Blogs
-
Read more
The research report has claimed that the spyware can easily record user phone calls in a covert way.
Read moreThe data loss occurred as the database was hosted over a misconfigured Elasticsearch server.
Read moreGoogle has found 16 new apps distributing Joker malware and has removed them from Play store.
Read moreThe new update of Google Chrome is causing various performance issues and heating problems.
Read moreHackers are targeting Instagram user accounts by exploiting certain flaws in the application.
Read moreAround 8 million user records were exposed by the COVID-19 surveillance tool.
Read morePhishing emails with fake undelivered message notifications are landing in user inboxes.
Read moreMozilla has recently fixed a bug in its android browser that was being exploited by hackers.
Read moreMozilla has finally shut down Notes and Firefox Send services to put a stop on their malicious use.
Posted: September 18, 2020Views: 53Read moreThe developer has finally released the source code of Cerberus for free after a failed attempt of auctioning it.
Read moreCISA has claimed that Chinese hackers are targeting cyber environment of various countries.
Read moreUnauthenticated RCE on MobileIron Mobile Device Management (MDM) was exploited by researcher.
Read moreData leaks are becoming very frequent and are increasing at an alarming rate.
Read moreHackers are using a previously landed cyberattack on Twitter to launch phishing scams.
Read moreOnline shopping has made its market in day to day life of many people.
Read moreThe attacks that exploit the vulnerability are termed as BLUR attacks by security researchers.
Read moreThe Slovakian crypto exchange has suffered a cyber attack which allowed hackers to steal millions.
Read moreResearchers have unveiled a new bug in Google maps that has opened doors for cross-site scripting attacks.
Back to Top