With people succumbed to social media to be on the trend and in the know of the latest news and updates, Chinese App Tiktok was on the top list that has been banned in India’s circulation. This app was a global trend and boomed on people as this platform can share short videos and information...Continue Reading
There seems to be a race going on every government to come up with a contact tracing app, and another part of the scene are threat actors who could also come up with a copycat app. It is undoubtedly a copycat that may exist on every legitimate application when somehow someone tries to exploit the...Continue Reading
Being cautious and updated with the latest news about the ongoing chaotic issue with COVID19 is a must for everyone. Knowing the current status for each country and reports of its spread and especially the statistics is the best defense for our protection. As the current mandate and part of the mitigation strategy of each...Continue Reading
Alert: You have been exposed! With the ongoing pandemic crisis for COVID-19, app magnates – Google and Apple are now on a venture to release a coronavirus tracing application, to be released this mid of May. The said app will be for Android and Apple users that will use some similar code that is...Continue Reading
Facebook is one of the most used Social Media platform worldwide with more than 2.45 Billion monthly active users and counting. The platform also collects personal information on its users once you created an account. This is a known fact and is considered by the US congress as a violation of every individual’s privacy, regardless...Continue Reading
Cyber-security researchers have just discovered two (2) malicious crypto-stealing apps in the Google Play store that have been downloaded over 1,000 times. The two fraudulent apps are “Trezor Mobile Wallet” and “Coin Wallet – Bitcoin, Ripple, Ethereum, Tether,” and security researchers note that both apps share an “overlap in code and interface.” The fake Trezor...Continue Reading
Qualcomm chipsets are generally the processor of choice for many smartphone users, owing to the firm’s powerful graphics hardware and developer-friendly nature. It’s not immune to chipset vulnerability flaws though, and its latest vulnerability is a big one. Security researchers discovered the flaw last year, allowing cyber-criminals to gain private data and security keys in...Continue Reading
A cyber security research team has identified a vulnerability in the protection of top mobile web browsers. Shockingly, mobile Chrome, Safari, and Firefox failed to show any blacklist warnings between mid-2017 and late 2018 despite the presence of security settings that implied blacklist protection. However, this issue only affects mobile browsers that use Google Safe...Continue Reading
Chinese-made GPS tracker that have no internet connectivity but use a SIM card to connect to a cell network are bought in bulk, rebranded, and resold by a number of companies worldwide. UK cyber-security experts are calling for an immediate recall of a GPS tracker used as a panic alarm for elderly patients, monitoring...Continue Reading
Phishing attack hacker are abusing the notifications and push APIs on Android devices to send spam alerts that are customized to look like a missed call. Both APIs are used on mobile devices for push notifications – short messages intended to re-engage the user. Messages can be triggered by a local application or server. ...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.