Home security App - Mobile Applications protect security

Applications protect security

Microsoft Cortana Allows Browser Navigation Without Login: CVE-2018-8253

A locked Windows 10 device with Cortana enabled on the lock screen allows an attacker with physical access to the device to do two kinds of unauthorized browsing. In the...

Hackers can edit and delete police bodycam footage or weaponize devices with malware

Police body cameras are riddled with security vulnerabilities would could allow a hacker to remotely tweak or delete footage, track the cops wearing them or weaponize the bodycam by installing...

Google Tracks iPhone and Android Users Location Data Even Turned Off

Google tracks your location even if you have the Location History turned off on your mobile devices. Generally, Google asks permission to allow access to your location and if you...

Pausing ‘Location history’ doesn’t stop Google tracking your location. Here’s how to stop it

You would think that telling Google that you didn’t want your location be tracked by disabling an option called “Location History” would stop the internet giant from errr.. storing data...

Btlejacking Attack Could Allow an Attacker to Takeover the Bluetooth Connection

The Btlejacking Attack allows taking control over any Bluetooth Low Energy device, the attack abuses supervision timeout between two connected devices. The supervision timeout defines the time after which the...

macOS Invisible Mouse Clicks Attack Allows to Bypass Kernel Protection

A Presentation that was demonstrated during the Def Con 2018 regarding the Zero-day vulnerability that discovered in macOS High Sierra OS allows let an attacker access the kernel using invisible mouse clicks. Basically,...

macOS Invisible Mouse Clicks Attack Allows to Bypass Kernel Protection

A Presentation that was demonstrated during the Def Con 2018 regarding the Zero-day vulnerability that discovered in macOS High Sierra OS allows let an attacker access the kernel using invisible mouse clicks. Basically,...

How to Hack into Someone’s WhatsApp With or Without Using an App ?

We all love WhatsApp. From chatting to sharing stuff to gossiping in groups, it has all the features to be...

Back to School: Cybersecurity in the Classroom

It’s hard to believe that summer is coming to an end and that back-to-school time is around the corner. For some kids, that means cyberbullies are traded in for school...

KeyPass ransomware – Securelist

In the last few days, our anti-ransomware module has been detecting a new variant of malware – KeyPass ransomware. Others in the security community have also noticed that this ransomware...

LATEST NEWS

MUST READ