The German researcher Starbug, has demonstrated that it is possible to extract everyone’s smartphone PIN code from any selfie “image,”…
A flaw affecting the way encryption software implements the Diffie-Hellman key exchange algorithm allowed the NSA to break trillions of…
McAfee Labs has analyzed a number of websites and services in the Dark Web used by the criminal communities for…
Google listens and records our voice searches, but the majority of the users ignores it. I'll explain how to listen…
Microsoft web applications, such as Outlook or OneDrive and account pages, expose visitors’ Microsoft Identifier (CID) in plain text. A…
Don’t throw away your old Boarding Pass, it may contain personal information that could allow attackers to run targeted attacks…
The creator of the popular Adblock Extension made a shocking revelation, the company has been sold to an unknown buyer.…
Sanmay Ved was searching for available .com domains and discovered the availability of Google.com ... then he bought it, but…
The MotherBoard news website recently published an interesting analysis on how the US Military Fails to Protect its Soldiers' Emails,…
Michael Horowitz from Computerworld discovered an application called "Lenovo Customer Feedback Program 64," which is used to gather customers feedback…
This website uses cookies.