You need to constantly keep your mobile device secure because you constantly use it to keep your data as well as carry out sensitive transactions.
The private information of Internet users in the US may soon be up for grabs as the new law may allow ISPs to sell your information to advertisers.
During a hacking contest at Pwn2Own Microsoft Edge came out to be the least secure browser. It was hacked the most. The least hacked was Google Chrome
A phishing attack succeeds when you are not careful. You can completely guard yourself against phishing attacks by following precautions.
You need to install anti virus and malware software only if there is a chance that your PC or mobile phone would be used to download suspicious files.
It is being reported that more than 1 billion stolen or hacked Yahoo accounts are still available for sale in various underground Internet forums.
In a recent document dump WikiLeaks has revealed zero day exploits and vulnerability that the CIA uses to control people’s iPhones.
Zero day vulnerability in a software application explained. It is a vulnerability the original software developer isn’t aware of.
There has been a massive data breach in the Cloudflare Web services being used by millions of websites. It’s called Cloudbleed bug.