Security
8 Best Portable Antivirus Tools to Keep on Your USB for On-the-Go Protection
When it comes to Android devices, the need for...
16 Best Free VPN Apps for Android
Today, online privacy and security are more important than...
10 Best Android Browsers With Built-In VPN
Vishak -
Mobile browsers with built-in VPN capabilities not only promise...
The Risks of Oversharing on the Internet: How Spear Phishing Puts You in Danger
Social media is part of nearly everyone’s life, it’s...
5 Best Email Encryption Providers for Enterprise-Level Protection
In an era where cyberattacks are increasingly sophisticated, email...
A Serious Bluetooth Vulnerability Allows Hackers To Make A Connection To Any Of Our Devices, Posing As One Of Our Accessories
Adwaith -
BLURtooth is a new type of attack that uses a vulnerability in the most used wireless connection standard for mobiles — Bluetooth. Although the...
WD Launches ArmorLock Encryption Platform to Protect Local Data
Vishak -
The hard drive manufacturer Western Digital (WD) has presented its Armorlock platform — a new standard in data protection — which is marketed together with the...
Is Your Info on the Dark Web? Here’s What You Need to Know
Subith -
The dark web is a part of the internet that can’t be navigated with normal search engines. It isn’t indexed for search, and it...
Facebook fears a collapse in advertising revenue with iOS 14
Adwaith -
The new version of the Apple operating system, iOS 14, brings with it a decisive change related to ads and privacy. With the update,...
A major security bug made all Gmail and G Suite mailboxes vulnerable
On Wednesday, Google has patched a major security bug impacting the Gmail and G Suite email servers. The security researcher Allison Husain discovered and reported...
50 percent of cybercriminal activity target Android during the first half of 2020
Cyberattacks on mobiles are a trend that is going further and further. And during the first half of the year 2020, Android phones became...
Amazon Alexa security flaw allows hackers to take control of voice history and acquire personal information
After identifying 400 vulnerabilities affecting Qualcomm chipsets present on millions of Android smartphones, researchers at Check Point have discovered some dangerous vulnerabilities present on...
Instagram kept deleted photos and messages on its servers for over a year
With the arrival of the GPDR for data protection and privacy, Instagram has set a new rule — if a user deletes photos or...
FBI and NSA expose new Russian Linux rootkit Drovorub
FBI and NSA warn in a joint security alert about a never before seen Linux malware Drovorub that threatens national security. According to the report, the alleged...
Intel investigates 20 GB of internal documents leak
Has the US chipmaker, Intel, been the victim of a hacker attack? The company is currently investigating how internal documents could be made public. 20...
Millions of smartphones with Snapdragon chips are vulnerable
Vishak -
The security company Checkpoint claims to have discovered more than 400 security holes in the digital signal processor (DSP) of Qualcomm's Snapdragon chips, and hundreds of...
17-year-old “mastermind” arrested for the biggest hack in Twitter history
Just over two weeks after an unprecedented cyberattack on celebrity Twitter accounts, the police arrested a 17-year-old as the main suspect. Graham Ivan Clark is...