Facebook recently suffered a massive breach of login tokens that posed a risk to 50 million accounts all over the world. A...
Sick of paying money for coffee at your favorite chain? Well, this Japanese cafe offers free coffee, but for a different currency. At...
According to a report by Forbes, the FBI recently forced an iPhone X owner to unlock the phone using his face. This...
In an official blog post, Facebook has confirmed that at least 50 million user accounts have been affected due to a newly...
Update: The Taiwanese hacker has suspended his plans to attack Mark Zuckerberg’s Facebook page and make attempts to delete it. “I am...
Your mobile has a swathe of sensors that are used for adjusting your phone’s orientation, movement, detecting IR light, and biometric authentication....
A 16-year-old Australian teenager who repeatedly hacked Apple servers over a period of two years has evaded jail. He is set to...
A security researcher from ESET has announced that he has unearthed new Android-based spyware that is capable of accessing the Whatsapp database...
Yet another privacy concern for Google Chrome users! Previously, we talked about Google’s auto-login mechanism which is hijacking our local Google Chrome...
A security flaw has been unearthed in macOS Mojave, Apple’s latest desktop OS update, by a well-known security researcher Patrick Wardle. As reported by Bleeping...
Security researcher Sabri Haddouche has found a bug in the Firefox web browser that can crash the browser and also the entire operating...
Google brought in a bunch of new features in the new Chrome 69 version. While many of them were much appreciated, some...
Back in July 2018, it was reported that Google shares Gmail user data with third-party apps and US lawmakers had asked the...
It seems like digital currencies like Bitcoin will never stay out of trouble. And any day could turn out to be the last...
Researchers at Palo Alto Networks have found a new malware called Xbash which is a lethal cocktail of botnet, ransomware and cryptocurrency mining software...
There is a Windows file named WaitList.dat that covertly collects your passwords and email information, with the help of Windows Search Indexer service. Digital...
In Greek Mythology, Kronos is known as the father of lightning God Zeus. However, in the real world, “KRONOS” named virus is...
A research report published by F-Secure has unearthed a new flaw that makes most of the devices including those that are equipped...
A zero-day vulnerability for Tor browser was revealed yesterday on Twitter by Zerodium — a company that buys and sells exploits in...
Aadhaar, the unique identification system of India, has got a bad rep all over the world. From personal data being available on Google...
Tesla is the epitome of innovation combined with unmatched features, including utmost comfort and tight security that provides a completely digitized driving...