Looking for an automated malware analysis software? Something like a 1-click solution that doesn’t require any installation or configuration…a...
Category - Articles
Latest Articles related to Cyber Security, Penetration Testing and Technology.
Tumblr today published a report admitting the presence of a security vulnerability in its website that could have allowed hackers to steal login credentials...
A 21-year-old Kentucky man who previously pleaded guilty to developing, marketing, and selling an infamous remote access trojan (RAT) called LuminosityLink has...
A four-year-old severe vulnerability has been discovered in the Secure Shell (SSH) implementation library known as Libssh that could allow anyone to completely...
Would you prefer purchasing an Android device that doesn’t have any apps or services from Google? No Google Maps, No Gmail, No YouTube! And NOT even the...
A security enthusiast who discovered a passcode bypass vulnerability in Apple’s iOS 12 late last month has now dropped another passcode bypass bug that...
All major web browsers, including Google Chrome, Apple Safari, Microsoft Edge, Internet Explorer, and Mozilla Firefox, altogether today announced to soon...
In an effort to secure users’ data while maintaining privacy, Google has announced a new security measure for Android Backup Service that now encrypts...
Signal, the popular end-to-end encrypted messaging app, is planning to roll out a new feature that aims to hide the sender’s identity from potential...
Google has added a new security feature to the latest Linux kernels for Android devices to prevent it against code reuse attacks that allow attackers to...