TikTok, the third busiest app in 2019, is undergoing a rigorous study on user privacy, censorship of politically conflicting content and national...
As Apple promised in August this year, the company finally launched a bug bounty program for all security researchers, offering cash prizes...
HackerOne is one of the most important vulnerability reporting platforms, so it has access to large amounts of information, although sometimes that...
A security issue discovered by security research company SafeBreach in Kaspersky Secure Connection, which itself is bundled into a range of other...
The research particularly names India, China, and Kazakhstan for using Internet censorship as a tool to curb freedom of expression and how...
We have already seen AI algorithms creating animations of people that don’t exist, predicting crop growth, analyzing user actions for serving ads,...
There have been multiple attempts at inventing something similar to Harry Potter’s invisibility cloak but Canada-based researchers’ ‘Quantum Stealth’ could be the...
Humans can detect one trillion different smells, no wonder it is often considered one of the most powerful senses of the body....
Over the years, there has been an exponential increase in the WiFi speeds all over the globe. However, the high speeds come...
We are way past the cryptocurrency boom that made Bitcoin one of the world’s fastest-growing currencies. One of the downsides of Bitcoin...
Geolocation Spy (GeoSpy) is an OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in...
Researchers linked multiple Cyber-espionage campaigns across Asia to the threat actor group PKPLUG. The group uses its PlugX malware and the number...
Attackings of technology businesses in Southeast Asia by a suspected Chinese threat actor employ a version of the open-source PcShare backdoor, safety...
A cybersecurity researcher recently published details and proof-of-concept for an unpatched zero-day vulnerability in phpMyAdmin—one of the most popular applications for managing...
Email-based cyber attacks have become common these days. I am not the only one receiving emails saying that the file in the...
Out of all aspects of human life, death is one thing that’s inevitable and all of us move one step closer to...
Video buffering can be annoying. And it becomes unbearable when a Netflix episode stops every few seconds or gets ridiculously pixilated. But...
Amongst privacy enthusiasts, the Tor network is a popular means to browse the internet anonymously. However, time and again, vulnerabilities have been...
Yeah, I know it doesn’t sound right, but this is what researchers have come up with. At the ongoing Black Hat conference...
According to a study by OpenSignal, Samsung phones have high LTE speeds when stacked against iPhones and Huawei phones. OpenSignal, an independent...
Microsoft launched Azure Security Lab, a set of dedicated cloud hosts for researchers to confidently and aggressively test Azure vulnerabilities. Azure is...