Security researchers at FireEye have discovered a vulnerability in the Samsung Galaxy S5 that allows hackers to clone fingerprints. Samsung…
Which are different components that must be taken into consideration to build an efficient information security foundation and prevent cyber…
Yahoo announced its new on-demand password feature that lets users into login in their account with a code sent to…
DARPA is working on Cognitive Fingerprints authentication process to validate the user identity through the use of software based biometrics.…
Cybercriminals are targeting call centers operators in Apple Pay fraud to circumvent the checks implemented by Apple, banks and card…
A young hacker disclosed the details of an attack that by exploiting a couple of flaws in Facebook allowed him…
An Indian security expert Laxman Muthiyah exploited a vulnerability in Facebook Graph API mechanism to delete Facebook photo albums of…
SplashData has published its annual report on the used of passwords that includes the list of the Worst passwords of…
A security expert at the conference of the Chaos Computer Club has shown how to bypass Fingerprint biometrics using only…
If you lose your recovery key with two-step verification Apple can’t help you.By forgetting Recovery Key could completely lock a…
This website uses cookies.