Microsoft Announces Windows Defender ATP Antivirus for Mac

Microsoft Thursday announced that the company is bringing its anti-malware software to Apple’s macOS operating system...


Android Q provides users more control over location data

Location is at the very core of smartphone experience for Android users. Be it searching a good eatery or a store...


Check Point Forensic Files: A New Monero CryptoMiner Campaign

A new variant of the Monero mining malware has been detected by the Sand Blast Agent Forensics team, which is spreading...


JNEC.a Ransomware Spread by WinRAR Ace Exploit

A new ransomware called JNEC.a spreads through an exploit for the recently reported code execution ACE vulnerability in WinRAR.


Microsoft Releases New updates a total of 64 CVE-listed security vulnerabilities

Microsoft released its March 2019 software updates to address a total of 64 CVE-listed security vulnerabilities...


LokiBot: An info-stealer malware targets Android systems

LokiBot is an info-stealer malware that was first detected in February 2016. LokiBot targets Android systems...


The thermal drone market is rapidly expanding everywhere

Unmanned aerial systems (UAS), more commonly known as drones, have infiltrated the geospatial world. And that’s a good thing...


New Google Chrome Zero-Day Vulnerability Found Actively Exploited in the Wild

You must update your Google Chrome immediately to the latest version of the web browsing application...


Bluesky 3D models improve Mobile, 5G and Smart City network planning

3D digital models derived from high-resolution aerial photography are helping network operators plan the rollout of services...


"Beyond the Grave" Phishing Campaign Targets Hedge Funds

The International hedge funds have become a victim of a new phishing campaign called "Beyond the Grave" that alter data...


New Golang Brute-Forcer Targeting E-Commerce Sites

A new malware has been spotted by security firm Malwarebytes, which is making rounds in the e-commerce space...


Decongesting cities trough optimum utilization of assets

During the last few decades, congestion has become a major challenge in Indian Cities. Not only in India but cities across the world face...


Smart Hack: Smart Home Hub Vulnerable to Remote Attacks Due To Weak Credentials

Smart devices, like security cameras, baby monitors, TV media boxes, smart TVs, printers, and gaming consoles,...


Formjacking: The Latest Evolving Scam

Symantec’s 2019 Internet Security Threat Report takes a deep dive into insights...



Munchy Malware Distributed via DHL Phishing Campaign

A new trojan named Muncy, a phishing campaign from DHL and entitled “DHL Shipment Notification” has been found targeting users worldwide.



Kali Linux 2019.1 Released – Kernel 4.19.13, Metasploit 5.0 and Package Updates

Kali Linux 2019.1 released with a number of bug fixes and includes kernel up to...



New version of Separ malware infects hundreds of businesses through ‘Living Off the Land’

An ongoing phishing campaign is using a new variant of Separ malware to infect hundreds of businesses located mainly in Southeast Asia...



JD Finance stored user's screenshots without permission

JD Finance, a financial services arm of JD.com apologized to its users for storing screenshots without user permission after a user posted a video on...



Google implement new feature to stop sites from detecting Incognito Mode

Google Chrome's Incognito mode is a helpful feature for private browsing however, it is not free of any faults.



From 16 Famous Websites 620 Million Stolen User Data Hits The Dark Web

A new shocking report revealed that almost 620 million online account data from 16 famous websites are on sale on the dark web.