Blog
7 Beneficial Online Certification Courses for Cyber Security
Technology has proved to be a double-edged sword, especially when it comes to cyberspace. Many organizations have realized this one step too late only to...
Facebook’s Messenger Kids App to Allow Parents to Peer into Their Childs Inbox
Last year, Facebook’s Messenger Kids made it to the news due to serious security issues. This year, Messenger Kids is under the limelight, however, for a...
This WhatsApp Bug Could Have Let Attackers Access Files On Your PCs
A cybersecurity researcher today disclosed technical details of multiple high severity vulnerabilities he discovered in WhatsApp, which, if exploited,...
Social Captain Bug Exposed Instagram Profiles and Passwords
The startup that helped Instagram users gain popularity have unintentionally ditched their security, the service Social Captain inadvertently exposed...
Certified Ethical Hacker Course: Your Path to Ethical Hacking
Hackers are often termed as individuals who attempt to gain unauthorized access to data. However, not all of them are criminals; there are ‘white-hat...
Over 2000 WordPress Sites Hacked to Propagate Scam Campaign
The hacking campaign makes use of previously known vulnerabilities in WordPress plugins. Some of the vulnerable plugins exploited include the ‘CP Contact...
Popular Android Camera Apps Found Spying On Users
Researchers have found numerous popular Android camera apps stealing users’ data and spying on them. Android Camera Apps Caught Spying These apps also...
250 Million Microsoft Customer Support Records Exposed Online
If you have ever contacted Microsoft for support in the past 14 years, your technical query, along with some personally identifiable information might...
Android Banking Trojan Faketoken Now Also Messages Premium Rate Phone Numbers
Amidst all the new malware that emerge every day, some old viruses also reappear after being revamped. One such example is the revamped Faketoken Android...