At the ongoing Black Hat USA 2019 conference, Microsoft announced the Azure Security Lab ‚ a sandbox-like environment for security researchers to...
The same team of cybersecurity researchers who discovered several severe vulnerabilities, collectively dubbed as Dragonblood, in the newly launched WPA3 WiFi security...
There are several techniques of encryption that are deployed to secure communication protocols and devices but these techniques aren’t effective if you...
Various companies collect data from our devices almost all the time. While there is always a privacy concern in the picture, they...
Quantum computing is a promising field but not much progress has been made until now. The reason behind this is the unstable...
Security Professionals always need to learn many tools, techniques, and concepts to analyze sophisticated Threats and current cyber attacks. Hex Editors HxD...
Deepfakes have gained a lot of negative attention recently. Be it the hugely criticized DeepNude AI app which removes clothing from pictures...
Time and again, we have seen that sending a string of particular characters in iMessage can lead to strange things on an...
Researchers managed to cover a 50,000 seat football stadium using only four malicious portable stations. A group of security researchers from the...
Movies and TV shows pop up in our minds when we say the word Netflix. But it turns out the company wants...
In January, Facebook landed itself in trouble and got its developer license revoked after it was revealed by TechCrunch that the social...
Object recognition is a computer vision (CV) technique using which computers can recognize objects, such as items in our common households. Now...
Security researcher Filippo Cavallarin recently discovered a security vulnerability on macOS 10.14.5 that can ignore the first barrier of the system security...
Meet MORPHEUS — a new computer architecture developed by researchers from the University of Michigan that is claimed to be ‘unhackable’ because...
Researchers at North Carolina State University and the University of Texas at Austin have developed a new technology to detect malware. The...
Biodegradable plastic bags can survive up to 3 years in soil and water, according to a study. Biodegradable bags used in the...
Each new research conducted by experts from the best ethical hacking Institute and specialists from the International Institute of Cyber Security (IICS)...
Phishers for decades have honed their skills of persuasion, that is why the art of fooling people through an Internet-messaging method is...
Phishers for decades have honed their skills of persuasion, that is why the art of fooling people through an Internet-messaging method is...
Security researchers from McAfee linked the global campaign dubbed Operation Sharpshooter to the infamous Lazarus Hacker Group. Sharpshooter campaign targets primarily on...
Security researchers have finally, with “high confidence,” linked a previously discovered global cyber espionage campaign targeting critical infrastructure around the world to...