Kid With Smartphone

Easy Ways to Check Which Apps are Collecting What Data from...

With instances of data leakage becoming more and more common, privacy has become the chief casualty. But for those who want to find out...
mobile-vpn

Do I Need A VPN For My Mobile Device?

Mobile devices have been under the security microscope in recent years, as flaw after flaw emerges in operating systems, applications and even hardware. From treating...
Google Pixel 3

Google Announces $1.5 Million Bounty for Finding Bug in Pixel Phones

Google has announced to pay $1 million as top award to security researchers who can find a unique bug in its Pixel series of...
WhatsApp

WhatsApp Gold is not a special upgrade for celebrities only, don’t...

There's no special version of WhatsApp called WhatsApp Gold or WhatsApp Plus that is secretly available to celebrities and other important people. If you...
Hacker

Hackers Now Using Voice-Mimicking AI for Cyber Attacks

In a warning, an Israeli cyber body has unearthed a new type of attack where hackers are using Artificial Intelligence (AI) technology to impersonate...
jeff-bezos

Jeff Bezos’ Security Chief Claims Saudi Arabia Hacked Amazon CEO’s Phone

A veteran security consultant who works for Amazon Founder and CEO Jeff Bezos has accused Saudi Arabia of hacking into Bezos' smartphone and alleging...
Google Pixel 3 XL

Fingerprint Verification Feature Introduced Via Google Services On Pixel Phones

You will soon be able to log into Google websites and services using fingerprint-based verification rather than a password. The company is rolling out the...
facebook

Facebook Hit By New User Privacy Breach Involving Developers

In yet another data breach, Facebook on Wednesday revealed that at least 100 app developers may have accessed Facebook users' data for months, confirming...
google-search

Google Tracks Your Online Purchase History

Google is quietly keeping track of every single purchase you have made in years, thanks to purchase receipts sent to your personal Gmail account. According...
security

What is Cyber Risk Assessment? Why is it Crucial for any...

It’s the decade of technological advancements, but in addition, it’s the decade of ever-rising cybercrimes. In fact, one in every ten web addresses is...
Android Malware

Android Malware ‘Agent Smith’ Has Hit 25 Million Devices

Cybersecurity solutions provider Check Point on Wednesday revealed that 'Agent Smith,' a new variant of mobile malware, has quietly infected around 25 million Android...
credit-card

5 Essential Tips For Safe Internet Browsing In 2020

The Internet can be a dangerous neighborhood, from your devices getting viruses to someone stealing your credit card information. Unfortunately, people don't always know...
security

Top Threats To Small Businesses And How To Protect Yourself

Launching a small business is an exciting, often life-changing step. You’ve taken the seed of an idea and made it a reality, and now...
Hacker

Hackers Target Microsoft-Owned GitHub, demand ransom

Hackers have hit open source software development platform GitHub, removing code repositories and asking ransom from developers in order to restore their source codes. According...

CookieMiner Malware Steals Passwords, Credit Card Details In Chrome, Safari

Global cybersecurity company Palo Alto Networks has discovered a malware that is capable of stealing saved usernames and passwords in Google Chrome, saved credit...

TRENDING