After receiving complaints regarding abnormal battery discharge across different models of iPhone, Apple has released iOS 11.4.1 which brings minor bug fixes...
Amazon is selling its facial recognition technology called Rekognition to the American law enforcement agencies — this news has been making rounds in...
Rakhni Trojan which was first discovered in 2013 has evolved over the course of five years. As an addition to its already...
Remember the movie “Mission Impossible” where the protagonist, Tom Cruise bypassed a security system using body heat signatures left on the keyboard? Well,...
Last year, when The Pirate Bay was first caught mining cryptocurrency without notifying the users, it created lost of havoc in the pirate...
Earlier this year, a bug in Google Chrome was a rejoice for tech support scammers who could freeze people’s browser using the...
There are many third-party apps that require access to your Gmail account. For instance, the ones that help you plan trips or...
On May 23rd, The American intelligence agency NSA started the process of deleting the call records it has obtained from US telecom companies since 2015....
The Long Term Evolution (LTE) standard for mobile communication, also known as 4G was designed to overcome security flaws of its predecessor standards...
When Facebook-Cambridge Analytica scandal started blazing up headlines, many Facebook critics and security experts called it just a beginning. That prophecy is...
A new research has proved that the battery in your cell phone could be turned into a secret surveillance device which can potentially...
In addition to making you anonymous, the Tor network also gives access to the world of Darknet where activities like selling of...
Last year, when security researchers tore apart WPA2’s security with KRACK exploit, questions were raised regarding its ability to protect billions of WiFi-compatible...
The Intercept, the publication known for its groundbreaking reports, has come up with another revealing piece (via TechCrunch) about the National Security Agency....
Over the past years, Apple has been playing cat and mouse with the security researchers and hackers who keep trying to develop...
Fortnite is the talk of the town. The popularity of the video game has crossed all boundaries, and the game is attracting...
A sneaky and persistent malware has surfaced which spams Windows 10 PCs with ads and takes screenshots to eventually send it to...
A new malware that targets banking apps has hit Android devices. Names MysteryBot, the malware packs a banking trojan, keylogger, and ransomware,...
It seems that the cat and mouse chase between Apple and people who want to get access to iPhone is never going...
Security researchers have found a critical flaw in Windows 10 where Cortana can be manipulated into executing Powershell commands on locked devices. Attackers can...
A network worm has surfaced on Android devices that exploits Android Debug Bridge (ADB) feature of the mobile OS – a feature that...