Last month, Google made some changes to the Google Play Developer Policy, which outlines how apps can access confidential user information like call logs and text messages. Essentially, this restricted which apps can ask for access to this information. According to the revised policy, only apps that have been configured as default for making calls
Apple released the macOS Mojave 10.14 update last night, which brings a number of new features such as Dark Mode, Dynamic Desktop, Stacks, among others. The software update also brings bug fixes and performance improvements, but hours after its release, a security researcher has found a new vulnerability that could leave your data at risk.
[UPDATE: - 12/09/2018 - 1:37PM : UIDAI has dismissed reports of Aadhaar enrollment software hack with a security patch] Original story published on September 11, 02:54PM According to a recent report, the Aadhaar identity database (Aadhaar ID) which contains the biometrics and personal information of over 1 billion Indians has been compromised by a software
Mobile apps on your smartphone can range from most useful and secure to social media and games that help you pass your time. There are also quite a few apps that are plain redundant on the Play Store or App Store. Though, regardless of the type, smartphone apps are the backbone of our smartphone existence.
Eli Biham and Lior Neumann from the Israel Institute of Technology have identified a Bluetooth vulnerability that has the potential to allow a nearby hacker to gain unauthorized access to your device. The published research paper on the CERT website says that the encryption vulnerability in the Bluetooth firmware implementation affects devices from vendors like
There were on average five new threat samples every second that resulted in a massive 629 per cent growth in cryptojacking and other cryptocurrency mining malware in the first quarter of 2018, a new report said on Thursday. The coin miner malware grew a stunning 629 per cent to 2.9 million in the first quarter
Mozilla has announced a partnership with HaveIBeenPwned.com (HIBP) for a new security tool for Firefox web browser. The company announced that the details about the security tool Firefox Monitor in a post on Mozilla blogs website. According to the post, the company is testing user interest in the security tool that allows users to check
Wi-Fi devices follow a security protocol that makes it secure, which is to say that it will keep freeloaders that want to steal your internet out. The simplest way to explain this is that it creates a security protocol that only allows people with the key to gain access. For the time being, most home
With more than three million hits globally in the first five months of this year, cryptojacking, a form of cyber-attack in which hackers hijack the infected system's processing power to mine cryptocurrency, is fast emerging as an alternative to ransomware, according to IT security firm Quick Heal. The number of mobile cryptojacking malware variants has
Apple has always been a bit of a fanatic when it comes to the security its devices provide. And this has cost them by attracting more attention from hackers and security experts than most other companies. And primary among these devices are the iPhones, because it is the most prevalent Apple product on the market.
An independent security researcher has discovered a security flaw in the OnePlus 6 that exploits an issue in the bootloader to give a potential hacker access to your phone. Jason Donenfield of Edge Security LLC, a security firm based in the United States, has discovered a vulnerability on the OnePlus 6 that allows anyone with
If you've been under the impression that your secure emails client is keeping you safe, then it's time to rethink your privacy strategy. In case you have been relying on PGP or S/MIME to keep your email safe, then you need to stop using them right away. A group of European researchers have discovered vulnerabilities
Nearly 57 percent Indian IT managers can't identify network traffic while 61 per cent dont know how their bandwidth is consumed, a new report said on Wednesday, adding that the majority of Indian IT managers have legal liabilities when it comes to unidentified traffic at their workplaces. According to British IT security company Sophos' global
Google has released its Android Security 2017 Year in Review report, further highlighting how it is closing gap to Apple's iOS in security aspect of the mobile operating system. This is the fourth annual report on Android security and it details various improvements to Google's security offerings for the mobile operating system. One of the
McAfee, the company behind the popular antivirus going by the same name, has acquired virtual private network (VPN) provider TunnelBear. The terms of the deal were not revealed by the company but it is a major acquisition for the Canada-based VPN company. TunnelBear based in Toronto was founded in 2011 and has gained a strong
Nearly half of the IT security professionals, 46 per cent, failed to change their security strategy substantially even after experiencing a cyber-attack, according to the information by the security company, CyberArk. This level of cyber security inertia and failure to learn from past incidents puts sensitive data, infrastructure, and assets at risk, CyberArk's "Global Advanced
Revealing that industrial companies were not moving quickly to adopt cyber security measures to protect their data and operations, a study on Friday said 45 per cent of those surveyed lacked a reliable enterprise leader for cyber security. Software-industrial company Honeywell polled 130 strategic decision makers from industrial companies about their approach to the Industrial
It is nearly impossible to ascertain the number of active devices in the world that features Bluetooth connectivity. All these devices though are at risk, and the reason behind it is a Bluetooth flaw.
Indians on the web cannot resist free Wi-Fi and 51 percent of them log into public networks as soon as they can spot one, says Norton's latest Wi-Fi Risk Report. About 74 percent of India's public Wi-Fi users believe that their information is safe. And they are willing to follow any instruction like clicking on a link or opening an attachment or watching a video to access free public Wi-Fi.