Mobile Security

device location tracking

Can Someone Track My Device When Location Settings Off?

Any smartphone already has built-in location tracking services. At the beginning location tracking was created for navigation, but it was…

How To Know If Your Phone is Hacked?

If your phone stopped working correctly and started showing obvious performance errors, then something is wrong. If you notice that…

Vulnerability in Apple iCloud puts billion users at risk

Security of over a billion iPhone owners and users of popular instant messengers is at risk due to a vulnerability…

Unofficial fixes released for 0-day issue in Windows Mobile Device Management Service

Unofficial fixes released for 0-day issue in Windows Mobile Device Management Service Access to Work or School. The problem is…

Ukrainian law enforcement officers arrested members of the hacker group Phoenix

The Security Service of Ukraine (SBU) announced the arrest of five members of the international hacker group Phoenix, which specializes…

Expert intercepted windows.com traffic

Expert intercepted windows.com traffic using bitsquatting

An independent expert known as Remy discovered that Microsoft domains…

Netherlands police posted warnings

Netherlands police posted warnings on hacker forums

The Netherlands police posted warnings on popular Russian and English…

Google paid cybersecurity experts

In 2020, Google paid cybersecurity experts $6.7 million

During the year, Google paid out 6.7 million to cybersecurity…

South Africa continue to use Flash

Authorities of South Africa create their own browser to continue to use Flash

ZDNet reports that the South Africa Revenue service has created…

Android worm spreads via WhatsApp

New worm for Android spreads rapidly via WhatsApp

ESET security researcher Lukas Stefanko reported a new malware: he…

Microsoft and DHL in phishing attacks

Hackers majorly use Microsoft and DHL brands in phishing attacks

Hackers majorly use the Microsoft and DHL brands in phishing…

Cellmate men's chastity belts

Extortionists hack into Cellmate men’s chastity belts

Last fall, researchers from Pen Test Partners reported on the…

Nissan source code leaked

Nissan source code leaked due to admin: admin credentials

The source code for mobile apps and internal tools for…

Storming of the US Congress and cybersecurity

Storming of the US Congress poses a serious threat to cybersecurity

Storming of the US Congress in Washington, in addition to…

AIR-FI turns RAM into Wi-Fi

AIR-FI attack turns RAM into a makeshift Wi-Fi signal source

Experts from Israel’s Ben-Gurion University have demonstrated the AIR-FI attack,…

SolarWinds was hacked

SolarWinds was hacked because its credentials were publicly available on GitHub

Earlier this week was reported a massive attack on the…

Heavy ad blocker in Chrome

Heavy ad blocker started working in the Google Chrome

Earlier this year, Google Chrome developers announced about adding of…