phishing-malware

Phishing Malware Haunting Internet Users Worldwide

The cyber world has so much to offer; something to learn, something to earn, and something to be afraid of. If you think you...
data-security

Rogue Apps Stole Android User Data, Say Facebook and Twitter

In yet another data breach, Facebook and Twitter have admitted that data of hundreds of users was improperly accessed by some third-party apps on...
tor-logo

3 Ways To Hide Your IP Address, And Why It Matters

What is an IP address? An IP address is a number which is assigned to devices like computers and smartphones, and is used as a...
Google Assistant

Google Promises Action Against Those Listening in on Your Conversations

After facing widespread criticism for eavesdropping on users' conversations via its Assistant to improve speech recognition technology, Google said that it was conducting a...
internet-security-vpn

Cryptominers Most Severe Threat In Cyber World

While ransomware reigned supreme in 2017 accounting for 28 percent of malware attacks and cryptominers only made up 9 percent, the figures flipped in...
harddisk-drive

Steps to Secure Your Sensitive Data

It is not easy to keep data safe in today’s digital world. However, with the right software, team, and strategy, it is super easy....
internet-security-vpn

Online Security News Recap: April

With so much happening in the world of online security and cybercrime, we’ll give a quick summary of some major news stories happening across...
mobile-vpn

VPN Explained: How Does It Work?

How Do VPNs Work? A Virtual Private Network, most commonly abbreviated to VPN, allows a user to create a more secure internet connection by connecting...
internet-security-vpn

4 Ways to Keep Your Personal Electronic Data Secure

Over the last 3 decades, the Internet has transformed everyday life in ways no one could have imagined. Simple tasks we now accomplish in...
WhatsApp

WhatsApp and Other IM Apps Not as Safe as You Think

If you thought instant messaging platforms like WhatsApp and Telegram that provide end-to-end encryption give you rock-solid security, think again. Researchers from cyber-security firm...

CookieMiner Malware Steals Passwords, Credit Card Details In Chrome, Safari

Global cybersecurity company Palo Alto Networks has discovered a malware that is capable of stealing saved usernames and passwords in Google Chrome, saved credit...
Stock Image

Google Assistant Will Record Your Conversations, But Only If You Allow...

Facing flak for letting contractors record and listen to users' conversations via Google Assistant, the tech giant has announced to make some key changes...
Hacker

Hackers Target Microsoft-Owned GitHub, demand ransom

Hackers have hit open source software development platform GitHub, removing code repositories and asking ransom from developers in order to restore their source codes. According...
Stock Image Depression

Google Says It Sent 12000 Warnings to Users About Government-Backed Hacking...

Google sent 12,000 warnings to users in 149 countries that they were targeted by government-backed attackers during the three-month period from July to September...
artifical-intelligence

Software Technology Trends That Will Dominate 2019

You know of that software technology that you are obsessed with this year? Well, next year it could no longer be relevant or be...

TRENDING