A malicious code exploited a newly fixed zero-day flaw in the Google Play store that affects multiple Android devices, including Pixel phones from Google. Tracked as CVE-2019-2215, Google Project Zero…
Read More
A malicious code exploited a newly fixed zero-day flaw in the Google Play store that affects multiple Android devices, including Pixel phones from Google. Tracked as CVE-2019-2215, Google Project Zero…
Read More
On Friday, a British citizen was convicted for trying to bribe Apple by alleging that he had a massive iCloud folder and other Apple accounts. The guy, 22-year-old Kerem Albayrak…
Read More

The new pharmaceutical features will help companies to develop more direct relations with patients. Salesforce for Medical Devices Companies On Tuesday, Salesforce launched new capabilities for its Health Cloud that…
Read More
Many studies and investigations have been conducted into the number of stolen credentials on the dark web. Nonetheless, a new report recently issued is a little different: it relies on…
Read More
About 2,000 websites in Georgia were compromised in a major cyber attack on Monday, including those of the President, courts and the press. The photograph of Georgia’s former exiled president…
Read More
Consumer watchdog says Google gathers and uses location data without telling users. The Australian Competition & Consumer Commission (ACCC) is bringing up against Google and its Australian branch claims of…
Read More
A Texas man found guilty of hacking and abusing the LASC network for sending phishing emails was sentenced to a federal prison this week. The man, Oriyomi Sadiq Aloba, 33,…
Read More
Microsoft released a new series of security patches in Internet Explorer for a zero-day bug, originally addressed on September 23. The original updates introduced some printing problems, but the new…
Read More
Attackings of technology businesses in Southeast Asia by a suspected Chinese threat actor employ a version of the open-source PcShare backdoor, safety scientists in BlackBerry Cylance warn. The attackers also…
Read More
Today, criminal organizations no longer attack corporations and businesses physically with weapons. Instead, they use computers and malware, aiming to steal vital information that can be used for malicious means….
Read More