Hackers locked Mac devices remotely using Find My iPhone feature

Hackers Locking Mac Devices Remotely Via Find My iPhone Exploit for Ransom

While hackers are attacking on Windows Operating System continually by spreading dreadful malware and ransomware such as WannaCry, Petya and Locky, the Mac that is considered to be more secure operating system...
BlueBorne Attack

BlueBorne: Bluetooth Attack Impacted More Than 5.3 Million Devices

The researchers have discovered a new malicious BlueBorne attack which can affect Windows, Linux, Android as well as iOS devices. By this malicious attack, hackers can easily get remote access to...
locky ransomware

New Variant of Locky Ransomware Infects 23 Million Users

Recently, researchers from AppRiver spotted massive campaign of emails containing Locky Ransomware that is spreading all over the world but the main target of the attacker is United State. The ransomware...
Sarahah steals contacts silently

Sarahah App Silently Steals Your Entire Contact List

Sarahah is newly launched app that has become one of the most viral apps within a couple of weeks. This app allows users send messages to each other anonymously. Questions are...
Cex data breach, Cex hacked

Two Million Customers Information Breached from CeX Server

UK’s biggest retail store CeX's servers are hacked and millions of customers’ data got swiped by hackers. Yesterday, the dealers at CeX noticed that the data of their customers’ is missing....
Download Avast Endpoint Protection, Download Avast business solution

Direct Download Avast Endpoint Protection for Standalone Client, Small Office and Enterprise Administration

Avast Endpoint Protection lets network administrators protect the corporate network when accessed via remote devices. Endpoint protection solutions are essential for the business security as these addresses various endpoint security issues....
Setup VPN on Windows, Hotspot Shield VPN

Should You Use VPN and How to Setup VPN on Windows

To Setup VPN or Virtual Private Network on your system is the reliable and popular way to cover your privacy and important credentials when you use public networks. The Internet is the vast...

Top 11 Tips to Secure Android Mobile Phone

Android mobile phone security issue is becoming serious as noticeable phishing attacks, ransomware activities and viruses attacks have been detected by security experts. Most of the digital activities are being performed...
Tor Public bug bounty program

Tor’s Public Bug Bounty Program, Hackers can Earn from $100 to $4000

Tor launched a public bug bounty program to encourage the ethical hackers to find and disclose the security issues of Tor. As Tor is being used by the human rights defenders,...

Microsoft Releases AI Powered Security Risk Detection Tool

While the large organisations and developers are concerned about fixing the security issues with regular updates in order to provide protection to the users of the software, Microsoft has just released...