Vulnerabilities in pre-installed apps expose millions of Android devices

Your new phone could be remotely hacked Almost all phones

Users could spread fake news because of WhatsApp vulnerabilities

Flaws allows malicious users to modify content Enterprise network security

Iphone chipmaker hit by massive ransomware attack

Factories crippled after WannaCry variant infected Windows 7 devices without

Vehicle-sharing apps are vulnerable to hacking

Researchers specializing in enterprise data protection services have analyzed more

Perspectives on loss and theft: ApplePay and Google Wallet

Mobile payment services and their security mechanisms ApplePay and Google

A Human Resources company suffers data breach

Security breach compromised thousands of customer data ComplyRight, a Human

Spanish telecom provider suffers massive data breach

Telefónica, a Spain established telecom operator, has become victim of

CISCO fixes serious bug on VoIP Phones

The company also patched three medium-security flaws in its network

Researchers silently manipulate GPS navigation systems

A group of researchers in computer security and secure data

Advanced Mobile Malware Campaign in India uses Malicious MDM

Cisco Talos has identified a highly targeted campaign against 13

Apple and Google face questioning from US Congress for user tracking

  Last May, two weeks before the promulgation of the

Tips for pentest experts

  Some recommendations for pentest specialists seeking security failures in

Samsung Galaxy devices send private images attached to text messages

The company requests the concerned users to contact them directly.

LTE wireless connections used by billions aren’t as secure as we thought

LTE was supposed to fix security and privacy shortcomings—now it’s


Researchers have found a new variation of the Rowhammer attack

Do our smartphone batteries spy on us?

Smartphone’s batteries are a smart device themselves, smart enough to

Bitcoin Airdrop fraud, protect yourself against phishing attacks

The increased deals with cryptocurrencies such as Bitcoin and its

A very simple hack evades iOS password entry limit, possibilities of brute force attacks

A researcher specialized in information security training recently discovered an