5 Tips for Protecting Your Phone from Malware

Most people today depend on their phones entirely. Aside from being a portal to our social life, they also make our lives easier in many ways. One of the best…

Hackers Using Web3 Backdoor Wallets to Steal Seed Phrases from iOS/Android Users

A Chinese-speaking, technically skilled threat actor distributes backdoored applications to extract cash from victims in the newly discovered large-scale operation. Confiant security researchers have shared details of a large-scale operation…

Can your mobile phone get a virus? Yes – and you’ll have to look carefully to see the signs

Padlokr –  Padlokr –  Ritesh Chugh, CQUniversity Australia With nearly 84% of the world’s population now owning a smartphone, and our dependence on them growing all the time, these devices…

5 Casual Games You Can Play on Your Mobile Browser Now

Online gaming has always been the buddy of leisure time because they allow us to bring some enjoyment to our lives after spending some hectic time. That’s why online games…

Bug in Safari browser leaks personal identifiers and browsing activity

The bug affects the Safari 15 browser for Mac and all versions of Safari on iOS 15 and iPadOS 15. Researchers at browser fingerprinting and fraud detection service, FingerprintJS, have identified that…

Meta removes accounts of spyware company Cytrox after Citizen Lab report on gov't hacks

Citizen Lab has released a new report highlighting widespread government use of the “Predator” spyware from North Macedonian developer Cytrox. Researchers found that Predator was used to attack two people…

NSO zero-click iMessage exploit hacks iPhone without need to click links

The IT security researchers at Google have declared the NSO zero-click iMessage exploit as “Terrifying.” Google Project Zero’s (GPZ) Ian Beer and Samuel Groß have shared details on a new…

Google: This zero-click iPhone attack was incredible and terrifying

Google has explained how surveillance company NSO Group developed an exploit that would allow users of its software to gain access to an iPhone and install spyware – without a…

CEO Fraud Emails – Not Every Money Transfer Request You Receive Is Legit

You know the saying If it’s too good to be true, then it probably is? The same could go with If it’s too pressing to be true, it probably is…

Apache’s Fix for Log4Shell Can Lead to DoS Attacks

Not only is the jaw-dropping flaw in the Apache Log4j logging library ubiquitous; Apache’s blanket of a quickly baked patch for Log4Shell also has holes. As if finding one easily-exploited…