How Financial Apps Could Render You Vulnerable to Attacks 1

How Financial Apps Could Render You Vulnerable to Attacks

There is a major shift in how customers interact with their respective banks. Transactions that used to happen inside a browser are now done through mobile apps. What is good…

Read More
The Messaging App WeChat Exceeds 1 Billion User Account 1

The Messaging App WeChat Exceeds 1 Billion User Account

WeChat, the Chinese Internet giant Tencent’s multi-function messaging system, now has more than a billion user accounts, said group boss Pony Ma. In China, WeChat is ubiquitous: the application for…

Read More
Open EDR
Two Malicious iOS Fitness Apps Detected and Removed

Two Malicious iOS Fitness Apps Detected and Removed

Two malicious iOS fitness apps, which were being used to cheat users and rob them of their money, have been detected and consequently removed. The two apps- “Fitness Balance app”…

Read More
Twitter Microsoft Google and Facebook Set to End Data Transfer Incompatibility

The End Of Data Transfer Incompatibility

Aside from the development of the Linux kernel, where numerous known names in the Internet industry are in constant partnership, it really is rare for companies to partner with each…

Read More
Fake Security Apps from Google Play

When Google Removed 36 Fake Security Apps from Google Play…

It was over three months ago that Google removed 36 fake security apps from Google Play. This happened after these apps were flagged by Trend Micro researchers… These apps would…

Read More
Virtual Keyboard App 1

Over 31M Personal Data of People Leaked Via Virtual Keyboard App

A popular virtual keyboard app has caused leakage of personal data belonging to over 31 million customers. This data breach has happened after the app developer failed in securing the…

Read More
App Security

Follow these 5 steps to improve App security

People are introduced to different types of application and it is now the responsibility of the companies to protect these applications along with the user data. Because the network system…

Read More

Page 1 of 1

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register