Security

Mobile Security
Google Removes 85 Adware Infected Android Apps 1

Google Removes 85 Adware-Infected Android Apps

visa 3082813 1280

The Rise of Mobile Payments and the Technology Keeping Them Secure

Two Malicious iOS Fitness Apps Detected and Removed

Two Malicious iOS Fitness Apps Detected and Removed

Apple Request Developers to get macOS apps notarized

Page 5 of 17

Android Security
2019’s Google New Policy for Android Forced Patch Update from Device Vendors

2019’s Google New Policy for Android: Forced Patch Update from Device Vendors

Since 2008 when the first version of Android has been released, it has been hounded by its perennial problem, fragmentation. This fragmentation not only creates compatibility issues as not all…

Read More
Google Encrypted Cloud Backup for Android 9.0 Pie Publicly Released

Google Encrypted Cloud Backup for Android 9.0 Pie Publicly Released

Android has a cloud backup of its apps and settings for quite a while, connecting to the Google servers to sync data and apps across devices using a similar Google…

Read More
Password Stealing Malware Sneaks into Google Play Store Via Bogus Apps

A Malware That Might Look Like A Google Play Application

Security researchers recently discovered a group of cybercriminals successfully spreading Trojan banking malware through the use of bogus Google Play applications. First detected in June by professionals at IBM X-Force, the…

Read More
Leaks
How to Know If Someone Screengrabs Your Instagram Story

How to Know If Someone Screengrabs Your Instagram Story

How to Scan a QR Code on iPhone

How To Scan a QR Code On iPhone

AirPods Aren't Waterproof

Why Your AirPods Aren’t Waterproof

How To Make a QR Code?

How To Make a QR code?

Page 5 of 30

GDPR
Cryptocurrency
Cyrptocoin Minning Malware On The Rise

Cyrptocoin Minning Malware On The Rise

7 Tips for Securing Your Cryptocurrency Wallet

7 Tips for Securing Your Cryptocurrency Wallet

Port 8545 and Ethereum Wallets, A Very Bad Combination

The Nasty Operation of KingMiner Monero Cryptomining Trojan

Page 5 of 10

DDoS
Infographics
All Security News

Vulnerabilities in the iBoot Power Distribution Unit Let Hackers Remotely Shut Down Devices

Researchers found serious flaws in Dataprobe’s iBoot power distribution unit (PDU), which may be used by hostile parties to remotely hijack the device and shut down any connected devices, possibly…

Read More
computer girl

novoShield Emerges From Stealth With Mobile Phishing Protection App

With an enterprise-grade iPhone protection app, mobile phishing defense firm novoShield has come out of hiding. According to novoShield, the new solution was created to shield organizations and end users…

Read More
Geoscience Australia Highly Vulnerable to Cyber Attack min

FBI Issues Warning About Increase in Attacks Against DeFi Platforms

The FBI has issued a warning about an uptick in hacks aimed at stealing cryptocurrencies from decentralised finance (DeFi) services. The government claims that criminals are using the rising popularity…

Read More
Open EDR
Geoscience Australia Highly Vulnerable to Cyber Attack min

Security Firm Discloses CrowdStrike Issue After ‘Ridiculous Disclosure Process’

Crowdstrike Problem: Following what it referred to as a “ridiculous vulnerability disclosure process,” a security company has revealed the specifics of a problem with a CrowdStrike product. Following the disclosure,…

Read More
DDoS Attackers

Ring Android app flaw allowed access to camera recordings

In the Amazon Ring app for Android, Amazon has patched a high-severity vulnerability that may have let hackers download customers’ recorded camera footage. The flaw was spotted and reported to…

Read More

North Korean hackers target crypto experts with fake Coinbase job offers

North Korean hackers use phoney Coinbase job offers to target cryptocurrency professionals. The renowned North Korean hacking outfit Lazarus has uncovered a new social engineering scheme in which the hackers…

Read More

Google Patches Critical Android Flaw

Google released a security alert on Monday outlining the most recent batch of Android operating system upgrades. There have been fixes for thirty-two vulnerabilities, including a serious flaw that might…

Read More
Dell Discovers Breach Resets Customer Passwords

After a hardcoded password leak, Atlassian expects Confluence app exploitation

Following the disclosure of information required to exploit a newly patched vulnerability, Atlassian has informed users that a flaw in Questions for Confluence would probably be utilised in attacks. Questions…

Read More

Over 1 Billion Individual Data Leaked Due to Alleged Chinese Police Database Hacking

In a leak that, if verified, could be one of the biggest data breaches in history, hackers might have obtained a wealth of information belonging to over I billion Chinese…

Read More

This New Malware Is Now a Favorite among Ransomware Gangs

According to cybersecurity researchers, the bumblebee loader is now a darling in the ransomware ecosystem.  A new malware is now an important component when it comes to engineering ransomware attacks….

Read More
Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register