Android phones and Mac gadgets are some of the devices that are commonly used by individuals worldwide. Roughly, there are 5 billion mobile users globally, and 3 billion are using smartphones. Research says that a person spends three hours and fifteen minutes on their mobile phones daily. The consumption still depends on the generation and...Continue Reading
The infamous mobile exercise and fitness app Fitbit was just given a rather “malicious” upgrade. Call it an alarming discovery from a security researcher, who found out that hackers and other threat actors can spike the app with malware, powerful enough to phish out personal and other information from its user. Fitbit advertises their app...Continue Reading
With people succumbed to social media to be on the trend and in the know of the latest news and updates, Chinese App Tiktok was on the top list that has been banned in India’s circulation. This app was a global trend and boomed on people as this platform can share short videos and information...Continue Reading
There seems to be a race going on every government to come up with a contact tracing app, and another part of the scene are threat actors who could also come up with a copycat app. It is undoubtedly a copycat that may exist on every legitimate application when somehow someone tries to exploit the...Continue Reading
Being cautious and updated with the latest news about the ongoing chaotic issue with COVID19 is a must for everyone. Knowing the current status for each country and reports of its spread and especially the statistics is the best defense for our protection. As the current mandate and part of the mitigation strategy of each...Continue Reading
Alert: You have been exposed! With the ongoing pandemic crisis for COVID-19, app magnates – Google and Apple are now on a venture to release a coronavirus tracing application, to be released this mid of May. The said app will be for Android and Apple users that will use some similar code that is...Continue Reading
Facebook is one of the most used Social Media platform worldwide with more than 2.45 Billion monthly active users and counting. The platform also collects personal information on its users once you created an account. This is a known fact and is considered by the US congress as a violation of every individual’s privacy, regardless...Continue Reading
Cyber-security researchers have just discovered two (2) malicious crypto-stealing apps in the Google Play store that have been downloaded over 1,000 times. The two fraudulent apps are “Trezor Mobile Wallet” and “Coin Wallet – Bitcoin, Ripple, Ethereum, Tether,” and security researchers note that both apps share an “overlap in code and interface.” The fake Trezor...Continue Reading
Qualcomm chipsets are generally the processor of choice for many smartphone users, owing to the firm’s powerful graphics hardware and developer-friendly nature. It’s not immune to chipset vulnerability flaws though, and its latest vulnerability is a big one. Security researchers discovered the flaw last year, allowing cyber-criminals to gain private data and security keys in...Continue Reading
A cyber security research team has identified a vulnerability in the protection of top mobile web browsers. Shockingly, mobile Chrome, Safari, and Firefox failed to show any blacklist warnings between mid-2017 and late 2018 despite the presence of security settings that implied blacklist protection. However, this issue only affects mobile browsers that use Google Safe...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.