Google launches security features while report shows iOS threats outpacing Android

Google has cracked down on security with the launch of Play Protect and other new defense mechanisms while a report has been released which shows

Read more

Hackers can now decrypt satellite phone calls(satellite communications) in ‘real time’ within a fraction of a second

Researchers have uncovered a new attack method that can make encryption used in satellite communications unsecure.

Read more

Fireball Malware: Ticking Time Bomb or All Hot Air?

Researchers from Check Point Software discovered that more than 250 million Windows computers worldwide were infected, SecurityWeekreported. According to the company’s blog, Fireball malware is like “a

Read more

6 Ways Your Apps May Be Attacked: How Crowdsourced Penetration Testing Improves Software Development

In the modern world of security and Apps security , there is stuff you worry about and stuff you don’t. Most companies have SaaS and third-party

Read more

Smart Cities, Big Problems? The Risk of Malware in IoT-Enabled Infrastructure

Cities are notoriously inefficient. As populations rise, everything from mass transit and road maintenance to power generation and garbage collection becomes more complex and costly.

Read more

Turkish Crime Family group will remotely wipe hundreds of millions of iPhones unless Apple pays ransom

Hackers belonging to the Turkish Crime Family group threaten to remotely wipe hundreds of millions of iPhones unless Apple pays a ransom.

Read more

JSON Libraries Patched Against Invalid Curve Crypto Attack

A number of JSON libraries using the JSON Web Encryption specification (JWE) to create, sign and encrypt access tokens have been patched against an attack

Read more

Apple’s iCloud saved the deleted Safari browsing history over the years

According to the Russian forensic firm Elcomsoft the Apple iCloud saved deleted Safari browsing history over the years open the door to surveillance.

Read more

Dozens of popular iOS apps vulnerable to intercept of TLS-protected data

While developing a tool for evaluating mobile application security, researchers at Sudo Security Group Inc. found out something unexpected. Seventy-six popular applications in Apple’s iOS

Read more