your telecom operator. One the SIM is locked, your Whatsapp will automatically stop working as there will be no facility of verification code being sent through SMS.

260

#OnlineThreats: Zoom Security Flaw Lets Hackers Take Control of Your PC, Patch to be Issued Soon

New Delhi: Zoom has already had its fair share of cyber security issues for a lifetime, and the video conferencing app took a while (and Alex Stamos) to steady its ship on the security front after finding unexpected popularity due to the Covid-19-necessitated work from home mandates. Now, it appears to still have retained a critical security flaw that could allow threat actors with intent to exploit the vulnerability and undertake a remote code execution (RCE) attack to take control of host PCs. The vulnerability was discovered by two Computest cyber security researchers at the recent Pwn2Own competition, organised by the Zero Day Initiative.

120

Personal details of 61 lakh Indian Facebook users leaked online

Personal details such as phone numbers of around 6.1 million (61 lakh) Indians on Facebook have allegedly been leaked online and posted on hacking forums, according to a cybersecurity executive.

According to Alon Gal, co-founder and chief technical officer of cybersecurity firm Hudson Rock, personal data of 533 million Facebook users globally - including names, phone numbers and other details - was allegedly leaked online and posted for free on hacking forums.

"All 533,000,000 Facebook records were just leaked for free. This means that if you have a Facebook account, it is extremely likely the phone number used for the account was leaked," Gal has said in a tweet flagging the issue.

100

Facebook gives users more control over their news feed

PM Modi reviews COVID-19 situation in India, calls for five-fold strategy - Key…

Upcoming CarWale reviews and videos to go live from 5 to 10 April

Facebook has introduced a set of new features that will make users choose how the content appear in their news feed. The feature, called News Feed Filter Bar, essentially lets you see posts chronologically.    

Instead of relying solely on Facebook's algorithm to see what they see, users will be able to switch between the regular news feed,  the most recent posts and a news feed that shows posts from your "favorite." It's basically a reverse-chronological feed.

80

#AndroidMalware: Fakesysupdate, the Suspected Spyware Can Have Devastating Consequences

New Delhi: Of all the cyber security threats that are posed to us on the internet today, one of the very biggest ones include spyware. This very specific form of malware is excellent at masking itself away from the public eye, works to escalate privilege on device, thus letting hackers take over devices from remote servers. One such newly discovered tool is taking the form of an Android system update, and subsequently gaining access to practically all data and permissions on a phone. First discovered by security researchers at Zimperium zLabs and termed FakeSysUpdate, the suspected spyware can have devastating consequences, according to reports about it.

In essence, the Android system update malware can do anything it pleases. Once it is installed on a user’s phone, the tool works in the background without any particularly noticeable discrepancies. Users typically see a notification that reads ‘searching for update…’, hence posed as something that any average user may easily mistake to be a legitimate system update notification. Once installed, the tool becomes active to give malicious threat actors a direct route into a person’s device. The consequences from here are tremendous, hence establishing belief among cyber security researchers that the tool is actually spyware, and not the more mass-market stalkerware that are found commonly.