Two Ukrainian men used online quizzes to lure more than 60,000 Facebook users into installing malicious browser extensions that leaked their profile data and...
In a bid to secure developer accounts from hackers, Apple has added the requirement of a two-factor authentication (2FA) protocol for all app makers...
Ahead of the roll-out of the advanced 5G network protocol, researchers have revealed the sheer vulnerability in the network that allows for spying of...
More than half (55 per cent) of the personal computer (PC) applications installed worldwide are obsolete, thus making the users and their personal data...
A Japan-based cybersecurity firm, Trend Micro on Friday released its cybersecurity reports, in which it said that "In 2019, the hackers will use more...