Defcon 2018, one of the most popular hacking conferences, is going on in Las Vegas. The conference, every year, sees famous hackers...
Hackers from all over the world flocked to the Black Hat 2018 security conference that was held in Las Vegas this week....
There are tons of automated tools and services that any shady hacker can employ to grab the public data on Facebook, Twitter,...
In another interesting research work presented at Black Hat USA 2018, a group of researchers from Kzen Networks and Isreal Institute of...
Black Hat USA 2018 which commenced on August 4 has seen some of the famous researchers putting out their research works. While...
A new vulnerability has surfaced in WhatsApp’s encryption method that allows attackers to alter messages and user identities in group chats. This...
By this time, we have realized how artificial intelligence is a boon and a bane at the same time. Computers have become...
Hackers leave no chance of obtaining the source codes of popular apps as they aren’t public. However, in a recent incident, someone...
Many of us already know that the internet traffic passes through different countries before reaching its destination. But did you know that...
Ever since Avast acquired Piriform’s CCleaner, users have been complaining of the software going downhill as they often encounter annoying ads and...
The popular news aggregator website Reddit has revealed that it suffered a data breach between June 14 and 18. While Reddit calls the...
It seems that efforts being made by Google and Mozilla to safeguard their Chrome and Firefox extension store aren’t turning out to...
Google has launched the public version of the security key used to protect its 85,000 employees from phishing and other cyber attacks...
We all are aware of the cyberhacking and phishing that takes place in the digital world. And safeguarding us from petty hacks is...
Google is taking the privacy quite seriously, and the new Chrome security update will undoubtedly put a significant toll on all your...
Another day, another security fix released by Intel. In a blog post, Positive Technologies has detailed four different vulnerabilities found in the...
Believe it or not, there is still a large number of people who use passwords such as “password,” “password123”, “[dog’s name]1” and others...
In the past, the security researchers have come across cases where notorious hackers were able to use EXIF data of images to...
GandCrab ransomware, which has created a hullabaloo in the cybersecurity industry by constantly evolving, has yet again caused a commotion. The latest...
Arch Linux software repository named Arch User Repository (AUR) has been infected by malware. As many as three Arch Linux packages available...
There’s no doubt that Linux and Mac are more secure operating system choices as opposed to Microsoft Windows. But this doesn’t mean...