Your laptop Camera could spy on you without lighting up the warning light.

If you own a MacBook or any other laptop, you should cover up it's webcam, because there’s a possibility someone could be watching you.
Most of the webcam have a tiny light lets you know that the webcam is active, but it's possible for malware to disable this important privacy feature.
Two Students from Johns Hopkins University  Matthew Brocker and Stephen Checkoway created a proof of concept app called “iSeeYou” that confirmed that MacBook iSight webcams can spy on their users without the warning light being activated.
A young man recently pleaded guilty in court to extortion after he performed a remote hack on Miss Teen USA’s webcam to secretly collect nude photos. It was revealed through court papers that the FBI has the ability to do the same thing with a variety of current laptops including Apple products.
Your laptop camera could Spy on You without lighting up

Rogue Gaming app that steals WhatsApp conversations.


Many of my friends ask me if it is possible to steal WhatsApp chat messages and how, of course a malware are an excellent answer to it.
Spreading the malware through an official channel the attacker could improve the efficiency of the attack,and it is exactly what is happening,an Android game that was published on the official Google Play store to stealthy steal users WhatsApp conversation databases and resell the collection of messages,images,video etc on an internet website.The game “Balloon Pop 2” has been identified and removed from Google Play store,it was able to spy on conversations made via WhatsApp and upload them to the WhatsAppCopy
website.On the website the Android game BalloonPop 2 is advertised as a way of backing up any device’s WhatsApp conversation.
The website managers sustain that their app is a legitimate game that could be used to back up
WhatsApp messages and they aren't responsible for its abuse for spying purposes.
The attacker paying a fee could view the stolen WhatsApp conversations from the website but it is necessary to provide the phone number
of the targeted Android device to read the messages exchanged by the victims.
Despite of being immediately removed from the Google Play