Unfortunately, many smartphones have never been designed with security in mind, which are the most secure smartphones? Enjoy it! In…
The GeekedIn recruitment project scraped user data from GitHub and other similar websites, but data were inadvertently leaked online. The…
Russia is going to ban Linkedin after a court ruling that found the professional social network to be in violation…
Earlier this week, Donald Trump won a stunning election victory that will put him in charge of the world’s most…
AT&T has been data-mining and willingly sharing user phone data, through its “Hemisphere” Project, which is essentially a mass surveillance…
A group of security experts discovered that the Microsoft Skype Messaging service exposes user keystrokes during a conversation. A group…
The WiFox mobile app was designed as a huge container of network names and passwords for Wi-Fi airports networks worldwide.…
Why Signal is considered the most secure instant messaging app? It stores only a few information about its users, and…
Researchers devised two correlation attacks, dubbed DefecTor, to deanonymize Tor users using also data from observation of DNS traffic from…
Every time you type a number to start an iMessage conversation on your iPhone, Apple logs your message contacts and…
This website uses cookies.