In what’s likely to be a goldmine for bad actors, personal information associated with approximately 533 million Facebook users worldwide has been...
A newly discovered glitch in Zoom’s screen sharing feature can accidentally leak sensitive information to other attendees in a call, according to...
The Office of the Washington State Auditor (SAO) on Monday said it’s investigating a security incident that resulted in the compromise of...
Moscow, the capital of Russia, has 175,000 CCTV cameras for surveillance purposes. Out of these, over 4,000 cameras are installed in crowded...
If you run a small business, it’s a matter of when, not if, your computer system or cyberinfrastructure falls prey to cybercriminals....
People have the right to privacy on their mobile phones. However, with the increase of malicious hackers and the use of third-party...
Another day, another breach involving Facebook, Twitter, and third-party developers. On Monday, both Facebook and Twitter announced that the data of hundreds...
People often make a great effort to protect their credit/debit card details against fraudulent transactions. This has been further helped by banks...
Are you a T-Mobile prepaid customer? If yes, you should immediately create or update your associated account PIN/passcode as additional protection. The...
Information security specialists from firm vpnMentor, led by expert Noam Rotem, discovered a data breach that affected Gekko Group, a subsidiary brand...
Article updated with a statement from Facebook. We frequently come across apps unauthorizedly accessing certain features or data of smartphones but mostly...
Roughly 100 App Developers Retained Unauthorized Access to Group Members’ Data. Another day, another data breach at Facebook – If you are...
An organized network of Camgirl sites has reportedly exposed personal data of millions of sex workers and users who participated in sessions...
The top 5 passwords used by the Technology industry among Fortune 500 Companies were “passw0rd,” and “abc123.” The dark web is one...
Virtual private network services (VPN) company NordVPN has revealed a hacking incident that occurred last year. According to web application security experts,...
Users today realize that they may get hacked, logically because they’re no experts at cyber-security and attackers smarter than they are out...
“Sudoing” lately? Linux or any Unix-based platform users are well aware of the Sudo command. In Unix and Linux, the Sudo keyword...
Data protection specialists report that an unidentified threat actor is auctioning off a database with records of more than 90 million Brazilian...
A quick Google search for the “most secure messaging apps” introduces you to “Signal – a private messenger.” Yet, who knew that...
In the Facebook vs Eva Glawischnig-Piesczek case, Europian Union’s highest court has ruled against the Silicon Valley tech giant. Under the ruling,...
A few months ago reports emerged that Google was asking random strangers to sell their facial data in exchange for a $5...