To listen a Audio we need headphones, whereas to record we need Microphones. But Security researchers at Israel’s Ben Gurion University…
SHA-1 SSL certificates which are more popular and an sucessor of MD5 algorithm are now in the final days of what…
Twitter co-founder and CEO Jack Dorsey found his account on the micro-blogging site briefly suspended Tuesday. For about 30 minutes, starting…
A proof of concept from security researcher and software developer Samy Kamkar shows that macOS, Windows, and Linux computers can…
A massive and sustained Internet attack that has caused outages and network congestion today for a large number of Web sites…
SVG(Scalable Vector Graphics) send by your friend may have Locky Ransomwares, avoid clicking it. By appending the Ransomware to an…
Many security Experts are thrust into the uncomfortable position of dealing with a huge portfolio of potentially insecure applications, limited…
Sensitive Data Exposure is difficult to exploit wheres prevalence and detect-ability is less common, but the impact is severe. Clearly…
The UK’s retailers have been warned to brace themselves for a barrage of fraud attempts this busy festive shopping season,…
Unlock Iphone with Siri : Password are the basic level of validation with smartphones, it will acts as a defence for…