Having a high-profile and so very sought-after device like Nintendo Switch is a risky deal as cyber-criminals are always on the hunt...
Cellebrite, the famous Israeli firm known for reportedly cracking the iPhone 5C of San Bernardino shooter is back in the news and...
In another strange tale from the kinetic-attack-meets-cyberattack department, earlier this week I heard from a loyal reader in Brazil whose wife was...
Apple had introduced fingerprint scanning feature to prevent users from the hassle of forgetting their passwords and also to make sure that...
PayPal is one of the most used platforms for sending and receiving payments by small medium and large enterprises. This makes it the...
Elcomsoft is a Moscow based firm that creates forensics software said it was possible [Pdf] to retrieve your deleted browser history beyond...
A hacker is now dumping a large size of sophisticated cracking tools that are said to have been stolen from Cellebrite, the...
An iPhone serial number hack could explain why Apple killed its iCloud Activation Lock checker. Apple’s decision to remove its Activation Lock...
If flashing a peace sign is your go-to selfie move, you might want to think about coming up with a new signature...
What would be your reaction if you buy a new iPhone and find your phonebook filled with personal contact numbers of hundreds...
Our mobile phones are nothing short of a treasure trove of sensitive, private information. We have started relying a lot on our...
Short Bytes: A new iPhone crashing exploit is here to take down and break your iMessages app. Hacker Vincedes3 has uncovered a hack...
A solitary instant message could be abused to impair the Messages application on any iPhone because of an as of late found...
Most iPhone users assume a certain level of security regarding the data on their device. However, a recent report from ZDNet detailing...
Thanks to the recent encryption debate many smartphone owners are keenly aware of personal data stored on their iPhone, from contacts to...
It is a fact that we cannot even move from one room to another without our smartphone. Nowadays, smartphones have become a...
As per the Fifth Amendment, a US citizen cannot be forced to surrender his private information such as passwords or login credentials....
Apple did various product experiments in its early years. They tried their clothing lines and some limited stuff. But many people don’t...
If this had happened in the United States, the FBI would have spent millions of dollars from taxpayers money and employed an...
Vproxy is a python script tool which configures a PPTP VPN server that will redirect HTTP/HTTPS traffic to your proxy instance host....
For the last few months, Israeli spy firms have been making some strange claims such as Ability says that their “Unlimited Interception...