Security
8 Best Portable Antivirus Tools to Keep on Your USB for On-the-Go Protection
When it comes to Android devices, the need for...
The Risks of Oversharing on the Internet: How Spear Phishing Puts You in Danger
Social media is part of nearly everyone’s life, it’s...
5 Best Email Encryption Providers for Enterprise-Level Protection
In an era where cyberattacks are increasingly sophisticated, email...
13 Best Open-Source Encrypted Messaging Android Apps For Privacy Concerned People
Nowadays almost every famous chat apps available for Android...
10 Alternatives to Android and iOS You Should Know
Vishak -
The duopoly of Android and iOS dominates the world...
Does CloudHSM Combine the Simplicity of KSM and the Security of HSM?
The year 2020 has taken the use of internet and online services ahead by a decade within the last few months. It has created...
Google And Intel Warn Of Serious Bluetooth Vulnerabilities In Linux
Security researchers at Google and Intel warn of serious Bluetooth vulnerabilities that threaten all but the most recent Linux kernel. Not much is known yet...
The New HEH Botnet Infects IoT Devices And Completely Reset Them
The researchers at Netlab — the cyber and network security division of Chinese tech giant Qihoo 360 — have warned about the emergence of a new...
Apple Pays $288,000 To Security Researchers Who Discover 55 Vulnerabilities On Company’s Network
Five security researchers worked on Apple's infrastructure for three months and discovered a total of 55 security vulnerabilities. In his blog, security expert Sam Curry, who...
Microsoft warns that Iranian hackers are exploiting ZeroLogon Windows security flaw
Bad news for Microsoft, still grappling with the serious Zerologon Windows security bug that exploits a vulnerability in Netlogon's applied encryption protocol. As verified by...
SilentFade: Chinese malware targets Facebook users and commits ad fraud
At the Virus Bulletin 2020 conference, the Facebook security team revealed one of the most challenging malware operations it has ever faced. Malware attack known internally...
Alien, the new malware that threatens all Android devices
A new malware — Alien — threatens all Android devices, capable of stealing credentials in over 226 applications. Active since the beginning of the year,...
Google removes 17 more Joker infected Android apps from Play Store
The dangerous Joker malware is still circulating through many Android apps published on the Play Store. After being reported by ZScaler cybersecurity researchers, Google has just...
Windows XP source code reportedly leaked on the internet
The supposed source code for Windows XP has been leaked on the internet and can be a major security problem. According to the reports from Gizmodo and Bleepingcomputer,...
A Serious Bluetooth Vulnerability Allows Hackers To Make A Connection To Any Of Our Devices, Posing As One Of Our Accessories
Adwaith -
BLURtooth is a new type of attack that uses a vulnerability in the most used wireless connection standard for mobiles — Bluetooth. Although the...
WD Launches ArmorLock Encryption Platform to Protect Local Data
Vishak -
The hard drive manufacturer Western Digital (WD) has presented its Armorlock platform — a new standard in data protection — which is marketed together with the...
Is Your Info on the Dark Web? Here’s What You Need to Know
Subith -
The dark web is a part of the internet that can’t be navigated with normal search engines. It isn’t indexed for search, and it...