Purdue University Suffered Data Breach Exposing More Than 26,000 Records
Data breaches are not always a result of some malicious activity. Rather, sometimes, a slight…
Vulnerabilities
Data breaches are not always a result of some malicious activity. Rather, sometimes, a slight…
Apple has tried to make every possible feature to restrict unwanted access to their iPhones.…
Sometimes, technology unintentionally becomes a part of world politics. The same happened to Apple lately.…
Arch Linux’s AUR package repository has been found to contain malware. It was discovered within…
A new Spectre class of vulnerability has been found in CPUs it has been coined…
The LTE (Long Term Evolution) was created to improve the data transfer rate of the…
Amidst all the corporate data breach incidents, the cyber attacks on healthcare sector continue at…
We already know about the infamous Rowhammer vulnerability in DRAM (dynamic random access memory). Now,…
We have got another report about a Facebook related fail, as its popular application NameTests…