Please turn on your JavaScript for this page to function normally.
iPhone 8
iOS 12 will allow users to share their exact location with emergency services

When iOS 12 is released later this year, it will come with a new feature that will allow iPhone users in the US who call 911 to “automatically and securely” share …

mask
Fraudster exploited US govt staff info stolen in 2015 OPM breach

The data breach suffered by the Office of Personnel Management (OPM) is, by now, very old news, but some of the people involved and affected are still feeling the …

dark
French authorities dismantle Black Hand dark web market

The “Black Hand” forum, considered to be one of the most important illegal platforms of the dark web in France, has been dismantled by French law enforcement. …

GnuPG
Vulnerability in GnuPG allowed digital signature spoofing for decades

A vulnerability affecting GnuPG has made some of the widely used email encryption software vulnerable to digital signature spoofing for many years. The list of affected …

Apple
Apple prohibits developers from using, selling users’ Contacts

According to new rules recently published by Apple, iOS app developers must refrain from creating a database of the information gleaned from users’ Contacts and to sell …

Tapplock
Researcher hacks smart fingerprint padlock in mere seconds

The Tapplock one “smart” padlock, which received many rave reviews by tech-focused news sites and YouTubers, can be forced to open in under two seconds with a …

Dixons Carphone
Dixons Carphone breach: Personal and payment card info compromised

Dixons Carphone, the multinational electrical and telecommunications retailer that holds over 2,000 stores across the UK, Ireland and mainland Europe, has suffered a security …

Windows 10 patch
Overview: Microsoft June 2018 Patch Tuesday

It’s that time of the month again when Microsoft releases patches for its software. The June 2018 updates fix 50 vulnerabilities, 12 of which are critical. The company …

Google Chrome
Google removes inline installation option for Chrome extensions

Google is shutting down an often used vector for delivering malicious Chrome extensions to users by removing the inline installation option. What will happen? The announcement …

USA flag
US repeals net neutrality rules, what happens now?

Net neutrality rules have been officially repealed in the US on Monday, as the Restoring Internet Freedom Order by the Federal Communications Commission went into effect. The …

Apple
Fooling security tools into believing malicious code was signed by Apple

The way developers of third-party security tools use the Apple code signing API could be exploited by attackers to make malicious code linger undetected on Macs, a security …

vmware
VMware plugs RCE hole in remote management agent

VMware has fixed a critical remote code execution vulnerability in VMware AirWatch Agent for Android and Windows Mobile, and is urging users to upgrade to the newest versions …

Don't miss

Cybersecurity news