Security

New Safari Bug Can Leak Apple Users’ Web History

A bug found in Apple’s Safari 15 can leak a user’s web browsing activity and potentially their identity. The vulnerability was first revealed by FingerprintJS which is a fraud detection service. Their report points out that the bug is in Safari’s implementation of...

Why You Shouldn’t Share Location on Social Media?

The advent of social media has put everyone in a rat race of sharing. From sharing their pictures, important milestones and even location on social media and the internet. People have become very fond of this practice to update their friends and followers...

Security Practices for Using USB’s and Other Devices

Modern technology sees an over reliance on USBs and other portable devices. Such devices include flash drives, external hard drives or even SD cards.  Many of us are still unaware of how to use said devices, often ignoring warning signs. The most common cause...

How to secure your phone from hackers?

Having a mobile phone always comes with its pros and cons but aren’t we already aware of this? Pretty much, yes! Regardless of this era marking history in the world of technology, owning and keeping your phone secure and safe isn’t an easy...

Microsoft says Russian hackers viewed its source code

Microsoft claims that the suspected Russian hackers might have accessed the Microsoft source code. This was done as part of the same act, which has diagnosed several renowned US companies being infiltrated by suspected Russian hackers.  Initially, Microsoft claimed that it was safe during the entire...

Russians using social media to interfere in upcoming American presidential election

A Russian group, Internet Research Agency, backed by the Kremlin, is reported to have made attempts to cause trouble in the upcoming presidential election in the US. This is believed to be the same group that interfered with the 2016 election and hacked the Hillary...

Twitter confirms hackers accessed DMs of 36 accounts in Bitcoin scam

Twitter has completed its research for 130 hacked accounts on its social network and discovered that the hackers behind the crypto scam had accessed the direct messages of as many as 36 high-profile accounts, including one elected official in the Netherlands.  The hackers who...

VMWare acquiring network security firm Lastline

VMware, a well known American publicly traded software company, has announced its intent to acquire Lastline, an anti-malware cybersecurity company, for research and to yield innovative security capabilities. The deal will close by July 31, and the startup has not disclosed much about...

Google bans employees from using Zoom on computers

Google has banned its employees from using Zoom, one of the popular video conferencing app, on laptops and computers over privacy and security concerns. The news came after NASA and SpaceX restricted their employees from using Zoom as the U.S. law enforcement warned...

Cryptojacking, a top cyberattack threat in 2020 and its prevention

In 2020 one of the most common cyber attacks would be cryptojacking - “unauthorized use of someone else’s computer to mine cryptocurrencies like Bitcoin” Cryptojacking, according to Malwarebytes, is an emerging form of malware that hides on your device and steals its computing resources in...

Latest News

Estimated reading time: 7 minutes If you're looking for a stylish and powerful Windows device, you likely have mixed feelings about the Microsoft Surface Pro and the Surface Laptop. Both are...