During a hacking contest at Pwn2Own Microsoft Edge came out to be the least secure browser. It was hacked the most. The least hacked was Google Chrome
A phishing attack succeeds when you are not careful. You can completely guard yourself against phishing attacks by following precautions.
You need to install anti virus and malware software only if there is a chance that your PC or mobile phone would be used to download suspicious files.
It is being reported that more than 1 billion stolen or hacked Yahoo accounts are still available for sale in various underground Internet forums.
In a recent document dump WikiLeaks has revealed zero day exploits and vulnerability that the CIA uses to control people’s iPhones.
Zero day vulnerability in a software application explained. It is a vulnerability the original software developer isn’t aware of.
There has been a massive data breach in the Cloudflare Web services being used by millions of websites. It’s called Cloudbleed bug.
Your online privacy is constantly at risk while you are browsing the Internet. There are many ways you can browse Internet anonymously.
In almost every operating system these days you can login using a fingerprint scanner so Google has added the same capability to Google Chrome in Chromebook
Two-factor authentication or 2-step verification makes it very difficult for someone to log in to your account even if he or she has access to your email.