Lack of authentication in Apple’s device enrollment program would allow attackers to get WiFi and VPN configuration passwords According to specialists in...
Hackers exploited a vulnerability in the “View As” feature of Facebook. The social media giant Facebook has announced that it has suffered a...
Your mobile has a swathe of sensors that are used for adjusting your phone’s orientation, movement, detecting IR light, and biometric authentication....
Vulnerability persists in different Linux distros Multiple Linux distributions (distros), including all current versions of Red Hat Enterprise Linux and CentOS, contain...
A security researcher from ESET has announced that he has unearthed new Android-based spyware that is capable of accessing the Whatsapp database...
A security flaw has been unearthed in macOS Mojave, Apple’s latest desktop OS update, by a well-known security researcher Patrick Wardle. As reported by Bleeping...
The flaw allows malicious actors to avoid privacy measures An expert in cybersecurity and ethical hacking was able to demonstrate that Apple’s...
Back in July 2018, it was reported that Google shares Gmail user data with third-party apps and US lawmakers had asked the...
Cybercriminals listed 3000 Hacked websites access for sale in Russian based underground marketplace that sells for less than $50. The underground marketplace...
Firmware used in up to 800k cameras is vulnerable to attacks thanks to a buffer overflow vulnerability Between 180k and 800k CCTV...
The group threatens to take legal action Five Eyes alliance member countries have threatened to implement legislation if technology providers do not cooperate...
The company is already working on a security update A recently discovered vulnerability in the Cisco Data Center Network Manager software could allow a...
Cyber Criminals selling Parasite HTTP RAT (Remote Access Trojan) on the underground marketplace that distributed via Email to the victims using Weaponized...
Security cameras and other IoT devices have been frequently identified to be incompetent and plagued with a variety of built-in flaws that...
Dark Web has become the hub of illegal activities over the Internet. Everything from credit card numbers to personal information and even...
Google is pronounced on the investigation of email scanning made by third-party apps Google has responded to a recent research on apps...
Gas robbery at Marathon’s station. Two thieves used a remote device to hack the system of a gas pump, thus they managed...
Last year, Google was criticised for accessing users’ inbox to show them relevant ads. In the time that followed, the search giant stopped...
There are many third-party apps that require access to your Gmail account. For instance, the ones that help you plan trips or...
On May 23rd, The American intelligence agency NSA started the process of deleting the call records it has obtained from US telecom companies since 2015....
The Rogue Toolkit is an extensible toolkit aimed at providing penetration testers an easy-to-use platform to deploy software-defined Access Points (AP)...