How to hack a Facebook account is something that almost everyone wants to know – And now, a security researcher has reported...
Security researchers have revealed details of a vulnerability in WhatsApp’s security that could be used to compromise the secrecy of encrypted group...
ESET researchers have found that Turla, the notorious state-sponsored cyberespionage group, has added a fresh weapon to its arsenal that is being...
Millions of people have become victims of a FakeApp that is using new tricks to cheat Uber users around the world. Security...
The flaw was privately disclosed to the device maker in June, but six months later, there’s still no patch. Homes signed up...
The maker of a sneaky adware that hijacks a user’s browser to serve ads is back with a new, more advanced version...
I don’t need to stress the increasing cybersecurity threats like ransomware and botnets again. Over the course of this year, we’ve witnessed...
Imagine a scenario where a programmer needs to follow a couple of tried and tested procedures to write code that becomes a...
When it comes to pre-installed malicious software, HP (Hewlett-Packard) has a thing for them. In May this year, the tech giant was...
After rapidly reinforcing a flaw that acknowledged anyone with access to a High Sierra Mac to take administrative control, Apple still has...
The Volatility Foundation, the non-profit organization behind the Volatility Framework, sponsors the yearly Volatility Plugin Contest to acknowledge the best forensic tools...
The social media giant Facebook has more than 2 billion monthly active users so when there is a bug in it, that’s...
Well over 400 high profile websites are collecting all the keys that you’ve pressed, and it turns out that most of them...
Rhino Security Labs’ researchers have discovered a vulnerability in Amazon’s Key delivery service and Cloud Cam security camera. This vulnerability allows an...
Apple Inc. introduced Face ID facial recognition system on September 12, 2017, with the launch of iPhone X and claimed that even...
A security researcher has identified bugs in Google’s bug tracker platform Issue Tracker. It is indeed ironic that the software intended to...
Relating the collaboration between ESET experts and the FBI about the Windigo's operation, which ended with the sentencing of Maxim Senakh.
The flaw was discovered by researchers from Check Point in the user authentication method between the SmartThinQ portable app and LG’s back-end...
According to the findings of Check Point researchers, there is a vulnerability in the LG smart home infrastructure through which hackers can...
Agari supports email fraud on behalf of larger than 400 federal websites, including the real sites of the departments of Health and...
Smart Home Systems like the Google Home Mini is intended to only listen for a specific wake word, in this case, it’s...