Security
8 Best Portable Antivirus Tools to Keep on Your USB for On-the-Go Protection
When it comes to Android devices, the need for...
16 Best Free VPN Apps for Android
Today, online privacy and security are more important than...
10 Best Android Browsers With Built-In VPN
Vishak -
Mobile browsers with built-in VPN capabilities not only promise...
The Risks of Oversharing on the Internet: How Spear Phishing Puts You in Danger
Social media is part of nearly everyone’s life, it’s...
5 Best Email Encryption Providers for Enterprise-Level Protection
In an era where cyberattacks are increasingly sophisticated, email...
Google Project Zero Team Discovered A Windows Zero-Day Vulnerability
Security researchers from the Google Project Zero team have identified a zero-day vulnerability in the Windows kernel that appears to be actively exploited. The zero-day...
Popular Mobile Browsers Are Vulnerable To Address Bar Spoofing
Rapid7 analysts and independent information security expert Rafay Baloch reports that seven popular mobile browsers allow malicious sites to change the URL and display a spoofed...
Two Ad-blocking Chrome Extensions Caught Collecting User Data
Google has removed two ad-blocking extensions from the Chrome Web Store because they were caught collecting user data. The news came from Reddit, through the...
Does CloudHSM Combine the Simplicity of KSM and the Security of HSM?
The year 2020 has taken the use of internet and online services ahead by a decade within the last few months. It has created...
Google And Intel Warn Of Serious Bluetooth Vulnerabilities In Linux
Security researchers at Google and Intel warn of serious Bluetooth vulnerabilities that threaten all but the most recent Linux kernel. Not much is known yet...
The New HEH Botnet Infects IoT Devices And Completely Reset Them
The researchers at Netlab — the cyber and network security division of Chinese tech giant Qihoo 360 — have warned about the emergence of a new...
Apple Pays $288,000 To Security Researchers Who Discover 55 Vulnerabilities On Company’s Network
Five security researchers worked on Apple's infrastructure for three months and discovered a total of 55 security vulnerabilities. In his blog, security expert Sam Curry, who...
Microsoft warns that Iranian hackers are exploiting ZeroLogon Windows security flaw
Bad news for Microsoft, still grappling with the serious Zerologon Windows security bug that exploits a vulnerability in Netlogon's applied encryption protocol. As verified by...
SilentFade: Chinese malware targets Facebook users and commits ad fraud
At the Virus Bulletin 2020 conference, the Facebook security team revealed one of the most challenging malware operations it has ever faced. Malware attack known internally...
Alien, the new malware that threatens all Android devices
A new malware — Alien — threatens all Android devices, capable of stealing credentials in over 226 applications. Active since the beginning of the year,...
Google removes 17 more Joker infected Android apps from Play Store
The dangerous Joker malware is still circulating through many Android apps published on the Play Store. After being reported by ZScaler cybersecurity researchers, Google has just...
Windows XP source code reportedly leaked on the internet
The supposed source code for Windows XP has been leaked on the internet and can be a major security problem. According to the reports from Gizmodo and Bleepingcomputer,...