A bug in the Google Play Core Library might have allowed apps to steal user data

A major crack in the Google Play Core Library might have granted…

Google has open-sourced the tools needed to make 2FA security keys

Security keys are relatively unknown and their use limited, so we don’t…

Cisco plans to train 250k students in India, opens its 5th Cyber Range Lab in Gurugram

With an increase in the number of connected devices and technology upgrades, the…

Standards Australia publishes Roadmap for Blockchain Standards, points out uses and important issues

Australian non-profit organization, Standards Australia recently released a roadmap for Distributed Ledger…

Snapdeal partners with Truecaller to reduce the rate of no response delivery calls

Undesirable calls not only breaks our flow of the day but also…

Microsoft debuts new Privacy Dashboard that enables you to keep a check over your shared data

With the advent increase in cyber security attacks, Microsoft plans to benefit users…

Super Mario Run requires constant internet connection to play all three game modes

Everyone around the world is getting pumped up for Nintendo’s first-ever mobile…

Updated Gugi banking trojan can now force its way past new Android 6.0 Marshmallow security features

Kaspersky Lab announced today that a trojan is out in the wild…

DROWN, A New Decryption Attack Jeopardizes The Security Of More Than 11M HTTPS Websites

A new decryption attack which researchers have dubbed vulnerability DROWN, short for Decrypting…

Undeterred By The General American Response And The FBI, Apple Reportedly Trying To Make It Even Harder To Hack iPhones

Recent reports by the New York Times and the FT seem to indicate that Apple…