Being cautious and updated with the latest news about the ongoing chaotic issue with COVID19 is a must for everyone. Knowing the current status for each country and reports of its spread and especially the statistics is the best defense for our protection. As the current mandate and part of the mitigation strategy of each...Continue Reading
Alert: You have been exposed! With the ongoing pandemic crisis for COVID-19, app magnates – Google and Apple are now on a venture to release a coronavirus tracing application, to be released this mid of May. The said app will be for Android and Apple users that will use some similar code that is...Continue Reading
Facebook is one of the most used Social Media platform worldwide with more than 2.45 Billion monthly active users and counting. The platform also collects personal information on its users once you created an account. This is a known fact and is considered by the US congress as a violation of every individual’s privacy, regardless...Continue Reading
Cyber-security researchers have just discovered two (2) malicious crypto-stealing apps in the Google Play store that have been downloaded over 1,000 times. The two fraudulent apps are “Trezor Mobile Wallet” and “Coin Wallet – Bitcoin, Ripple, Ethereum, Tether,” and security researchers note that both apps share an “overlap in code and interface.” The fake Trezor...Continue Reading
Qualcomm chipsets are generally the processor of choice for many smartphone users, owing to the firm’s powerful graphics hardware and developer-friendly nature. It’s not immune to chipset vulnerability flaws though, and its latest vulnerability is a big one. Security researchers discovered the flaw last year, allowing cyber-criminals to gain private data and security keys in...Continue Reading
A cyber security research team has identified a vulnerability in the protection of top mobile web browsers. Shockingly, mobile Chrome, Safari, and Firefox failed to show any blacklist warnings between mid-2017 and late 2018 despite the presence of security settings that implied blacklist protection. However, this issue only affects mobile browsers that use Google Safe...Continue Reading
Chinese-made GPS tracker that have no internet connectivity but use a SIM card to connect to a cell network are bought in bulk, rebranded, and resold by a number of companies worldwide. UK cyber-security experts are calling for an immediate recall of a GPS tracker used as a panic alarm for elderly patients, monitoring...Continue Reading
Phishing attack hacker are abusing the notifications and push APIs on Android devices to send spam alerts that are customized to look like a missed call. Both APIs are used on mobile devices for push notifications – short messages intended to re-engage the user. Messages can be triggered by a local application or server. ...Continue Reading
Smartphone players often rely but get frustrated with the free mobile gaming mechanism, making them wait for a long period of time to advance and unlock some of it’s features. With this in mind, players end up finding ways to progress into the game. Now this is where the hackers come in. Popular mobile games...Continue Reading
It was a very unpleasant Friday, at approximately 12:45 PM Pacific Standard Time, Twitter handle @jack – confirmed to be of Jack Dorsey’s (Twitter’s Chief Executive Officer) account, began sending out a series of highly inappropriate and notably disturbing tweets. They included a mix of racial slurs, obscenity, profanity, nazi-inclined campaigns, and even a bomb...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.