How To Spot Dark Patterns And Stay Safe

How To Spot Dark Patterns And Stay Safe

“Technology is neither good nor bad, only thinking makes it so.” Technology is a double-edged sword. It has the power to change for both good and ...

Beware!! Your Facebook Messenger Is At Risk of a Malware Attack

Beware!! Your Facebook Messenger Is At Risk of a Malware Attack

The users of Facebook, Chrome and cryptocurrency are at high alert as a new and advanced version of malware called FacexWorm is at work. FacexWorm, wi...

Is Penetration Testing Need Of The Hour For Ensuring Cybersecurity?

Is Penetration Testing Need Of The Hour For Ensuring Cybersecurity?

Today, it is more critical than ever to find and overcome system and network loopholes. However, finding out the issues is getting beyond the reach of...

Ransomware Hits Center for Orthopedics (COS), California

Ransomware Hits Center for Orthopedics (COS), California

First, offices and organizations, then crypto exchanges, government authorities, agencies, and now healthcare. Ransomware attacks have now targeted th...

Can ISPs Be Trusted With Our Personal Data?

Can ISPs Be Trusted With Our Personal Data?

Majority of us don’t want to share things to the world that are private, but is that content safe from your ISP? And several Internet users, use at ...

New Malware On Android That Records Your Calls And Messages

New Malware On Android That Records Your Calls And Messages

Recently a new malware threat has emerged that specifically targets Android devices. Cisco Talos has discovered a new Android Trojan which is being di...

LinkedIn AutoFill Bug Allowed Hackers to Steal Data from User Profile

LinkedIn AutoFill Bug Allowed Hackers to Steal Data from User Profile

Every now and then we hear about company data breaches resulting in millions of user’s data left exposed. It’s just been over a month when Faceboo...

Google Play: A Host For Cryptocurrency Malware

Google Play: A Host For Cryptocurrency Malware

What happens when the Yin meets the Yang? It brings about balance on a cosmic level. The advent of the decentralized Blockchain technology and with it...

CCleaner Supply-Chain Malware Attack: All You Need to know

CCleaner Supply-Chain Malware Attack: All You Need to know

Do you remember last year’s supply-chain malware attack on a popular cleanup software named CCleaner? No? Then allow us to remind you how intense th...

Attack Group “Orangeworm” Targets Healthcare Industry

Attack Group “Orangeworm” Targets Healthcare Industry

A new hacker group called “Orangeworm” has been targeting Healthcare sector and International corporations which are directly or indirectly relate...

Who Has More Of Your Personal Data Facebook Or Google

Who Has More Of Your Personal Data Facebook Or Google

Facebook is all over the news for its privacy breach and users are in shock, but this is just the beginning! We need to keep a check on other services...

Warning! Your Six-digit iPhone Passcode is no longer Secure

Warning! Your Six-digit iPhone Passcode is no longer Secure

Apple is known for its security and over the years it has made its iPhone more secure. But certainly it's device security is not as strong as boosted....