How often your iPhone device gets bombarded with unnecessary calls, emails and messages? If your answer is A LOT and if you...
Smartphone has become an essential need for almost everyone in this technological era. Subsequently, when a device is low on bars, there’s...
On Thursday, the Senate Committee expressed strong reservations over Pakistan Telecommunication Authority’s (PTA) decision of inking a contract with a US-based firm....
If security researchers claim that a software, hardware, device or anything which they develop is unhackable, they call themselves in for a...
A new phishing technique has popped up and it’s known as inception bar. One of the developers Jim Fisher recently identified this...
The question is, even if Facebook pulls it off, will it make user data more secure or not? In an interview with...
Years ago, you heard about Target’s data breach, the attack on Ashley Madison and Experian’s expensive hack and thought: not me. So,...
Google Play Store has been on the top list of many cyber criminals during the last few years as it has been...
In the last few years, most of the tech companies have introduced a trend of bug bounty programs. The idea revolves around encouraging...
On Monday, the cyber wing of Madhya Pradesh Police took into custody two individuals for their involvement in hacking credit cards of...