Google seems to go for diversity and serendipity when it comes to things it works on. I say serendipity because they sometimes...
The FTC has said that ASUS has demonstrated a “failure to employ reasonable security practices [that] has subjected consumers to substantial injury.”...
A new Georgia Tech study has found that in app ads are leaking users personal data to the developers of the mobile...
Researchers at Bastille Networks have revealed what they’re calling mousejack attacks in certain USB dongles manufactured by Dell, Lenovo, Logitech and four...
The battle between the FBI and Apple over unlocking an iPhone 5c is still raging on and Apple is standing its ground...
Privoro Privacy Guard is a new device that is promising to secure your iPhone 6/6s and maintain your digital privacy. With the...
The founder of the Linux Mint project, Clement Lefebvre announced on the official blog that the Linux Mint website was hacked and...
HSBC is launching voice recognition and touch security services in the UK in a big leap towards the introduction of biometric banking. The...
Wait, what? I know, you may be rubbing your eyes and thinking that you’ve perhaps entered Crazytown, but here we are. In...
The iPhone 5c that was used in the San Bernardino shootings has become the hot topic of the week even making it...
You know a tech topic is of major importance when an afternoon has-been Chicago radio talk show host is talking about it....
Have you ever wanted to get even with those advertisers who spam mobile ads through the apps on your phone? I know...
All mobile applications require some sort of permissions in order for the software to operate as intended that’s entirely normal protocol. Developers...
Ransomware on your personal computer can be a huge pain in the butt to deal with, often times the only solution is...
Security service Symantec is reporting a rise in Netflix accounts being hacked and passwords being sold for as little as 25¢. Symantec...
Government Needs To Be More Vigilant Against Enemies Overseas, Cyber Security Expert Says The Internet has transformed the way we communicate, the...
It seems that every day huge companies are getting hacked, client data is getting stolen, and user accounts are getting compromised by...
Well if you can’t break into Apple’s systems through traditional hacking methods why not pay €20,000 for an employee’s Apple logins? According...
Would you like your data breach Biggie Sized? I can’t take credit for that amazingly sick burn, it was shamelessly stolen from...
Have you ever lost your password or forgotten your login details for a service? Usually it’s just a matter of contacting customer...
Jokes are fun, right? Well, they’re fun right up until they aren’t. I’d imagine this joke falls into the latter category of...
Amazon has built a reputation on the Internet as being a great place to purchase goods and services online. They offer a...
Before we actually talk about this survey conducted by brand marketing company Prophet, we have to stress that surveys can swing either...
Fujitsu, with some assistance from Japan’s Ministry of Internal Affairs and Communications, has developed a new technology that can detect real time targeted...
We, along with many other websites, reported that a new Linux kernel flaw could make millions of Android devices vulnerable to attack...
Passwords are a way of life now, from checking your email, your bank account, your social media, or just logging into your...
A Linux flaw that has been creeping around for nearly three years, allows unprivileged apps or users to gain root access to...
The Apple Gatekeeper vulnerability discovered back in September 2015 that allows unsigned apps to circumvent Apple’s malware checks is still not patched....