Intel Bug Bounty Program Rewards $250,000 for Critical vulnerabilities

Intel Bug Bounty Program launched starting from March 2017 to collaborate with researchers and to mitigate the risk of exploitation. The Bug bounty program is open to all, any security...

It’s Why’d You Push That Button’s last show of the season

We've done it, fam. We've finished season one of the podcast. Because it's also the season of giving, and because we love you all, today's episode is dedicated...

IoT hack: how to break a smart home…again

There can never be too many IoT gadgets – that’s what people usually think when buying yet another connected device with advanced functionality. From our perspective, we also think there...

Apple wants me to remove the most important feature of my app, and wont...

After half a year of development of my app, In which it was approved many times by the app store for test flight, my app was suddenly rejected by "guideline...

Dell’s new app brings mobile notifications to the desktop

I’ll be honest, Dell wasn’t at the top of our list of must-visit companies at this year’s CES, but the PC stalwart is actually showcasing...

More than 250 Android Games Use Your Mic to Track What You’re Watching

For years, people have accused companies of using their smartphones’  microphones to record conversations. We talked about the unlikelihood of corporate eavesdropping back in June, but paranoid delusions aside, some bad actors are actually...

Delve deeper into Android development with our new course!

Do you want to learn how to use fragments, add widgets for your app, and fine tune your app's performance? Make your app available to a diverse user base through localization and...

Pantry, a light struct caching library

Looking through one of my recent Swift apps, I realized how frequently I persist (or want to persist) little pieces of data. Feature flags (does the user...

ISF has warned that data breaches are set to increase in 2018

The number, magnitude and costs of data breaches are all set to continue on...

OceanLotus APT Backdoor to Compromise Government Networks

OceanLotus APT group as know as s APT32 and APT-C-00, emerging again targeting organization and government networks by distributing backdoor to compromise their infrastructure. Cyber Criminals using variously advanced techniques to...

LATEST NEWS

MUST READ