Security

8 Best Portable Antivirus Tools to Keep on Your USB for On-the-Go Protection

When it comes to Android devices, the need for...

The Risks of Oversharing on the Internet: How Spear Phishing Puts You in Danger

Social media is part of nearly everyone’s life, it’s...

5 Best Email Encryption Providers for Enterprise-Level Protection

In an era where cyberattacks are increasingly sophisticated, email...

13 Best Open-Source Encrypted Messaging Android Apps For Privacy Concerned People

Nowadays almost every famous chat apps available for Android...

10 Alternatives to Android and iOS You Should Know

The duopoly of Android and iOS dominates the world...

Does CloudHSM Combine the Simplicity of KSM and the Security of HSM?

The year 2020 has taken the use of internet and online services ahead by a decade within the last few months. It has created...

Google And Intel Warn Of Serious Bluetooth Vulnerabilities In Linux

Security researchers at Google and Intel warn of serious Bluetooth vulnerabilities that threaten all but the most recent Linux kernel.  Not much is known yet...

The New HEH Botnet Infects IoT Devices And Completely Reset Them

The researchers at Netlab — the cyber and network security division of Chinese tech giant Qihoo 360 — have warned about the emergence of a new...

Apple Pays $288,000 To Security Researchers Who Discover 55 Vulnerabilities On Company’s Network

Five security researchers worked on Apple's infrastructure for three months and discovered a total of 55 security vulnerabilities. In his blog, security expert Sam Curry, who...

Microsoft warns that Iranian hackers are exploiting ZeroLogon Windows security flaw

Bad news for Microsoft, still grappling with the serious Zerologon Windows security bug that exploits a vulnerability in Netlogon's applied encryption protocol.  As verified by...

SilentFade: Chinese malware targets Facebook users and commits ad fraud

At the Virus Bulletin 2020 conference, the Facebook security team revealed one of the most challenging malware operations it has ever faced. Malware attack known internally...

Alien, the new malware that threatens all Android devices

A new malware — Alien — threatens all Android devices, capable of stealing credentials in over 226 applications. Active since the beginning of the year,...

Google removes 17 more Joker infected Android apps from Play Store

The dangerous Joker malware is still circulating through many Android apps published on the Play Store. After being reported by ZScaler cybersecurity researchers, Google has just...

Windows XP source code reportedly leaked on the internet

The supposed source code for Windows XP has been leaked on the internet and can be a major security problem. According to the reports from Gizmodo and Bleepingcomputer,...

A Serious Bluetooth Vulnerability Allows Hackers To Make A Connection To Any Of Our Devices, Posing As One Of Our Accessories

BLURtooth is a new type of attack that uses a vulnerability in the most used wireless connection standard for mobiles — Bluetooth. Although the...

WD Launches ArmorLock Encryption Platform to Protect Local Data

The hard drive manufacturer Western Digital (WD) has presented its Armorlock platform — a new standard in data protection — which is marketed together with the...

Is Your Info on the Dark Web? Here’s What You Need to Know

The dark web is a part of the internet that can’t be navigated with normal search engines. It isn’t indexed for search, and it...