These days Facebook is flooded with all sorts of videos, whether it is the latest wave of ice bucket challenge, celebrity videos or dancing pet cats. However, not all of us would like to watch all the videos that are posted in the news feed. Ear... Read more
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by their research department for the Week of August 25, 2014. The National Institute of Standards and Technology (NIST) have recorded vulnerabi... Read more
With the advancements in technology, phishing attacks have only increased, proving it extremely beneficial for cyber-criminals. According to the RSA report, U.S. remained the most targeted country in July with 63% of phishing volume. On the same... Read more
When we install Android apps from the Google Play Store we are presented with a list of permissions required by each app. Seeing this, most of us chose not to download these apps. But now with Firefox OS 2.1, we will be able to enable or deny pe... Read more
A team of researchers have discovered a flaw believed to exist in Android, Windows and iOS mobile operating systems that could be used to gain private data from unsuspecting users. They found that it was successful between 82 percent and 92 perc... Read more