New Charging Cables Could Hack Your Devices
A security researcher known as "_MG_" on Twitter has invented a modified Apple Lightning cable that could allow a hacker to remotely access any Mac computer using them. He demonstrated his new ...
A security researcher known as "_MG_" on Twitter has invented a modified Apple Lightning cable that could allow a hacker to remotely access any Mac computer using them. He demonstrated his new ...
Being more of a nuisance than anything, adware doesn't see as many innovations as other forms of malware. Once in a while, an adware developer surprises the security researchers. That happened recently ...
Researchers at CheckMarx recently discovered some serious security flaws in the popular LeapPad Ultimate tablet. The tablet was designed by LeapFrog to provide kids in the UK and Europe with a safe ...
Grim news comes out of Russia, as reported by Microsoft. The tech giant has been tracking the activities of a Russian hacking group that goes by the name of Strontium. Their other ...
Hardly a week goes by that we don't see another major data breach making the headlines. The latest company to fall victim to hackers is CafePress. They are well-known on the internet ...
Not long ago, both Google and Apple found themselves in hot water when it came to light that both companies had been making use of third-party partners to review Siri recordings. As ...
Apple has partnered with Goldman Sachs and their long-awaited "Apple Card" begins rolling out in limited fashion. The card becomes available to all iPhone owners in the United States toward the end ...
If you own an iPhone, be aware that a new iMessage vulnerability has been recently found and patched by Apple. This was part of the iOS 12.4 update. The flaw allowed hackers ...
Let's take a little time to talk about the vast numbers of smart devices in use around the world. You probably have several in your home or office. Smart devices need operating systems, ...
If you own an Android device, there's a new threat to be at least moderately concerned about. It takes the form of a new ransomware family that spreads from one victim to ...