Latest Posts

Apple Removed Adware Doctor From Mac App Store For Stealing User Data

Apple Removed Adware Doctor From Mac App Store For Stealing User Data During the past few days, several cybersecurity researchers have highlighted a plethora of malicious apps on the Mac App Store that tracks user data. While ...

Keybase Browser Extension Is Allowing Sites To See User’s Messages

Keybase Browser Extension Is Allowing Sites To See User’s Messages The Keybase app browser extension has failed to fulfill the promise of end-to-end encryption to users from its desktop variant. Keybase is primarily focused on ...

Tesla Will Allow For Owners to Hack Their Own Cars

Tesla Will Allow For Owners to Hack Their Own Cars Tesla Inc have added some new guidelines to the bug bounty programs that will help researchers to discover security bugs in the Tesla’s software. The company are now actually ...

Numerous Mac App Store Apps Are Secretly Tracking User Data

Numerous Mac App Store Apps Are Secretly Tracking User Data The supposed customer-protective Apple Mac Store is carrying some dangerous tracking apps. As highlighted by several researchers separately, many of the famous Mac App ...

New Chainshot Malware Decrypted By Researchers

New Chainshot Malware Decrypted By Researchers Security Researchers at Palo Alto Networks discovered that a hacker has used a poor choice of encryption to encrypt their malware. The new malware discovered was used in various ...

Hacking Wireless Networks & Use CoffeeMiner To Inject Cryptocurrency Miners

Hacking Wireless Networks & Use CoffeeMiner To Inject Cryptocurrency Miners A developer named Arnau from Spain has released a new project called CoffeeMiner that is designed to hack wireless networks to inject cryptocurrency ...

Intel must acknowledge the CPU flaws said by Linus Torvalds

Intel must acknowledge the CPU flaws said by Linus Torvalds Two flaws entitled Meltdown and Spectre were published this week in Intel processors made since 1995 and corporations have been speeding to offer fixes and workarounds. ...

Attackers Can Steal Windows Credentials By Exploiting The subDoc Feature In Microsoft Word

Attackers Can Steal Windows Credentials By Exploiting The subDoc Feature In Microsoft Word Security researchers from Rhino Labs (a US-based cyber-security firm) have found that cyber criminals can use a Microsoft Word feature ...

GPS Location Tracking Services Are Vulnerable To Multiple Vulnerabilities

GPS Location Tracking Services Are Vulnerable To Multiple Vulnerabilities Security researchers have published a report on a series of flaws that they called “Trackmageddon” that affect many GPS and location tracking services. ...

Microsoft stops charging for some operating systems

Microsoft stops charging for some operating systems Microsoft plans to stop charging a fee for its Windows operating software for some smartphones and small tablets, in a recognition the company needs a new strategy for areas of ...

Register New Account
Reset Password