Back-to-Back PlayStation 5 Hacks Hit on the Same Day

Cyberattackers stole PS5 root keys and exploited the kernel, revealing rampant insecurity in gaming devices. A pair of PlayStation 5 breaches shows the consoles don’t have protection from attackers taking…

iPhone users don't care about sideloading

Well, there we have it. The Apple CEO has said it. If you want to sideload apps on a smartphone, buy an Android. Speaking at The New York Times “DealBook”…

Unified Endpoint Management Explained: (Why) Does Your Company Need One?

This post is also available in: Danish Gone are the days when a lone system administrator would perch upon the ledge of your desk to help you with menial tasks…

iOS 15, Windows 10 and Google Chrome Hacked During the Tianfu Cup Contest

During the weekend of 16th -17th October, a hacking competition took place in China, more specifically in Chengdu’s Sichuan province. The most prestigious and biggest competition in this sense in…

iPhone Hackers Win $300K

iPhone Hackers Win $300K A white hat hacking team has won a life-changing amount of money for completing the world's first public remote jailbreak of the iPhone 13 Pro. The…

iPhone 13 Pro, Windows, Chrome, Linux and others pwned at Tianfu Cup

Tianfu Cup is a version of the Pwn2own in which hackers from Kunlun Lab managed to secure first place by hacking iPhone 13 through a vulnerability in the Safari mobile…

How to fix iPhone boot loop and iPhone black screen by yourself

iPhone boot loop has become more prominent following the recent iOS upgrades. Worse, you might even experience an iPhone black screen – Let’s dig deeper into how to solve these…

Apple Releases Urgent iOS Updates to Patch New Zero-Day Bug

The bug is under attack. Within hours of the patch release, a researcher published POC code, calling it a “great” flaw that can be used for jailbreaks and local privilege…

iOS forensics

Day by day, smartphones and tablets are becoming ever more popular, and as a result, the technology used in development to add new features or improve the security of such…

8 of the world’s biggest insider threat security incidents

Introduction If you work in security or are just interested in the general area of cybersecurity you will no doubt have heard of the dreaded insider threat. In the context…