In the Windows platform, the use of system cleaning tools such as CCleaner has been a regular part used for Windows computer housekeeping. Same housekeeping is required with a Mac,…
Read MoreIn the Windows platform, the use of system cleaning tools such as CCleaner has been a regular part used for Windows computer housekeeping. Same housekeeping is required with a Mac,…
Read MoreThis is becoming a real headache for customers of Orange Livebox ADSL modem in France and Spain during the Christmas season; almost 19,500 modems have been discovered leaking WiFi credentials….
Read MoreFacebook has silently patched a vulnerability very recently that enabled 3rd party sites to extract user information without seeking the consent of individual users first. The aggregate data extraction includes…
Read MoreAccording to Researchers at Radboud University in the Netherlands ‘data storage devices with self-encrypting drives don’t provide the expected level of data protection. They say a malicious expert with direct…
Read MoreJust like personal computers, smartphones and tablets, new smart devices such as the highly viral remote quadcopters (AKA drones) are powered by an operating system. As part of the territory,…
Read MoreComputer security vulnerabilities are a threat that has spawned a booming industry, between the heightened global focus on security, and the proliferation of high-profile computer viruses and worms that have…
Read MoreApplication security testing was not a vital part of software development in the early days of computing. In those early days, the most important factor was that the developers meet…
Read MoreA Tesla Model S was stolen recently in Essex, England after a pair of thieves hacked the car’s high-tech keyless entry system. The whole incident, however, got recorded on the…
Read MoreJust like the healthcare industry, the financial market players are also a profitable target of cybercriminal elements. The Global DNS Threat Report 2018 by Efficient IP has released a report…
Read MoreThere is a huge difference between an Android antivirus and an Android app that offers vulnerability scans. The former has questionable effectiveness due to the way Google developed Android as…
Read More