A group of researchers from the security firm GuardianApp has found that dozens of popular iPhone applications are selling the location data of...
Tesla announced on Twitter that they are launching a bug bounty program and are allowing “good faith” researchers to probe into its...
The U.S. has charged and sanctioned a North Korean hacker who is accused of being responsible for the infamous WannaCry Cyberattacks of...
All the major tech giants appear to be doing everything in their power to improve the user security and privacy; Google just...
Researchers from the universities in Sweden and the UK have stumbled on a new technique using which your smartphone’s speaker and microphone...
You might have come across the term side-channel attacks while reading news articles on Spectre and Meltdown. These exploits were possible due to...
Researchers have discovered a vulnerability in all Android versions except Android 9, which could allow attackers to capture WiFi broadcast data and even...
There’s no denying the fact that data collection on the web is one of the fundamental ways how our Internet actually works....
According to a research, millions of Android devices from 11 OEMs are vulnerable to attacks from simple AT commands. These AT commands or...
A zero-day flaw has been revealed by a Twitter user SandboxEscaper, for the Windows Task Scheduler in 64-bit Windows 10 and Windows Server 2016...
Nowadays, smart devices have taken the wicked roads, contrary to the original plan of helping the citizens of the world. A few...
Epic Games’ decision to make its popular game Fortnite available on Android through its own website instead of Google Play Store seems...
Researchers at Bitdefender have identified a new powerful Android spyware named ‘Triout.’ It can secretly record phone calls, collect pictures, videos, text...
A researcher from SYON Security has managed to build a modified USB charging cable that will enable hackers to transfer malware on...
Apple’s tall claims of keeping your data secured were challenged by an Australian teenager when he repeatedly hacked Apple servers and downloaded...
Ron Masas, a security researcher, working with Imperva, has recently flagged a vulnerability in Google Chrome that leveraged audio and video tags...
According to the reports by Mike Kuketz, an independent security blogger from Germany and uBlock Origin, an add-on named “Web Security” has been...
When the Spectre and Meltdown security flaws in Intel chips were disclosed earlier this year, security researchers called it a loophole so...
While using your Android or iOS device, if you choose the option to pause the location sharing, what are your expectations? While...
This year’s Defcon witnessed many interesting events, including the hacking of voting machines by 11-year-olds and macOS’s vulnerabilities to grant permissions to...
At Defcon 2018, ex-NSA staffer and a popular Mac hacker Patrick Wardle presented his research work which involved bypassing the layers of...