Security

Popular Linux Sudo Command Has A Flaw: Update It Now

One of the most renowned and widely-used Linux commands -- the Sudo command -- has a security flaw, which allows Linux users to run...

You Are Being Continuously Tracked By Your Smart TVs: Here’s How

Just when we thought that only our smartphones and virtual assistants keep track of our activities, a new study pops up. The research suggests...

11 Best Free Android Antivirus Apps For 2019 – Keep Your...

As smartphones have become an inherent part of our lives, people no longer use their phones just for communication. Instead, they store most of...

UNIX Co-Founder Ken Thompson’s BSD Password Finally Cracked

Ken Thompson, who co-created the popular operating system Unix along with Dennis Ritchie, remains a revered figure in the field of computer science. In...

TOR Project Removes 13.5% Of Its Network Servers: Here’s Why

The Tor Project has removed more than 800 servers that were running outdated and end-of-life (EOL) versions of the Tor software. These blacklisted servers...

Serious Flaw In Many D-Link Routers Won’t Be Patched: Are You...

D-Link has refused to patch a serious security flaw that has affected the four models of its home routers. The vulnerability tagged as CVE-2019-16920...

Twitter Accepts It Used Users’ 2FA Phone Numbers For Ad Targeting

As part of a new privacy breach that has surfaced recently, the micro-blogging site Twitter has admitted that it used users' mobile numbers for...

Hacked Programmer Retaliates By Hacking Hackers Who Hacked Him

Everything you do comes back to you. It's called karma - This stood true for a hacker who hacked a programmer and got hacked by...

Microsoft Reveals How “Phosphorus” Tried Hacking US Presidential Campaign

As recently found out by Microsoft, an Iran-based threat group -- Phosphorus -- tried to hack the 2020 US Presidential Campaign. The discovery was...

New Android Zero-Day Vulnerability Found: These Are The Affected Smartphones

Google has discovered a new Android zero-vulnerability that allows hackers to gain unauthorized access to various Android smartphones. This discovery has been made by...