logo




Top Security News


Security News

User Verification: A Balancing Act

User Verification: A Balancing Act

For many businesses, it’s tempting to collect as much information as they can about users and customers. This is because businesses can benefit from the generated insights about customers based ... Read more

Email apps caught selling user data to third parties

Email apps caught selling user data to third parties

The scraping of user data and selling it to third parties is a common practice of many companies today. This time, it is some email apps that have been found to be doing such things. The apps were rec... Read more

Facebook's Twitter and Instagram handles hacked

Facebook's Twitter and Instagram handles hacked

A hacker group called ‘OurMine hacker collective’ had temporarily hacked and vandalized Facebook’s Twitter main page and Messenger. Earlier last month, the organization had also hack... Read more

Android security flaw enable attackers to send malware

Android security flaw enable attackers to send malware

Security researchers at ERNW have discovered a new vulnerability called ‘BlueFrag’ that lets attackers send malware to steal data from mobiles that are nearby. Experts have warned users to... Read more

Google's parent Alphabet built a tool to detect deepfake videos

Google's parent Alphabet built a tool to detect deepfake videos

Google’s parent company Alphabet has built a new free tool called Assembler to help understand if a photo is real or fake. The new security tool can be used by journalists and fact-checkers to f... Read more

Google sent private videos to strangers via Google Photos

Google sent private videos to strangers via Google Photos

Google Photos is one of the most useful apps from Google offering unlimited backup of photos and videos. But not many users know about an app called Google Takeout that helps users to download all the... Read more

Google introduces OpenSK to make 2FA security keys

Google introduces OpenSK to make 2FA security keys

Google has been making tides in the mobile security arena for a while and they’ve been experimenting with security keys. Security keys like “Titan” are fully capable of integrating w... Read more