We usually get to hear of vulnerabilities that cybercriminals exploit to expose or steal data. This time it’s the other way around;...
A team of cybersecurity researchers from the University of New Haven yesterday released a video demonstrating how vulnerabilities that most programmers often...
Academics describe scenarios that put the use of blockchain technology at risk Network security specialists from the International Institute of Cyber Security...
Cybersecurity researchers have discovered a way to hide malicious code in Intel SGX enclaves, a hardware-based memory encryption feature in modern processors...
Linus Henze, a security researcher, has uncovered a security flaw in macOS Mojave Keychain that can allow bad actors to steal the...
Facebook was recently caught extracting data from its “research” app in exchange of $20 gift cards. Apple punished the social media company...
On Tuesday, Techcrunch reported that Facebook is paying teenagers to install a “Research” VPN app in iOS devices in exchange for $20...
If you are thinking that Facebook is sitting quietly after being forced to remove its Onavo VPN app from Apple’s App Store,...
Update: After the report surfaced, Facebook said it would shut down the iOS version of its Research app, however, Apple says it has...
A team at a robot cybersecurity startup has released a free, open-source tool for information security professionals to help them easily ‘footprint’...
The coordinated efforts were part of the URLhaus initiative that Abuse.ch launched in March 2018, and whose primary objective is to collect...
Until now quantum computers have competed with classic computers in solving problems. But, researchers are planning to leverage the power of quantum...
The Goldluck malware has been around for more than a year. The malware basically gave hackers privileges which allowed them to send...
Mark Zuckerberg and his wife Priscilla Chan have raised nearly $5 billion by selling almost 29 million Facebook shares to fund an...
Biometric authentication is currently a widely used option for maintaining the security of devices and systems. With the emergence of vein-based authentication,...
A security researcher has published the proof-of-concept code which demonstrates how to create a fully functional Facebook worm. It’s a clickjack bomb...
Industry standard specification does not guarantee the safety of the self-encrypting drives despite verification
The Lazarus hackers have been using the FastCash Trojan on obsolete AIX servers to steal tens of millions of dollars The researchers...
Cybersecurity firm FireEye claims to have discovered evidence that proves the involvement of a Russian-owned research institute in the development of the...
Vulnerabilities and security flaws in vehicle security systems aren’t as surprising for us as it is that even the most renowned car...
Detours is a software package for monitoring and instrumenting API calls on Windows. Detours has been used by many ISVs and is...