On Thursday, the Senate Committee expressed strong reservations over Pakistan Telecommunication Authority’s (PTA) decision of inking a contract with a US-based firm....
If security researchers claim that a software, hardware, device or anything which they develop is unhackable, they call themselves in for a...
A new phishing technique has popped up and it’s known as inception bar. One of the developers Jim Fisher recently identified this...
The question is, even if Facebook pulls it off, will it make user data more secure or not? In an interview with...
Years ago, you heard about Target’s data breach, the attack on Ashley Madison and Experian’s expensive hack and thought: not me. So,...
Google Play Store has been on the top list of many cyber criminals during the last few years as it has been...
In the last few years, most of the tech companies have introduced a trend of bug bounty programs. The idea revolves around encouraging...
On Monday, the cyber wing of Madhya Pradesh Police took into custody two individuals for their involvement in hacking credit cards of...
Reports emerging from the technology circuit confirm that the prominent WPA2 encryption protocol, which is responsible for maintaining the security of Wi-Fi...
Ransomware has been a headache for most of PC users since the past decade. However, the virus has now spread to android...